SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3579
Research Paper on Active Directory
Dr. Shwetav Sharad1, Amit Singh2, Divyanshu3, Abhishek Rai4
1Assistant Professor Department of CSE BBDIT College, Ghaziabad (U.P)
2,3,4Student Department of CSE BBDIT College, Ghaziabad (U.P)
---------------------------------------------------------------------------***---------------------------------------------------------------------------
Abstract - Microsoft’s Active Directory (AD) is a directory service used to store information about network resources across and
provides a hierarchal way to the entire network of devices and applications. Active Directory was introduced in windows 2000
server. AD is a central collection of users, groups and computers, enabling single sign-on (SSO) for devices and applications joined
to the AD domain. Active directory stores information about network resource such as users, user’s password, groups, network
printer and computer and makes the information available to users and administration. Active directory allows administrator to
manage centralized management with the help of group policy. When a user logs into a computer that is a member of a window
domain, active directory checks the submitted users name and password and allows access to network resource such as network
printer and other computer on network. The tools provided by Microsoft that helps to manage the AD services do not offer the
capabilities of bulk user, group and computer management. Existing tools provide mechanisms for managing user properties,
passwords and group membership in bulk; however, each tool solves an individual problem. In this project. Integrating these tools
aids system administrators by providing a single tool to manage multiple components of AD.
Key words: Active directory, AD services, Logical Structure, Workgroup, Domain.
INTRODUCTION
Active Directory is a directory services Microsoft developed for window domain network. Active directory is a directory
service used to store information about the network resource across a domain. Active directory includes most of the windows
server operating systems as a set of process and service. An active directory (AD) structure is a hierarchal framework of
objects. The objects falls into three broad categories resource(printer), service(e-mail), user (accounts or user and group). The
active directory information on the objects, organizes the objects, controls access and sets security. Active Directory
uses Lightweight Directory Access Protocol (LDAP) versions 2 and 3, Microsoft's version of Kerberos, and DNS. Active
Directory allows network administrators to create and manage domains, users, and objects within a network. For example, an
admin can create a group of users and give them specific access privileges to certain directories on the server. Before Windows
2000, Microsoft’s authentication and authorization model required breaking down a network into domains, and then linking
those domains with a complicated, and sometimes, unpredictable system of one- and two-way trusts. Active Directory was
introduced in Windows 2000 as a way to provide directory services to larger more complex environments.
ACTIVE DIRECTORY SERVICES
Active Directory is a hierarchal structure that stores the information about the objects on the network. An Active directory has
major such services as domain service, certificate service, leightweight directory, federation services, rights management.
1. Domain service:- The domain service of active directory stores the centralized data and manages the
communication between user and domain. The domain services also includes login authentication and search
functionality. The active directory domain services also used as servers role, that allow admin to manage and stores
information about the resource network, also helps to manage elements of network and record them in a hierarchy.
2. Certificate Services:- The certificate services of active directory is used to manage, generate and share certificates.
Microsoft Active Directory Certificate service is used to provide a platform for managing public key infrastructure
certificate. According to Microsoft themselves, AD CS is the “Server Role that allows you to build a public key
infrastructure (PKI) and provide public key cryptography, digital certificates, and digital signature capabilities for
your organization.”
3. Directory Federation Service:- The Directory Federation Services of Active Directory provides the user for single
sign in to authenticate a user in multiple web application in a single session.
The federation services works on based upon the federated identity. Also it is a functionality of a window server OS
that extends user for a Single Sign On access to application and system outside the corporate firewall.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3580
4. Rights Management :- The Federation management of active directory protects copyrighted information by
preventing the unauthorize used and distribution of digital content. The rights management is used as a security tools
that provides the persistent data protection by enforcing the data access policy. It uses encryption and a form of
selective functionality denial for limiting access to documents such as corporate emails, Microsoft word documents,
and, web pages and the operations authorized users can perform on them.
LOGICAL STRUCTURE OF ACTIVE DIRECTORY
Microsoft Active Directory logical Structures includes the major:-
1. Object
2. Forest
3. Tree
4. Domain
5. Partition
The framework that holds the object is viewed at a no. of levels. At the top structure is Forest. Forest is the collection
of every objects, its attribute and rule (attribute syntax) in the Active directory. The forest holds one or more
transitive trust linked trees.
A Tree holds one or more domain and domain tree, again linked in the transitive trust hierarchy.
Domains are identified by their DNS name structure, the name space. A domain a single DNS name.
The object held within a domain can be grouped into organizational units. Organizational units give a domain a
hierarchy ease its administration and can give a semibalance of structure of Active Directory company in
organizational or geographical terms.
Organizational units can contain OUs includes, domains are container in this sense & can hold multiple nested OUs.
Microsoft recommends as few domains possible in AD and relies on organizational unit to produce structure and
improve the implementation of policies and administration.
FILE NAME OF ACTIVE DIRECTORY
File name:- NTDS.DIT
Location:- %systemroot%/NDTS/ndts.dit
FLEXIBLE SINGLE MASTER OPERATION (FSMO)
The FSMO contains major 5 roles
1. Domain naming master:- The domain controller manages the addition and removal of domain in the forest. A
forest can have only one domain naming master , which can be transferred to another domain controller through
the active directory domain and trust snaps in.
2. Schema Master:- It controls update to the domain schema data. This is one schema master in entire forest. It can
be transferred to another domain controller through Active Directory schema master snaps in.
3. PDC Emulator master:- in a mixed 2000 & window NT environment, the PDC emulator master supports BDCs.
Thus it manages user account and password change and forward that information to the Window NT BDC.
In a native mode window 2000 environment, the PDC emulator master received preference in replication of user
account password. Before a login fails, it is checked for updated information. This master role can be transferred
to another domain controller through active directory user and computer snaps in.
4. Relative ID Master: A single relative ID master in each domain of a tree manages the allocation of sequential
relative ID(RID) to each domain controller. This makes all security ID (SID) created in domain relative to domain
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3581
controller. This master role can be transferred to another domain controller through active directory and
computer snaps in.
5. Infrastructure Master: - It is responsible for managing group and user reference. Except a delay in change to
user when they are made across domain. Update to other domain are made by the infrastructure master domain
controller via a process called master replication. The master role can be transferred to another domain
controller through active directory user and computer snaps in.
WORKGROUP AND DOMAIN
Workgroup is best understood as peer to peer network i.e. each computer is a sustainable on its own. It has its own user list,
its own access control and own resources. In order for a user to access resource on another workgroup, computer that exact
user must be setup on other computer. Workgroup offer little security outside of basic access control. Window “share
permission” are very basic and do not offer any kind of granularity “Who” can access “’ What” etc. Workgroup is used for small
business and home use etc.
Domain is a trusted group of computer shares security, access control and have data passed down from a centralized domain
controller server. Domain controller handles all aspects of granting user permission to login. They are gatekepper. Most
domain uses active directory which allows more centralized point for software distribution, user management and computer
control.
CONCLUSION
1. Describe the role of Active Directory in Windows
2. Describe which Internet standards and technologies supported by Active Directory
3. Describe the naming conventions in Active Directory that you must consider when establishing a Windows 2000 network
4. Describe the logical structure of Active Directory
5. Define the role of domains
6. Define the role of organizational units (OUs)
7. Define the relationship between trees and forests
REFRENCES
https://en.wikipedia.org/wiki/Active_Directory
https://searchwindowsserver.techtarget.com/definition/Active-Directory
https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/get-started/virtual-dc/active-directory-domain-services-
overview
https://www.monitis.com/blog/active-directory-structure/
http://www.tech-faq.com/logical-structure-of-an-active-directory.html
https://www.distributednetworks.com/active-directory-administration/module2/active-directoryRole-conclusion.php
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3582
BIOGRAPHIES
Amit Singh, Student of BBDIT
Ghaziabad pursuing B.Tech in
Computer
Amit Singh science Engineering.
Amit Singh has published two
research papers.

Contenu connexe

Tendances

Windows Server 2003 Administration
Windows Server 2003 AdministrationWindows Server 2003 Administration
Windows Server 2003 AdministrationLearnItFirst.com
 
Chapter14 Windows Server 2003 Security Features
Chapter14      Windows  Server 2003  Security  FeaturesChapter14      Windows  Server 2003  Security  Features
Chapter14 Windows Server 2003 Security FeaturesRaja Waseem Akhtar
 
Jerry_A_Taylor_Resume
Jerry_A_Taylor_ResumeJerry_A_Taylor_Resume
Jerry_A_Taylor_ResumeJerry Taylor
 
Microsoft Solution Proposal with AD, Exchange & SC--Bill of Materials
Microsoft Solution Proposal with AD, Exchange & SC--Bill of MaterialsMicrosoft Solution Proposal with AD, Exchange & SC--Bill of Materials
Microsoft Solution Proposal with AD, Exchange & SC--Bill of MaterialsShahab Al Yamin Chawdhury
 
DB2 Security Model
DB2 Security ModelDB2 Security Model
DB2 Security ModeluniqueYGB
 
Chapter02 Managing Hardware Devices
Chapter02      Managing  Hardware  DevicesChapter02      Managing  Hardware  Devices
Chapter02 Managing Hardware DevicesRaja Waseem Akhtar
 
EMC Documentum Enterprise Content Management 6.5
EMC Documentum Enterprise Content Management 6.5EMC Documentum Enterprise Content Management 6.5
EMC Documentum Enterprise Content Management 6.5Emirates Computers
 
Network service description office 365 dedicated plans april 2012
Network service description office 365 dedicated plans april 2012Network service description office 365 dedicated plans april 2012
Network service description office 365 dedicated plans april 2012gallegosm37
 
Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008Sangeetha Rangarajan
 
Overview of Documentum
Overview of DocumentumOverview of Documentum
Overview of Documentumsushl
 
N2WDMS - A Workflow and Document Management Software
N2WDMS - A Workflow and Document Management SoftwareN2WDMS - A Workflow and Document Management Software
N2WDMS - A Workflow and Document Management SoftwarePranaySoluSoft
 
Db2.security.slides
Db2.security.slidesDb2.security.slides
Db2.security.slidesasderww
 
Database Security - IG
Database Security - IGDatabase Security - IG
Database Security - IGAnne Lee
 
Windows Server 2008 Active Directory Components
Windows Server 2008 Active Directory ComponentsWindows Server 2008 Active Directory Components
Windows Server 2008 Active Directory ComponentsTũi Wichets
 
Compliance
ComplianceCompliance
ComplianceNetBR
 
Lesson - 02 Network Design and Management
Lesson - 02 Network Design and ManagementLesson - 02 Network Design and Management
Lesson - 02 Network Design and ManagementAngel G Diaz
 

Tendances (19)

Windows Server 2003 Administration
Windows Server 2003 AdministrationWindows Server 2003 Administration
Windows Server 2003 Administration
 
Chapter14 Windows Server 2003 Security Features
Chapter14      Windows  Server 2003  Security  FeaturesChapter14      Windows  Server 2003  Security  Features
Chapter14 Windows Server 2003 Security Features
 
Jerry_A_Taylor_Resume
Jerry_A_Taylor_ResumeJerry_A_Taylor_Resume
Jerry_A_Taylor_Resume
 
Microsoft Solution Proposal with AD, Exchange & SC--Bill of Materials
Microsoft Solution Proposal with AD, Exchange & SC--Bill of MaterialsMicrosoft Solution Proposal with AD, Exchange & SC--Bill of Materials
Microsoft Solution Proposal with AD, Exchange & SC--Bill of Materials
 
Final domain control policy
Final domain control policy  Final domain control policy
Final domain control policy
 
DB2 Security Model
DB2 Security ModelDB2 Security Model
DB2 Security Model
 
Chapter02 Managing Hardware Devices
Chapter02      Managing  Hardware  DevicesChapter02      Managing  Hardware  Devices
Chapter02 Managing Hardware Devices
 
EMC Documentum Enterprise Content Management 6.5
EMC Documentum Enterprise Content Management 6.5EMC Documentum Enterprise Content Management 6.5
EMC Documentum Enterprise Content Management 6.5
 
Network service description office 365 dedicated plans april 2012
Network service description office 365 dedicated plans april 2012Network service description office 365 dedicated plans april 2012
Network service description office 365 dedicated plans april 2012
 
Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008
 
jithin
jithinjithin
jithin
 
Overview of Documentum
Overview of DocumentumOverview of Documentum
Overview of Documentum
 
N2WDMS - A Workflow and Document Management Software
N2WDMS - A Workflow and Document Management SoftwareN2WDMS - A Workflow and Document Management Software
N2WDMS - A Workflow and Document Management Software
 
Db2.security.slides
Db2.security.slidesDb2.security.slides
Db2.security.slides
 
Database Security - IG
Database Security - IGDatabase Security - IG
Database Security - IG
 
Windows Server 2008 Active Directory Components
Windows Server 2008 Active Directory ComponentsWindows Server 2008 Active Directory Components
Windows Server 2008 Active Directory Components
 
HMSC_AD Event V3
HMSC_AD Event V3HMSC_AD Event V3
HMSC_AD Event V3
 
Compliance
ComplianceCompliance
Compliance
 
Lesson - 02 Network Design and Management
Lesson - 02 Network Design and ManagementLesson - 02 Network Design and Management
Lesson - 02 Network Design and Management
 

Similaire à IRJET- Research Paper on Active Directory

Microsoft Active Directory.pptx
Microsoft Active Directory.pptxMicrosoft Active Directory.pptx
Microsoft Active Directory.pptxmasbulosoke
 
Activedirecotryfundamentals
ActivedirecotryfundamentalsActivedirecotryfundamentals
ActivedirecotryfundamentalsShekhar Singh
 
29041329 interview-questions-for-server-2003
29041329 interview-questions-for-server-200329041329 interview-questions-for-server-2003
29041329 interview-questions-for-server-2003rafiq123
 
What Is Active Directory Domain Service.pdf
What Is Active Directory Domain Service.pdfWhat Is Active Directory Domain Service.pdf
What Is Active Directory Domain Service.pdfEIHEducation
 
Active directory tools and domain
Active directory tools  and domainActive directory tools  and domain
Active directory tools and domainAxmedXasanh
 
IRJET- Multiple Keyword Search for Encrypted Cloud Storage
IRJET- Multiple Keyword Search for Encrypted Cloud StorageIRJET- Multiple Keyword Search for Encrypted Cloud Storage
IRJET- Multiple Keyword Search for Encrypted Cloud StorageIRJET Journal
 
Active Directory Proposal
Active Directory ProposalActive Directory Proposal
Active Directory ProposalMJ Ferdous
 
What Is Active Directory Domain Service 1.pdf
What Is Active Directory Domain Service 1.pdfWhat Is Active Directory Domain Service 1.pdf
What Is Active Directory Domain Service 1.pdfEIHEducation
 
Active directory interview questions
Active directory interview  questionsActive directory interview  questions
Active directory interview questionsAnand Dhouni
 
Security and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web StudioSecurity and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web StudioAVEVA
 
Please follow the data and description Active Directory In gen.pdf
Please follow the data and description Active Directory In gen.pdfPlease follow the data and description Active Directory In gen.pdf
Please follow the data and description Active Directory In gen.pdfapleathers
 
IRJET- Document Management System, Open Source and Secure
IRJET-  	  Document Management System, Open Source and SecureIRJET-  	  Document Management System, Open Source and Secure
IRJET- Document Management System, Open Source and SecureIRJET Journal
 
Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directorythebigredhemi
 
Microsoft active directory services aliya presentation
Microsoft active directory services   aliya presentationMicrosoft active directory services   aliya presentation
Microsoft active directory services aliya presentationAliya Saldanha
 
Ctive directory interview question and answers
Ctive directory interview question and answersCtive directory interview question and answers
Ctive directory interview question and answerssankar palla
 

Similaire à IRJET- Research Paper on Active Directory (20)

Microsoft Active Directory.pptx
Microsoft Active Directory.pptxMicrosoft Active Directory.pptx
Microsoft Active Directory.pptx
 
Activedirecotryfundamentals
ActivedirecotryfundamentalsActivedirecotryfundamentals
Activedirecotryfundamentals
 
29041329 interview-questions-for-server-2003
29041329 interview-questions-for-server-200329041329 interview-questions-for-server-2003
29041329 interview-questions-for-server-2003
 
Active Directory
Active DirectoryActive Directory
Active Directory
 
What Is Active Directory Domain Service.pdf
What Is Active Directory Domain Service.pdfWhat Is Active Directory Domain Service.pdf
What Is Active Directory Domain Service.pdf
 
Active directory tools and domain
Active directory tools  and domainActive directory tools  and domain
Active directory tools and domain
 
Active Directory
Active DirectoryActive Directory
Active Directory
 
Active directory slides
Active directory slidesActive directory slides
Active directory slides
 
IRJET- Multiple Keyword Search for Encrypted Cloud Storage
IRJET- Multiple Keyword Search for Encrypted Cloud StorageIRJET- Multiple Keyword Search for Encrypted Cloud Storage
IRJET- Multiple Keyword Search for Encrypted Cloud Storage
 
Active Directory Proposal
Active Directory ProposalActive Directory Proposal
Active Directory Proposal
 
What Is Active Directory Domain Service 1.pdf
What Is Active Directory Domain Service 1.pdfWhat Is Active Directory Domain Service 1.pdf
What Is Active Directory Domain Service 1.pdf
 
Active directory interview questions
Active directory interview  questionsActive directory interview  questions
Active directory interview questions
 
70 640 Lesson01 Ppt 041009
70 640 Lesson01 Ppt 04100970 640 Lesson01 Ppt 041009
70 640 Lesson01 Ppt 041009
 
Security and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web StudioSecurity and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web Studio
 
Active Directory
Active Directory Active Directory
Active Directory
 
Please follow the data and description Active Directory In gen.pdf
Please follow the data and description Active Directory In gen.pdfPlease follow the data and description Active Directory In gen.pdf
Please follow the data and description Active Directory In gen.pdf
 
IRJET- Document Management System, Open Source and Secure
IRJET-  	  Document Management System, Open Source and SecureIRJET-  	  Document Management System, Open Source and Secure
IRJET- Document Management System, Open Source and Secure
 
Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directory
 
Microsoft active directory services aliya presentation
Microsoft active directory services   aliya presentationMicrosoft active directory services   aliya presentation
Microsoft active directory services aliya presentation
 
Ctive directory interview question and answers
Ctive directory interview question and answersCtive directory interview question and answers
Ctive directory interview question and answers
 

Plus de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Plus de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Dernier

COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...soginsider
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfRagavanV2
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoordharasingh5698
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 

Dernier (20)

COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 

IRJET- Research Paper on Active Directory

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3579 Research Paper on Active Directory Dr. Shwetav Sharad1, Amit Singh2, Divyanshu3, Abhishek Rai4 1Assistant Professor Department of CSE BBDIT College, Ghaziabad (U.P) 2,3,4Student Department of CSE BBDIT College, Ghaziabad (U.P) ---------------------------------------------------------------------------***--------------------------------------------------------------------------- Abstract - Microsoft’s Active Directory (AD) is a directory service used to store information about network resources across and provides a hierarchal way to the entire network of devices and applications. Active Directory was introduced in windows 2000 server. AD is a central collection of users, groups and computers, enabling single sign-on (SSO) for devices and applications joined to the AD domain. Active directory stores information about network resource such as users, user’s password, groups, network printer and computer and makes the information available to users and administration. Active directory allows administrator to manage centralized management with the help of group policy. When a user logs into a computer that is a member of a window domain, active directory checks the submitted users name and password and allows access to network resource such as network printer and other computer on network. The tools provided by Microsoft that helps to manage the AD services do not offer the capabilities of bulk user, group and computer management. Existing tools provide mechanisms for managing user properties, passwords and group membership in bulk; however, each tool solves an individual problem. In this project. Integrating these tools aids system administrators by providing a single tool to manage multiple components of AD. Key words: Active directory, AD services, Logical Structure, Workgroup, Domain. INTRODUCTION Active Directory is a directory services Microsoft developed for window domain network. Active directory is a directory service used to store information about the network resource across a domain. Active directory includes most of the windows server operating systems as a set of process and service. An active directory (AD) structure is a hierarchal framework of objects. The objects falls into three broad categories resource(printer), service(e-mail), user (accounts or user and group). The active directory information on the objects, organizes the objects, controls access and sets security. Active Directory uses Lightweight Directory Access Protocol (LDAP) versions 2 and 3, Microsoft's version of Kerberos, and DNS. Active Directory allows network administrators to create and manage domains, users, and objects within a network. For example, an admin can create a group of users and give them specific access privileges to certain directories on the server. Before Windows 2000, Microsoft’s authentication and authorization model required breaking down a network into domains, and then linking those domains with a complicated, and sometimes, unpredictable system of one- and two-way trusts. Active Directory was introduced in Windows 2000 as a way to provide directory services to larger more complex environments. ACTIVE DIRECTORY SERVICES Active Directory is a hierarchal structure that stores the information about the objects on the network. An Active directory has major such services as domain service, certificate service, leightweight directory, federation services, rights management. 1. Domain service:- The domain service of active directory stores the centralized data and manages the communication between user and domain. The domain services also includes login authentication and search functionality. The active directory domain services also used as servers role, that allow admin to manage and stores information about the resource network, also helps to manage elements of network and record them in a hierarchy. 2. Certificate Services:- The certificate services of active directory is used to manage, generate and share certificates. Microsoft Active Directory Certificate service is used to provide a platform for managing public key infrastructure certificate. According to Microsoft themselves, AD CS is the “Server Role that allows you to build a public key infrastructure (PKI) and provide public key cryptography, digital certificates, and digital signature capabilities for your organization.” 3. Directory Federation Service:- The Directory Federation Services of Active Directory provides the user for single sign in to authenticate a user in multiple web application in a single session. The federation services works on based upon the federated identity. Also it is a functionality of a window server OS that extends user for a Single Sign On access to application and system outside the corporate firewall.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3580 4. Rights Management :- The Federation management of active directory protects copyrighted information by preventing the unauthorize used and distribution of digital content. The rights management is used as a security tools that provides the persistent data protection by enforcing the data access policy. It uses encryption and a form of selective functionality denial for limiting access to documents such as corporate emails, Microsoft word documents, and, web pages and the operations authorized users can perform on them. LOGICAL STRUCTURE OF ACTIVE DIRECTORY Microsoft Active Directory logical Structures includes the major:- 1. Object 2. Forest 3. Tree 4. Domain 5. Partition The framework that holds the object is viewed at a no. of levels. At the top structure is Forest. Forest is the collection of every objects, its attribute and rule (attribute syntax) in the Active directory. The forest holds one or more transitive trust linked trees. A Tree holds one or more domain and domain tree, again linked in the transitive trust hierarchy. Domains are identified by their DNS name structure, the name space. A domain a single DNS name. The object held within a domain can be grouped into organizational units. Organizational units give a domain a hierarchy ease its administration and can give a semibalance of structure of Active Directory company in organizational or geographical terms. Organizational units can contain OUs includes, domains are container in this sense & can hold multiple nested OUs. Microsoft recommends as few domains possible in AD and relies on organizational unit to produce structure and improve the implementation of policies and administration. FILE NAME OF ACTIVE DIRECTORY File name:- NTDS.DIT Location:- %systemroot%/NDTS/ndts.dit FLEXIBLE SINGLE MASTER OPERATION (FSMO) The FSMO contains major 5 roles 1. Domain naming master:- The domain controller manages the addition and removal of domain in the forest. A forest can have only one domain naming master , which can be transferred to another domain controller through the active directory domain and trust snaps in. 2. Schema Master:- It controls update to the domain schema data. This is one schema master in entire forest. It can be transferred to another domain controller through Active Directory schema master snaps in. 3. PDC Emulator master:- in a mixed 2000 & window NT environment, the PDC emulator master supports BDCs. Thus it manages user account and password change and forward that information to the Window NT BDC. In a native mode window 2000 environment, the PDC emulator master received preference in replication of user account password. Before a login fails, it is checked for updated information. This master role can be transferred to another domain controller through active directory user and computer snaps in. 4. Relative ID Master: A single relative ID master in each domain of a tree manages the allocation of sequential relative ID(RID) to each domain controller. This makes all security ID (SID) created in domain relative to domain
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3581 controller. This master role can be transferred to another domain controller through active directory and computer snaps in. 5. Infrastructure Master: - It is responsible for managing group and user reference. Except a delay in change to user when they are made across domain. Update to other domain are made by the infrastructure master domain controller via a process called master replication. The master role can be transferred to another domain controller through active directory user and computer snaps in. WORKGROUP AND DOMAIN Workgroup is best understood as peer to peer network i.e. each computer is a sustainable on its own. It has its own user list, its own access control and own resources. In order for a user to access resource on another workgroup, computer that exact user must be setup on other computer. Workgroup offer little security outside of basic access control. Window “share permission” are very basic and do not offer any kind of granularity “Who” can access “’ What” etc. Workgroup is used for small business and home use etc. Domain is a trusted group of computer shares security, access control and have data passed down from a centralized domain controller server. Domain controller handles all aspects of granting user permission to login. They are gatekepper. Most domain uses active directory which allows more centralized point for software distribution, user management and computer control. CONCLUSION 1. Describe the role of Active Directory in Windows 2. Describe which Internet standards and technologies supported by Active Directory 3. Describe the naming conventions in Active Directory that you must consider when establishing a Windows 2000 network 4. Describe the logical structure of Active Directory 5. Define the role of domains 6. Define the role of organizational units (OUs) 7. Define the relationship between trees and forests REFRENCES https://en.wikipedia.org/wiki/Active_Directory https://searchwindowsserver.techtarget.com/definition/Active-Directory https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/get-started/virtual-dc/active-directory-domain-services- overview https://www.monitis.com/blog/active-directory-structure/ http://www.tech-faq.com/logical-structure-of-an-active-directory.html https://www.distributednetworks.com/active-directory-administration/module2/active-directoryRole-conclusion.php
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3582 BIOGRAPHIES Amit Singh, Student of BBDIT Ghaziabad pursuing B.Tech in Computer Amit Singh science Engineering. Amit Singh has published two research papers.