Book Image

Mastering Active Directory, Third Edition - Third Edition

By : Dishan Francis
5 (2)
Book Image

Mastering Active Directory, Third Edition - Third Edition

5 (2)
By: Dishan Francis

Overview of this book

Mastering Active Directory, Third Edition is a comprehensive guide for Information Technology professionals looking to improve their knowledge about MS Windows Active Directory Domain Service. The book will help you to use identity elements effectively and manage your organization’s infrastructure in a secure and efficient way. This third edition has been fully updated to reflect the importance of cloud-based strong authentication and other tactics to protect identity infrastructure from emerging security threats. Mastering Active Directory, Third Edition provides extensive coverage of AD Domain Services and helps you explore their capabilities as you update to Windows Server 2022. This book will also teach you how to extend on-premises identity presence to cloud via Azure AD hybrid setup. By the end of this Microsoft Active Directory book, you’ll feel confident in your ability to design, plan, deploy, protect, and troubleshoot your enterprise identity infrastructure.
Table of Contents (22 chapters)
20
Other Books You May Enjoy
21
Index

Active Directory Certificate Services

The two-man rule in security is used to secure high-valued assets and operations. As an example, many banks provide safe deposit box facilities. People can rent safe deposit boxes to store valuable assets. Most of these safe deposit boxes are designed to support a two-man rule. This means that each safe deposit box has two locks. One key to the lock is held by the bank, and another key for a second lock is issued to the customer. To open it, customers and bank agents need to use their keys at the same time. When a customer shows up at the bank, there is a process to follow to get access to safe deposit boxes. Banks will verify the customer's identity first. They will ask for a passport or driving license to verify the customer's identity. Following successful verification, the bank will assign a member of staff to go with the customer and open the box using the bank's and the customer's keys. The end goal of these layers...