What is an Active Directory (AD)?
Why is Active Directory Important?
To manage organizational resources in the network, Windows started the AD Domain Service in Windows Server 2000 and evolved through Windows Server 2012. It is a repository of all such contents of the organization databases, including resources, shared documents, service accounts, and domain admin accounts, allowing for centralized policy creation, user management, and authentication control.
What are Some of the Benefits of Active Directory?
- Managing all resources and policies of the organizational network is simplified from a centralized space.
- Allowing secure authentication by following the Kerberos protocol that is used in Windows Server 2012.
- Leveraging the scope and scalability of the AD to enable organizations to tackle growing needs by making changes to the policy properties and user management.
Which Type of Authentication is Used in Active Directory?
How Does Authentication Work in Active Directory?
When an endpoint client connects to the endpoint server, an authentication process identifies the client and the user currently working on that computer.
Here’s How the Authentication Process Goes:
- The client requests an authentication ticket from the AD server.
- The AD server returns the ticket to the client.
- The client sends this ticket to the Endpoint Server.
- The Server then returns an acknowledgment of authentication to the client.
How does Sectona Security Platform Leverage Active Directory?
Are you looking for more resources about authentication? We suggest you go through SAML Authentication, Password-Based Authentication, Key-Based Authentication and Multi-Factor Authentication.
Active Directory-Based Authentication
- 1.1 What is an Active Directory (AD)?
- 1.2 Why is Active Directory Important?
- 1.3 What are Some of the Benefits of Active Directory?
- 1.4 Which Type of Authentication is Used in Active Directory?
- 1.5 How Does Authentication Work in Active Directory?
- 1.6 How does Sectona Security Platform Leverage Active Directory?
- 1.7 Related Concepts
- 1.8 The Importance of Password-based Authentication
- 1.9 Key-based Authentication Method: A Prominent Alternative
- 1.10 Privileged Single Sign On v/s Application Single Sign On