What is Active Directory

Bala Praneeth (Begin_hunt)
3 min readJul 29, 2020

Hey guys, ever wondered when you request for a specific file back in the olden days, how would the system process and handles the request. Just think over it.

So here’s the deal, back then, when a particular file is requested by the user the following things are required to retrieve it successfully. The name of the file, server in which the file is present and path of the file requested

In order to overcome these requirements windows came up with the idea of Active directory.

Active directory (A.D) — You can think of it as a centralized and distributed database wherein all the information of the users belonging to a specific organization is being stored in the form of objects. The authentication process involves Kerberos, once the user is being authenticated, then the administrators have the ability to assign a role of the user which describes

1. Specific permissions assigned

2. Access control

3. Access management.

Active Directory Control

Kerberos: An authentication mechanism used to verify the user.

Single Sign-On (SSO) — This feature enables the user to authenticate from any computer on the network which is connected to a particular domain.

Example — Let us assume that there are two departments in a company under the Administration section which are Finance and PR. Now the user from the finance account can log in with his credentials from a PR account. This is possible only within the domains. This elaborates the purpose of SSO

Let us look into a few terminologies which are a part of AD

  1. Domain controller — It is a server in which any version of Microsoft windows server edition operating system is loaded and later roles and features are configured in order to provide the services required to the user.
A system installed with Microsoft Windows Server edition

2. Objects- The objects can be your computer’s, printers, file shares, etc

3. Organization’s Units (O.U) — Simply defined as the grouping of Domain controllers into a single unit or entity. Thus allowing the process of adding the objects to an O.U.

Structure of O.U

4. Trees — In certain cases when security is the context it’s better to segregate the domains, assign the roles and features. This tree structure includes the parent domain and child domains which defines the scope of the access. They also have a trust relationship between the two entities.

Structure of Trees

5. Forests — Connecting two or more trees is simply called as Forests.

Structure of Forests

Collaboration and networking is something that I always enjoy. Let’s connect

Twitter — https://twitter.com/Begin_hunt

Linkedin — https://www.linkedin.com/in/balapraneeth/

If you have reached this far, I sincerely thank you for reading this blog. Since this is my first blog, Kindly do let me know where I can improve more in writing and explaining in detail. Appreciate it!.

--

--

Bala Praneeth (Begin_hunt)

Graduate Student | Passionate about Information Security | Web Application Security enthusiast | Self-motivated