Pricing  Get Quote
 
 

How does AD authentication work?

  • Created: 18 Oct 2024
  • Last updated on: 18 Oct 2024

Learning how the AD authentication mechanism works is crucial to understand how network security and access controls are maintained in a Windows environment. This process involves numerous steps to ensure that the identity of the users and devices are verified before they are given access to the network resources.

Kerberos and LDAP authentication protocols form the crux of AD authentication. These protocols play an important role in verifying the credentials and managing access permissions. At the grass-root level, AD authentication works by verifying credentials against the information stored in the AD server and utilizing these protocols to facilitate the secure transmission of data between the end user and the AD server. These protocols are further explained in depth below.

Kerberos protocol

A flowchart depicting the AD authentication process using Kerberos protocol.
Fig. 1: A flow diagram of AD authentication using Kerberos protocol

The Kerberos protocol comprises the server, the client, and the key distribution center (KDC). The KDC itself comprises two servers, authentication server (AS) and ticket granting server (TGS).

Kerberos protocol serves two functions: granting tickets (the process of issuing tokens that prove the identity of a user or service for granting access to resources in a network) and authentication. If a user would like to gain access to the organization's resources, they would have to get authenticated from the KDC first.

AD authentication using the Kerberos protocol occurs in three phases:

  1. When a user attempts to log in with their known user credentials, the client sends an encrypted request to the AS for issuing a token known as ticket granting ticket (TGT). Upon receiving this request, the AS decrypts the request using a secret key that it shares with the client, derived from the user's stored credentials. After decrypting this request, the AS issues a TGT encrypted with the user's password.
  2. The client sends this TGT to the TGS to get a service ticket.
  3. The client uses this service ticket to request access from the target server (application layer) that checks the validity of the service ticket using a key shared with the TGS. If valid, the target server allows the client to access the resources for a particular duration (session). The validity of the session can be tweaked according to the organizational policies.

Kerberos protocol relies on time sync between the client and the server. This makes it susceptible to replay attacks if the time set in the client and the server are not in sync with each other. An attacker that is able to gain rogue access to the KDC, can issue fake tickets and obtain access to resources.

LDAP protocol

LDAP is an open source, cross platform protocol used to communicate with various directory services such as AD. AD utilizes LDAP for both intra directory communication and to connect with applications outside the network. Authentication using the LDAP protocol can be achieved either by using simple authentication or simple authentication with a secure layer (SASL).

In simple authentication, the credentials entered by the user are used to raise a bind request to the server for authentication. This is just one of the ways by which authentication is performed in simple authentication. In addition, it also supports unauthenticated and anonymous authentication requests to the organizational resources.

On the other hand, SASL works in tandem with other security protocols such as Kerberos for authentication. SASL is more secure as the second security protocol serves as an additional layer during the authentication process. The highlight of SASL is that the authentication process is not dependent on the protocols supported by the application. Due to this, any security flaw in the application protocols is less likely to affect the authentication process.

The data packets transmitted during the authentication process are unencrypted. This makes authentication using LDAP vulnerable to man-in-the-middle (MitM) and eavesdropping attacks. To make security concerns even worse, MFA methods are not supported by the LDAP protocol.

Reinforce Active Directory authentication with adaptive MFA

ManageEngine ADSelfService Plus offers adaptive MFA with 20 different authentication factors, including passcode authentication. MFA can be deployed to enhance security across a variety of applications and systems, whether on-premises or in the cloud. This includes securing endpoints, such as applications, machines, VPNs, OWA, and self-service password management tasks. Using ADSelfService Plus, administrators can customize the MFA process based on users' organizational unit and group memberships. This flexibility allows you to enable passcode authentication for non-privileged users and systems when quick access is of priority. You can enable higher assurance authenticators for tighter security measures, particularly for privileged accounts, helping to mitigate the risks posed by cyberthreats.

Implement adaptive MFA techniques using ADSelfService Plus.

Explore now

You may also like

  • Maximize endpoint security with adaptive MFA

    Maximize endpoint security with adaptive MFA

    Read more
     
  • NIST password guidelines vs current industry practices

    NIST password guidelines vs current industry practices

    Read more
     
  • RDP and VPN access to sensitive resources

    The essential guide to securing RDP and VPN access to sensitive resources

    Read more
     

FAQs

What are the most commonly used authentication protocols in Active Directory?

The most commonly used authentication protocols in AD are Kerberos and LDAP. Kerberos utilizes a ticket based system to securely authenticate users without sending passwords over the network. On the other hand, LDAP is used both for directory access and authentication and is often secured with LDAP over SSL (LDAPS).

What is the default authentication protocol used in Active Directory?

Kerberos is the default authentication protocol used in AD. Kerberos utilizes a ticket based system to securely authenticate users without sending passwords over the network.

What is the full form of LDAP?

Lightweight directory access protocol (LDAP) is used both for directory access and authentication. The LDAP protocol is often secured with LDAP over SSL (LDAPS).

Is AD the same as LDAP authentication?

No, they are not the same. AD refers to a directory server which stores user information like email ID and phone number while LDAP refers to the protocol used for both directory access and authentication. The LDAP protocol is often secured with LDAP over SSL (LDAPS).

ADSelfService Plus also supports

  •  

    Adaptive MFA

    Enable context-based MFA with 19 different authentication factors for endpoint and application logins.

    Learn more  
  •  

    Enterprise single sign-on

    Allow users to access all enterprise applications with a single, secure authentication flow.

    Learn more  
  •  

    Remote work enablement

    Enhance remote work with cached credential updates, secure logins, and mobile password management.

    Learn more  
  •  

    Powerful integrations

    Establish an efficient and secure IT environment through integration with SIEM, ITSM, and IAM tools.

    Learn more  
  •  

    Enterprise self-service

    Delegate profile updates and group subscriptions to end users and monitor these self-service actions with approval workflows.

    Learn more  
  •  

    Zero Trust

    Create a Zero Trust environment with advanced identity verification techniques and render your networks impenetrable to threats.

    Learn more  
×

Fill this form todownload the solution brief

  •  
  • By clicking 'Download PDF' you agree to processing of personal data according to the Privacy Policy.

Thank You!

You'll be receiving the savings report in your inbox shortly.

Self-service password reset tool for Active Directory users

Email Download Link