Beruflich Dokumente
Kultur Dokumente
RESEARCH ARTICLE
OPEN ACCESS
ABSTRACT
In this paper we have proposed a advanced new approach of active directory techniques which
is used to avoid the security loop holes of an entire organization AD. Active directory is a
concept of Microsoft Servers to maintain the entire organization which is designed with help
of Data structures Tree concept. A group of Tree we can say a forest like that a group of
Computers in an organization also called forest and a group of forest called Active directory.
Microsoft implemented the same concept and they introduced called Active directory and now
there have plenty of versions.
Keywords:- AD, NT, FSO, Domain, Forest
Active Directory, like many informationI. INTRODUCTION
technology efforts, originated out of a
democratization of design using Request for
As per Wikipedia and MSDN, Active
Comments or RFCs. The Internet
Directory (AD) is a directory service that
Engineering Task Force (IETF), which
Microsoft developed for Windows domain
oversees the RFC process, has accepted
networks and is included in most Windows
numerous RFCs initiated by widespread
Server operating systems as a set of
participants. Active Directory incorporates
processes and services.[1][2]
decades of communication technologies into
the overarching Active Directory concept
An AD domain controller authenticates and
then
makes
improvements
upon
authorizes all users and computers in a
them.[citation needed]
Windows domain type networkassigning
and enforcing security policies for all
computers and installing or updating
software. For example, when a user logs into
a computer that is part of a Windows
domain, Active Directory checks the
submitted password and determines whether
the user is a system administrator or normal
user.[3]
Active Directory makes use of Lightweight
Directory Access Protocol (LDAP) versions
2 and 3, Microsoft's version of Kerberos,
and DNS.
ISSN: 2454-5414
www.ijitjournal.org
Page 1
International Journal of Information and Technology (IJIT) Volume 1 Issue 1, Mar-Apr 2015
ISSN: 2454-5414
www.ijitjournal.org
Page 2
International Journal of Information and Technology (IJIT) Volume 1 Issue 1, Mar-Apr 2015
III.
ISSN: 2454-5414
www.ijitjournal.org
Page 3
International Journal of Information and Technology (IJIT) Volume 1 Issue 1, Mar-Apr 2015
ISSN: 2454-5414
www.ijitjournal.org
Page 4
International Journal of Information and Technology (IJIT) Volume 1 Issue 1, Mar-Apr 2015
When DNS is installed Along with AD it is stored in domain partition. But if DNS is installed after
installing AD it is stored in configuration partition
ISSN: 2454-5414
www.ijitjournal.org
Page 5
International Journal of Information and Technology (IJIT) Volume 1 Issue 1, Mar-Apr 2015
IV. CONCLUSION
Thus, we design an efficient method to
secure highly confidential and restricted
areas in Active directory. This method will
be useful not only at present but also in
future based on the next version of Active
directory.
REFERENCE
ISSN: 2454-5414
www.ijitjournal.org
[1] https://msdn.microsoft.com/enus/library/cc723503.aspx
[2] http://en.wikipedia.org/wiki/Active_
Directory
[3] http://sennovate.com/an-overviewof-windows-active-directory/
[4] http://www.ucs.cam.ac.uk/support/wi
ndowssupport/winsuptech/activedir/fsmorol
es
[5] Active
Directory:
Designing,
Deploying, and Running Active
Page 6
International Journal of Information and Technology (IJIT) Volume 1 Issue 1, Mar-Apr 2015
ISSN: 2454-5414
www.ijitjournal.org
Page 7