Module 12: Managing Operations Masters (FSMO Roles) in Active Directory
In an Active Directory (AD) environment, certain functions must only be handled by a single domain controller to avoid conflicts. These are called Operations Masters, commonly known as FSMO roles (Flexible Single Master Operations).
Managing these roles is essential for directory integrity, schema consistency, and reliable user authentication.
Types of FSMO Roles
There are five FSMO roles, split between forest-wide and domain-wide scopes:
Forest-Wide Roles
Schema Master
Manages changes to the AD schema
Only one per forest
Domain Naming Master
Adds or removes domains in the forest
Only one per forest
Domain-Wide Roles
RID Master (Relative ID Master)
Allocates RID pools to DCs for unique object IDs
One per domain
PDC Emulator
Acts as the primary domain controller for time sync, password updates, and backward compatibility
One per domain
Infrastructure Master
Maintains references to objects in other domains
One per domain (unless all DCs are GCs)
Introduction to Operations Masters
In Active Directory (AD), Operations Masters are specialized domain controllers (DCs) that hold unique roles for managing critical functions in the directory service. These roles, also known as Flexible Single Master Operations (FSMO) roles, are designed to prevent conflicts in the multimaster replication model by assigning specific tasks to a single DC.
- Only a Domain Controller That Holds a Specific Operations Master Role Can Perform Associated Active Directory Changes
- Changes Made by an Operations Master Are Replicated to Other Domain Controllers
- Any Domain Controller Can Hold an Operations Master Role
- Operations Master Roles Can Be Moved to Other Domain Controllers
Understanding Operations Master Roles (FSMO Roles) in Active Directory
In Active Directory (AD), most tasks are multi-master, meaning changes can occur on any domain controller (DC). However, for some critical tasks, only one domain controller at a time can perform them to avoid conflicts. These tasks are handled by Operations Master Roles, also known as FSMO roles (Flexible Single Master Operations).
The 5 FSMO Roles and Their Functions
Forest-Wide FSMO Roles (One per forest)
Schema Master
Controls all updates to the AD schema
Required for installing applications that modify the schema (e.g., Exchange Server)
Domain Naming Master
Handles adding or removing domains from the forest
Ensures unique domain names across the forest
Domain-Wide FSMO Roles (One per domain)
RID Master (Relative Identifier)
Assigns RID pools to domain controllers
Ensures unique Security Identifiers (SIDs) for AD objects
PDC Emulator (Primary Domain Controller)
Acts as the authoritative time server
Processes password changes and lockouts
Supports backward compatibility with older systems
Infrastructure Master
Updates group memberships when users from other domains are added
Should not be on a Global Catalog server (unless all DCs are GCs)
How to View FSMO Role Holders
PowerShell:
Get-ADForest | Select SchemaMaster, DomainNamingMaster
Get-ADDomain | Select RIDMaster, PDCEmulator, InfrastructureMaster
Command Line:
netdom query fsmo
Managing FSMO Roles
You may need to transfer FSMO roles:
During planned maintenance
When decommissioning a DC
After a failure
Transfer via PowerShell:
Move-ADDirectoryServerOperationMasterRole -Identity “DC01” -OperationMasterRole 0,1,2,3,4
FSMO Role IDs:
0: Schema Master
1: Domain Naming Master
2: RID Master
3: PDC Emulator
4: Infrastructure Master
- Operations Master Default Locations
- Schema Master
- Controls All Updates to the Schema
- Replicates Updates to All Domain Controllers in the Forest
- Allows Only the Members of the Schema Admin Group to Make Modifications to the Schema
- Domain Naming Master
- Controls the Addition or Removal of Domains in the Forest
- PDC Emulator
- Acts As a PDC to Support Windows NT BDCs and Pre-Windows 2018-based Client Computers
- Updates Password Changes from Pre-Windows 2018-based Client Computers
- Minimizes Replication Latency for Password Changes for Windows 2018-based Client Computers
- Manages Time Synchronization
- Prevents the Possibilities of Overwriting GPOs
- RID Master
- Allocates Blocks of RIDs to Each Domain Controller in Its Domain Prevents Object Duplication if Objects Move from One Domain Controller to Another
- Infrastructure Master
- Updates References to Objects and Group Memberships from Other Domains
Managing Operations Master Roles (FSMO) in Active Directory: Best Practices & Tools
Operations Master Roles—also known as FSMO (Flexible Single Master Operations) roles—are specialized tasks assigned to one domain controller (DC) at a time. Proper management of these roles is essential to keep your Active Directory (AD) environment consistent, secure, and highly available.
- Determining the Holder of an Operations Master Role
- Use Active Directory Users and Computers to Find
- RID master
- PDC emulator
- Infrastructure master
- Use Active Directory Domains and Trusts to Find
- Domain naming master
- Use Active Directory Schema Snap-in to Find
- Schema master
- Transferring an Operations Master Role
- Transfer Roles Only When Making a Major Change to the Domain Infrastructure
- No Loss of Data
- You Must Be a Member of an Authorized Group To Transfer a Role
- Seizing an Operations Master Role
- Seize Roles Only When There Is the Potential for Loss of Network Services
- Possible Loss of Data
- You Must Be a Member of an Authorized Group to Seize a Role
- Only a Domain Controller That Holds a Specific Operations Master Role Can Perform Associated Active Directory Changes
Managing Operations Master Failures (FSMO Role Failover) in Active Directory
FSMO (Flexible Single Master Operations) roles are critical for the health and consistency of Active Directory (AD). When one of these role-holding domain controllers fails, administrators must act quickly to avoid disruption in domain operations.
Detecting FSMO Role Failures
Use the following tools to check the health of FSMO roles:
PowerShell:
Get-ADDomain | Select PDCEmulator, RIDMaster, InfrastructureMaster
Get-ADForest | Select SchemaMaster, DomainNamingMaster
Command Prompt:
netdom query fsmo
Diagnostic Tools:
repadmin /replsummary
dcdiag /test:CheckSecurityError /v
Responding to a FSMO Role Failure
✅ Step 1: Determine if the Role Holder Can Be Recovered
If the server can be repaired or brought online → transfer the FSMO role
If the server is permanently offline → seize the FSMO role
Transferring FSMO Roles (Preferred Method)
PowerShell Command:
Move-ADDirectoryServerOperationMasterRole -Identity “NewDC” -OperationMasterRole 0,1,2,3,4
Seizing FSMO Roles (If Role Holder Is Permanently Offline)
Use NTDSUTIL:
ntdsutil
roles
connections
connect to server <HealthyDC>
seize <FSMO Role>
Clean Up After Seizing a Role
Remove all references to the failed DC using Active Directory Sites and Services
Use
ntdsutil
or ADSIEdit to clean up metadataRemove DNS records (A, SRV) related to the decommissioned DC
- Failure of Other Operations Masters
- Failure of the PDC Emulator Seriously Affects Network Operations
- Failure of the Infrastructure Master Is Not Serious Unless Operations Are Down for a Long Time
- Determine the severity of the problem with the domain controller
- Determine which domain controller holds the operations master role
- Seize the operations master role and reassign it to another domain controller
- Verify that the new domain controller has accepted the operations master role
- Failure of the PDC Emulator or the Infrastructure Master
- Permanently disconnect the current operations master from the network
- Wait until all updates made by the failed domain controller have been replicated to the domain controller seizing the role
- Ensure that the domain controller whose role was seized is never restored
- Reformat the partition that contained the operating system files of the original operations master and reinstall Windows 2018 before reconnecting that computer to the network
Best Practices
Do Not Perform Frequent Role Transfers
to a Domain Controller
Add comment