- Related Products
- ADAudit Plus
- ADSelfService Plus
- EventLog Analyzer
- Exchange Reporter Plus
- AD360
- Log360
Active Directory (AD) is a hierarchical system that provides a database and services to connect users with the necessary network resources for their work. It runs on Active Directory Domain Services, which provides the methods to store the data in the database. The database, or directory, stores vital information about an environment, such as the users and computers present and their permissions. The structure of the AD network components is as follows:
Groups are AD objects that can contain users, computers, and other groups (nested groups). There are two types of groups: security groups and distribution groups. While a security group is used to group users, computers, and other groups to assign permissions to resources, a distribution group is used only to create email distribution lists. The scope of the group can be local, domain local, global, or universal.
A user, in order to log in to a computer or a domain, requires a user account in AD, which establishes an identity for them. Based on this identity, the Windows operating system authenticates the user and grants access to the domain resources. There are two predefined user accounts, administrator and guest, that are used to log in initially to make the necessary configurations.
Similar to user accounts, computer accounts are used to provide necessary authorization to computers for using the network and domain resources. Computer accounts known as local system accounts are highly privileged with access to all resources on the local computer.
The basic security permissions supported by Windows, such as Read, Write, and Full Control, are available to every object within AD. Apart from these standard permissions, AD also provides some special permissions based on the object class, such as List contents, Delete Tree, List Object, Write Self, Control Access, Create Child, Delete Child, Read Property, and Write Property.
These permissions have to be assigned to users or groups to restrict or grant access to AD objects. Assigning permissions to users or groups is referred to as an access control entry.
Permissions set on a container (or a parent object) can be applied to its child objects as well. This is referred to as inherited permissions. The AD security model allows you to define explicit permissions or propagate permissions to child objects. For example, you can specify the following conditions for propagation:
Containers can be any AD components, like a domain or organizational unit, and only objects within those containers can inherit permissions from the parent.
Some commonly used Active Directory terminologies are discussed in the next topic.