{"id":50633,"date":"2021-01-12T12:36:00","date_gmt":"2021-01-12T12:36:00","guid":{"rendered":"http:\/\/35.232.100.111\/?post_type=post&p=28112"},"modified":"2022-12-29T12:18:37","modified_gmt":"2022-12-29T12:18:37","slug":"active-directory-based-authentication","status":"publish","type":"post","link":"https:\/\/sectona.com\/pam-101\/authentication\/active-directory-based-authentication\/","title":{"rendered":"What is Active Directory Authentication and how does it work?"},"content":{"rendered":"\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\n\t\t\t\t\r\n\r\n\r\n\r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n <\/g>\r\n<\/svg>\r\n\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t
\n\t\t\t\t

\n\t\t\t\t\t\n\t\t\t\t\t\tActive Directory-Based Authentication\t\t\t\t\t<\/span>\n\t\t\t\t<\/h1>\n\t\t\t\t\t\t\t\t\t

\n\t\t\t\t\t\tAuthenticate users and Grant access through credentials stored in Active\nDirectory\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\tExplore Platform<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

What is an Active Directory (AD)? <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\tWindows Active Directory or Active Directory (AD) is a central repository of information related to all resources in the organization\u2019s network. The information can range from devices to documents, ensuring efficient information management. AD consists of a Windows server that works in compatibility with the Windows Operating System in order to provide centralized management, scalability and security. \t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t

Why is Active Directory Important? <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\tAs organizations adapt to the digital industry\u2019s demands and standards<\/a>, the proportion of resources like employees, databases, or servers being managed raises questions about accountability. Also, given the scattered structure of managing the infrastructure and its processes, it becomes difficult for organizations to keep track of employee activities, making it easier for attackers to gain access to the network\u2019s resources, resulting in a massive loss of sensitive information.\n

\nTo manage organizational resources in the network, Windows started the AD Domain Service in Windows Server 2000 and evolved through Windows Server 2012. It is a repository of all such contents of the organization databases, including resources, shared documents, service accounts, and domain admin accounts, allowing for centralized policy creation, user management, and authentication control.\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t

What are Some of the Benefits of Active Directory?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t\n
    \n \t
  1. Managing all resources and policies of the organizational network is simplified from a centralized space.<\/li>\n \t
  2. Allowing secure authentication by following the Kerberos protocol that is used in Windows Server 2012.<\/li>\n \t
  3. Leveraging the scope and scalability of the AD to enable organizations to tackle growing needs by making changes to the policy properties and user management.<\/li>\n<\/ol>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
    \n\t\t\t\t
    \n\t\t\t

    Which Type of Authentication is Used in Active Directory? <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
    \n\t\t\t\t
    \n\t\t\t\t\t\t\t\t
    \n\t\t\t\tAD Authentication is a process that typically follows Kerberos protocol, where users have to log in using their credentials to gain access to resources. Kerberos is a security protocol where users are required to log in only once to gain access to the organization\u2019s resources; instead of passing on the user\u2019s credentials over the network, a session key is created for the user that lasts for a designated time period allowing for a flexible authentication. Along with the session key, token information is also generated that contains all the access rights and policies attached to the user, ensuring that the user is accessing resources that they are entitled. \t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
    \n\t\t\t\t
    \n\t\t\t

    How Does Authentication Work in Active Directory? <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
    \n\t\t\t\t
    \n\t\t\t\t\t\t\t\t
    \n\t\t\t\t

    When an endpoint client connects to the endpoint server, an authentication process identifies the client and the user currently working on that computer.<\/p>

    Here’s How the Authentication Process Goes: <\/strong><\/p>

    1. The client requests an authentication ticket from the AD server.<\/li>
    2. The AD server returns the ticket to the client.<\/li>
    3. The client sends this ticket to the Endpoint Server.<\/li>
    4. The Server then returns an acknowledgment of authentication to the client.<\/li><\/ol>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
      \n\t\t\t\t
      \n\t\t\t

      How does Sectona Security Platform Leverage Active Directory? <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
      \n\t\t\t\t
      \n\t\t\t\t\t\t\t\t
      \n\t\t\t\tSectona Privileged Access Management Solution provides Active Directory-Based Authentication by integrating with directories like Microsoft AD, Azure AD, Open LDAP, IBM Tivoli Directory, Oracle Internet Directory, and Radius. The preview details an overview of the AD & Directory Store and the variables essential to configure them. \n

      \nAre you looking for more resources about authentication? We suggest you go through SAML Authentication<\/a>, Password-Based Authentication<\/a>, Key-Based Authentication<\/a> and Multi-Factor Authentication. \t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
      \n\t\t\t\t
      \n\t\t\t
      \"Active<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
      \n\t\t\t\t\t\t
      \n\t\t\t\t\t\t\t
      \n\t\t\t\t\t
      \n\t\t\t
      \n\t\t\t\t\t\t\t
      \n\t\t\t\t\t\t
      \n\t\t\t\t
      \n\t\t\t

      Related Concepts<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
      \n\t\t\t\t\t\t
      \n\t\t\t\t\t\t\t
      \n\t\t\t\t\t
      \n\t\t\t
      \n\t\t\t\t\t\t\t
      \n\t\t\t\t\t\t
      \n\t\t\t\t
      \n\t\t\t\t\t
      \n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t
      \n\t\t\t\t\t\t\t\t\t\t\t
      \n\t\t\t\t\t\t
      \n\t\t\t\t\t\t
      \n\t\t\t
      \n\t\t\t\t\"Password-Based-Authentication-PAM-101-Featured-Image\"<\/a>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\n\t\t\t\t\n\t\t\t\t
      \n\t\t\t\t\t
      \n\t\t\t\t\t\t\t\t\t\t
      \n\t\t\t\n\t\t\t\tAuthentication<\/a><\/span>\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t

      \n\t\t\t\tThe Importance of Password-based Authentication<\/a>\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t