Book Image

Mastering Active Directory, Third Edition - Third Edition

By : Dishan Francis
5 (2)
Book Image

Mastering Active Directory, Third Edition - Third Edition

5 (2)
By: Dishan Francis

Overview of this book

Mastering Active Directory, Third Edition is a comprehensive guide for Information Technology professionals looking to improve their knowledge about MS Windows Active Directory Domain Service. The book will help you to use identity elements effectively and manage your organization’s infrastructure in a secure and efficient way. This third edition has been fully updated to reflect the importance of cloud-based strong authentication and other tactics to protect identity infrastructure from emerging security threats. Mastering Active Directory, Third Edition provides extensive coverage of AD Domain Services and helps you explore their capabilities as you update to Windows Server 2022. This book will also teach you how to extend on-premises identity presence to cloud via Azure AD hybrid setup. By the end of this Microsoft Active Directory book, you’ll feel confident in your ability to design, plan, deploy, protect, and troubleshoot your enterprise identity infrastructure.
Table of Contents (22 chapters)
20
Other Books You May Enjoy
21
Index

SSL certificates

So far, we have talked about how asymmetric key pairs and symmetric keys work in PKI. But when we talk about PKI, it is the SSL certificates that come to mind. So, what is the role of the certificates?

I travel regularly between London and Seattle. When I reach Seattle-Tacoma International Airport, border security officers ask for my passport to verify my identity. They do not know me personally, but the passport I hold is issued by an authority that operates under international migration laws, and they certify that the person who owns the passport is "Dishan Francis." If they want to check its authenticity, they can confirm with the authority who issued my passport. Once they have confirmed my identity, they can also check the visa status to decide on my entry to the country.

Similarly, when looking at public-key cryptography, we know that a public key can be used by many applications and services. But how exactly can it be published, and how can...