Book Image

Mastering Active Directory, Third Edition - Third Edition

By : Dishan Francis
5 (2)
Book Image

Mastering Active Directory, Third Edition - Third Edition

5 (2)
By: Dishan Francis

Overview of this book

Mastering Active Directory, Third Edition is a comprehensive guide for Information Technology professionals looking to improve their knowledge about MS Windows Active Directory Domain Service. The book will help you to use identity elements effectively and manage your organization’s infrastructure in a secure and efficient way. This third edition has been fully updated to reflect the importance of cloud-based strong authentication and other tactics to protect identity infrastructure from emerging security threats. Mastering Active Directory, Third Edition provides extensive coverage of AD Domain Services and helps you explore their capabilities as you update to Windows Server 2022. This book will also teach you how to extend on-premises identity presence to cloud via Azure AD hybrid setup. By the end of this Microsoft Active Directory book, you’ll feel confident in your ability to design, plan, deploy, protect, and troubleshoot your enterprise identity infrastructure.
Table of Contents (22 chapters)
20
Other Books You May Enjoy
21
Index

PKI in action

In general, we know "encryption" is more secure and that it requires secure sockets layer (SSL) certificates. But the question is, do we really know what the role of a certificate is and how this encryption and decryption works? It is very important to know how these all work, as it makes deployment and management of PKI easy.

Symmetric keys versus asymmetric keys

There are two types of cryptographic methods used to encrypt data:

  • Symmetric keys: Symmetric methods work in exactly the same way as your door lock works. You have one key to lock or open. This method is also known as the shared secret method or private key method. Virtual private network (VPN) connections and backup software are good examples of systems that use symmetric keys to encrypt data.
  • Asymmetric keys: This method, on the other hand, uses a key pair to perform the encryption and decryption. It includes two keys: one is a public key, and the other one is a private...