Thursday, June 22, 2017
Home > Server > FSMO Roles Types and Responsibility

FSMO Roles Types and Responsibility

FSMO stands for “Flexible single Mater Operations” – The terminology FSMO was given in Windows 2000 by Microsoft, but in Windows 2003 it is called Operations Master, However the features and its functionality remain same in windows 2003 and most people still call it FSMO.

FSMO is divided into two categories:

  • Forest Wide Role
  • Domain Wide Role

Forest Wide Role is further divided into two categories:

  • Schema Master
  • Domain Naming Master

Domain Wide Role is further divided into Three categories:

  • RID Master
  • Infrastructural Master
  • PDC Emulator

1. Schema Master: Schema consists of information about the object and its attributes. For example: Object is the name of the employee and attributes is the employee ID. In a Forest there can be only one Schema Master. Schema Master domain controller is the one which has full Read and Write permission in a domain as compared to other AD Schema files which just has the read permissions. If any changes has to be made in Schema it has to be made in Schema Master domain controller which is then replicated to other AD server’s schema in the Forest.

2. Domain Naming Master: This is responsible to keep the records of all the Names in the network, which includes Domain names, users, printers and other objects in the Domain. It is used to get the information of the names in the forest. If you give a name to a new AD or any other machines, if the same name is already given to some other machine then you receive the error. There can only be one Domain Naming Master in entire forest.

3. PDC Emulator: (PDC: Primary Domain Controller)

Backward Compatibility: When in NT scenario Active Directory is introduced we will face the following issue: In NT there is a PDC (Primary Domain Controller) and the other entire server is BDC (Backup Domain Controller).

PDC functionality is to replicate all its required data to BDC, Now if a AD is included in this scenario and as AD has the same functionality that of PDC that of sharing information but also has additional feature of accepting information as well then there would be an issue of data replication. i.e. AD will take data from PDC but PDC will not take data from AD as its function is just to send data and not to receive any data.

To overcome this issue Microsoft has introduced PDC Emulator, The first server which is installed in the network is by default a PDC Emulator, however this roles can later be changed as per requirement to other serves.

When a PDC Emulator is installed in the NT Scenario it by default changes the PDC server into BDC which would now just receive data instead of sending it and hence creating an AD scenario in which all servers can now send and receive information’s.

Time synchronization: This is responsible to keep a track on time settings of the entire server and other
client machines in the network.

If a time settings on any of the machine is not set correctly set then it forcefully changes the time as it is very critical when it comes to synchronization of some information’s with the network.

For example there is a replication time set on the servers and if the time which is set on the server is not correct then the synchronization will not happen. To avoid this issue PDC Emulator keeps an eye on all the machines time settings in its network.

For the PDC Emulator to set and synchronize time on other servers it is important that the time is correctly set on the PDC Emulator server. Hence if internet is present on the PDC Emulator server it is then linked with NTP (Network Time Protocol). This will automatically keep Time on the PDC Emulator server up to date.

Password changes are updated on PDC Emulator: When there is a password change made in any of the machines it is first replicated to PDC Emulator which then reflects to other ADC as per scheduled.

For example there is a scheduled replication time set on the servers and if password change is made by any of the users in between this schedule time then this information is first send to PDC Emulator no matter what is the schedule replication time. So if a password change is made PDC Emulator will first have the all the details of the password changes. Hence if a user logs into a domain and the required ADC do not have the user information then it first consult the PDC Emulator server for the information’s.

4. RID Master: (Relative Identifier) : RID master assigns a pool of RID’s to the DC and ADC’s on the network so that they can also assign a different ID’s to the account created without conflict.

For Example

DC

 

 ADC1

 

ADC2

In this case if accounts are created and the SID given are same in all the servers’ i.e. Range (0-100), then there would be a conflict. To avoid this different range is given to different servers.

When you create an account on the server RID is responsible to give allocated SID to an account which would best describe account information. Each ADC is allocated a RID which has a pool of SID which it assigns to each users created.

5. Infrastructural Master: Functions of Infrastructural Master is to update all the other ADC on its Domain with the updates such as [password change, any modifications done]. Cross Domain group information is stores in IM.
For Example : If a user joins a group which is in different domain then the information about both the users and the group is stored in IM of both the domains. Each Domain has its Infrastructural Domain.

Mohammed Yusuf
An IT System Administrator and Microsoft Certified Professional (MCP) with 10+ years of experience, has good ability to solve tech issues of various platforms, apart from that he is a passionate blogger and love to write on varied topics of technology.

2 thoughts on “FSMO Roles Types and Responsibility

Leave a Reply

Your email address will not be published. Required fields are marked *

nine + 16 =