Best Practices for Assigning FSMO Rolesby Mitch Tulloch, author of Windows Server 2003 in a Nutshell and Windows Server Hacks
In an Active Directory environment, some of your domain controllers (DCs) must be assigned certain special roles for your network to function properly. These special roles are called flexible single master operations (FSMO) roles, and DCs that hold such roles are called FSMO role holders. If you don't assign these roles properly, bad things can happen, so the focus of this article is on rules for proper placement of FSMO roles on AD-based networks. But before we summarize the rules, let's briefly review what the different roles are and the consequences when a role fails or isn't placed properly.
Each domain in an AD-based network has three FSMO roles that must be assigned to domain controllers within the domain:
PDC Emulator. The DC holding this role plays PDC for any legacy Windows NT BDCs you may still have running. But even if you've migrated all your legacy DCs and your domains are running in Windows 2000 mixed functional level or higher, the PDC Emulator role is still important because the PDC Emulator enforces account lockout, handles password changes, and synchronizes time for all DCs in the domain.
RID Master. When an administrator creates a new security principle in Active Directory (typically a new user or group) the SID for the new object is constructed from the domain SID and a relative ID (RID) selected from a pool of RIDs on the domain's DCs. If this pool starts running low (under 50% remaining) the RID Master replenishes it.
Infrastructure Master. Ensures cross-domain object references are handled properly, such as when objects in one domain are referenced by objects in a different domain.
The forest root domain also has two additional FSMO roles that must be assigned to domain controllers in that domain:
Domain Naming Master. Handles changes to the namespace, for example when a new child domain is added to a parent domain.
Schema Master. Handles changes to the schema and replicates these changes to all other DCs throughout the forest.
There are a number of ways you can determine which DCs are FSMO roles holders on your network, but the simplest is to install the Support Tools from the \Support\Tools folder on your product CD and type
netdom query fsmo at a command prompt:
From the results above we can see that in this example the Infrastructure Master for the
testtwo.local domain is held by TEST230 while all other roles are held by TEST220. Other ways of determining FSMO role holders are outlined in KB 234790. The Script Center on Microsoft TechNet has a handy script for this purpose, too.
If one or more of your FSMO role holders has problems, bad things can happen. To help you troubleshoot such situations, the table below describes some of the symptoms that can occur when FSMO role holders go missing or don't work properly.
|Symptom||Possible Role Involved||Reason|
|Users can't log on.||PDC Emulator||If system clocks become unsynchronized, Kerberos may fail.|
|Can't change passwords.||PDC Emulator||Password changes need this role holder.|
|Account lockout not working.||PDC Emulator||Account lockout enforcement needs this role holder.|
|Can't raise the functional level for a domain.||PDC Emulator||This role holder must be available when the raising the domain functional level.|
|Can't create new users or groups.||RID Master||RID pool has been depleted.|
|Problems with universal group memberships.||Infrastructure Master||Cross-domain object references need this role holder.|
|Can't add or remove a domain.||Domain Naming Master||Changes to the namespace need this role holder.|
|Can't promote or demote a DC.||Domain Naming Master||Changes to the namespace need this role holder.|
|Can't modify the schema.||Schema Master||Changes to the schema need this role holder.|
|Can't raise the functional level for the forest.||Schema Master||This role holder must be available when the raising the forest functional level.|
Since FSMO roles are crucial for the proper functioning of an AD-based network, it's a good idea to get them right from the planning stage of your deployment. By default, when you install the first DC of your forest root domain, this first DC holds all five FSMO roles. When you install the first DC of any other domain in your forest, that DC will hold all three domain FSMO roles (PDC Emulator, RID Master, and Infrastructure Master). Depending on the complexity of your network, however, this default roles assignment may not be appropriate, so you need to transfer some of your roles to a different machine to achieve optimal FSMO-role placement on your network. See KB 223787 and KB 255504 for how to transfer roles. KB 321469 also has information on how to transfer roles using scripts.
Proper FSMO role placement basically boils down to a few simple rules, tips, and exceptions:
Mitch Tulloch is the author of Windows 2000 Administration in a Nutshell, Windows Server 2003 in a Nutshell, and Windows Server Hacks.
Return to WindowsDevCenter.com.
Copyright © 2009 O'Reilly Media, Inc.