Active Directory Travis Favors Ryan Manuel Robert Rayer.

Slides:



Advertisements
Similar presentations
Managing User, Computer and Group Accounts
Advertisements

COMP091 OS1 Active Directory. Some History Early 1990s Windows for Workgroups introduced peer-to-peer networking based on SMB over netbios (tcp/ip still.
By Rashid Khan Lesson 5-Directory Assistance: Administration Using Active Directory Users and Computers.
Chapter 6 Introducing Active Directory
Chapter 4 Chapter 4: Planning the Active Directory and Security.
Introduction to Active Directory
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
CS603 Active Directory February 1, 2001.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Administering Active Directory
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
Group Accounts; Securing Resources with Permissions
Understanding Active Directory
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
1 CSIT 320. Just as the combination of a database and a database management system collects and organizes information about an institution/company/… as.
Hands-On Microsoft Windows Server 2008
Chapter 7 WORKING WITH GROUPS.
Chapter 7 Managing OUs and Active Directory Accounts
Hands-On Microsoft Windows Server 2008
Chapter 4: Active Directory Design and Security Concepts
ADVANCED MICROSOFT ACTIVE DIRECTORY CONCEPTS
Nassau Community College
(ITI310) SESSIONS : Active Directory By Eng. BASSEM ALSAID.
 Name: Hatem elbuhaisi  Name no:  University of Palestine  Miss : yasmen elboboo  Chairing Information Technology Hands-On Microsoft Windows.
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
Session 6 Windows Platform Dina Alkhoudari. Learning Objectives What is Active Directory Logical components of active directory Physical components of.
Windows Server 2008 Chapter 4 Last Update
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 3: Introducing Active Directory.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 9: Active Directory Authentication and Security.
Sharing Resources Lesson 6. Objectives Manage NTFS and share permissions Determine effective permissions Configure Windows printing.
Working with domains and Active Directory
Designing Group Security Designing security groups Designing user rights.
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring, Managing, and Troubleshooting Resource Access.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced Chapter 5: Active Directory Logical Design.
Module 4 Managing Access to Resources in Active Directory ® Domain Services.
September 18, 2002 Windows 2000 Server Active Directory By Jerry Haggard.
Configuring Active Directory Objects and Trusts
Module 7 Active Directory and Account Management.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Active Directory Maryam Izadi. Topics Covered NT Vs 2000/2003 Active Directory LDAP MMC.
1 Windows 2008 Configuring Server Roles and Services.
Secure Networking Windows 2000 Distributed Security Services Sandeep Joshi Group 4.
Page 1 Active Directory and DNS Lecture 2 Hassan Shuja 09/14/2004.
By Rashid Khan Lesson 6-Building a Directory Service.
Hands-On Microsoft Windows Server 2008 Chapter 4-Part 1 Introduction to Active Directory and Account Manager.
Module 3 Creating Groups and Organizational Units.
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
Windows 2000 Security Yingzi Jin. Introduction n Active Directory n Group Policy n Encrypting File System.
OVERVIEW OF ACTIVE DIRECTORY
Introduction to Active Directory
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
Review on Active Directory. Aim Enable users to find network resources easily Central and easy administration of users and resources in a domain Improve.
Microsoft Active Directory Presented by Sherese Harrell, Rebecca Meinhold, and Brenden Tourelle
Logical and Physical Network Design 1. Active Directory Objects Objects Represent Network Resources (Users,Groups,Computers,Printers) Attributes Store.
Hussain Ali Department of Computer Engineering KFUPM, Dhahran, Saudi Arabia Active Directory.
CEG 2400 Fall 2012 Directory Services Active Directory Tree Domain.
Windows 2003 Architecture, Active Directory & DNS Lecture # 3 Hassan Shuja 02/14/2006.
Planning an Active Directory Deployment Lesson 1.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Implementing Active Directory Domain Services
Module 7: Managing Access to Objects in Organizational Units
Active Directory Administration
(ITI310) SESSIONS 6-7-8: Active Directory.
Active Directory Stored collection of information about objects
Active Directory Overview
Windows Active Directory Environment
ACTIVE DIRECTORY An Overview.. By Karan Oberoi.
Presentation transcript:

Active Directory Travis Favors Ryan Manuel Robert Rayer

Active Directory Contains information of all objects in an organization’s network. Arranges Objects into logical, hierarchical groups. Provides permissions based on stored information. Authentication

Attributes Characteristics and Information that belong to an object Can be required or optional

Objects Entities of the network Composed of attributes Example Objects: User, Printer, Shared Folder

Object Classes Contains a list of associated attributes Blueprint for object creation

Schema Master List of all object classes Defines all objects and attributes available for an object Identifies the relationships between all objects

Schema User name department Printer name location Shared Folder name description Object Classes Attributes

Access Control Used to manage user access to shared resources Administered at object level by setting permissions Examples: Full control, write, read and no access Permissions are set to shared objects Shared objects are objects that is intended to be used over a network by more than one user Three elements define access control permissions

Security Descriptors Permissions are stored in security descriptors Security Descriptors contain two access control lists Discretionary Access Control List (DACL) System Access Control List (SACL)

User Authentication User’s Access Token Subject User SID Group SIDs List of Privileges Other Access Information Object’s Security Descriptor Object Object Owner SID Group SID ACE SACL ACE DACL Active Directory also authenticates and authorizes users, groups, and computers to access objects on the network The Local Security Authority (LSA) is responsible for all user authentication LSA generates two pieces of information after a user’s identity is confirmed

Object Inheritance OU Parent Object Child Object Objects inherit permissions from their parent container when they’re created Object inheritance can be turned off

Workgroups All Computers are peers. There is no host. User accounts aren’t shared. No more than 20 computers at once. Not protected by authentication All computers must be on the same local network/subnet.

Domains Servers as hosts/admins Easy to apply sweeping policy changes Users must provide authentication to access User accounts can access any computer on the domain Enforce consistency Borderline limitless capacity Distributed across multiple networks

Organizational Units Organize and segregate groups of a domain Smallest unit where group policy can be enforced Useful for representing the logical hierarchy of an organization Can be nested Reduces need for multiple domains to some degree Allows for granular delegation of administrative authority

Trees Domain trees are collections of domains with a hierarchal structure. Domains controlled by other domains are child domains, and the controlling domain is the parent domain.

Forests Complete instance of Active Directory Contains all Domain Trees, including their domains and organizational units The first, highest-level domain in a Forest is called the Forest Root Domain

Trust Relationships Extend security across multiple domains Allow access to data and storage locations on other domains “Transitive” trust relationships extend trust from the trusted domain to all of that domain’s trusted domains, whereas “Nontransitive” do not.