Active Directory Management Tool
|
|
|
- Marcus Gibbs
- 10 years ago
- Views:
Transcription
1 Active Directory Management Tool GRADUATE PROJECT REPORT Submitted to the Faculty of the School of Engineering and Computing Sciences Texas A&M University - Corpus Christi Corpus Christi, Texas In Partial Fulfillment of the Requirements for the Degree of Master of Science in Computer Science by Bradley R. Hannah Spring 2015 Committee Members Dr. Dulal Kar Committee Chairperson Dr. Longzhuang Li Committee Member
2 ABSTRACT Microsoft s Active Directory (AD) services provide methods of unifying an entire network of devices and applications. AD is a central collection of users, groups and computers, enabling single sign-on (SSO) for devices and applications joined to the AD domain. However, the tools provided by Microsoft that helps to manage the AD services do not offer the capabilities of bulk user, group and computer management. Existing tools provide mechanisms for managing user properties, passwords and group membership in bulk; however, each tool solves an individual problem. In this project, the Active Directory Management Tool (ADMT) combines several of these mechanisms into a single application. Integrating these tools aids system administrators by providing a single tool to manage multiple components of AD. Additionally, this tool manages group membership based on a user s role within a business. This will aid system administrators in defining the level of access that a particular person with a given business role should have. Also, the tool includes a logical filter. Microsoft s tools include a filter that utilizes an object s string attributes to determine if the attribute s value contains a specified phrase. The logical filter proposed will allow system administrators to utilize additional attributes to determine if the attribute s value falls within a certain range. ii
3 TABLE OF CONTENTS ABSTRACT... ii TABLE OF CONTENTS... iii LIST OF FIGURES... vi LIST OF TABLES... viii 1. BACKGROUND AND RATIONALE Active Directory Uses of Active Directory Prior Work Microsoft s Active Directory Solutions SolarWind s Active Directory Solutions WiseSoft s Active Directory Solutions ManageEngine s Active Directory Solutions NARRATIVE Problem Statement Motivation Parent Objective Functionalities of the Project Bulk Management Logical Filtering Role Based Group Membership PROPOSED SYSTEM DESIGN iii
4 3.1 Environment Lightweight Directory Access Protocol NET Framework Classes DirectoryEntry Class DirectoryEntryConfiguration Class DirectorySearcher Class SearchResult Class DirectoryServicesCOMException Class DirectoryContext Class Domain Class PrincipalContext Class UserPrincipal Class GroupPrincipal Class ComputerPrincipal Class ActiveDirectorySecurity Class ActiveDirectoryAccessRule Class File Formats Import Files Dictionary File Filters File Implementation and Results Authenticating to the Domain Building the Tree iv
5 4.3 Object Management Adding Objects Deleting Objects Adding Members to a Group Based on Business Roles Filtering Grouping Testing and Evaluation Testing Testing Bulk Operations Testing Group Management via Business Roles Testing Filters Error Handling User Evaluations Conclusion and Future Work BIBLIOGRAPHY AND REFERENCES v
6 LIST OF FIGURES Figure 1.1. Desktop Operating System Market Share (NetMarketShare 2015)... 1 Figure 3.1. Distinguished Name for the User JSmith (Object Naming 2015) Figure 4.1. Active Directory Management Tool s Login Interface Figure 4.2. Visual Representation of Active Directory s Structure Figure 4.3. Dialog For Adding a Single User Figure 4.4. Results of Importing a List of Users Figure 4.5. Accidental Deletion Protection Prompt Figure 4.6. Results of Deleting Multiple Objects Figure 4.7. Job Title Manager Figure 4.8. Resulting Group Memberships Due to Job Title Assignment Figure 4.9. Filter Manager Figure Filter Editor Figure Grouping Similar Objects Figure 5.1. Sample CSV File for Importing Users Figure 5.2. Sample CSV File for Importing Groups Figure 5.3. Sample CSV File for Importing Computers Figure 5.4. Result of the Importing the Sample Users CSV File Figure 5.5. Result of Importing the Sample Groups CSV File Figure 5.6. Result of Importing the Sample Computers CSV File Figure 5.7. Display of All Imported Active Directory Objects Figure 5.8. Result of Deleting Active Directory Objects in Bulk Figure 5.9. Job Title Manager Figure Result of Assigning the Computer Science Professor Job Title Figure Result of Assigning the Math Professor Job Title Figure Filter Manager Figure Filter Editor vi
7 Figure Results of Filter with Flat View Enabled Figure Logon Using the Wrong Domain Name Figure Logon Using the Wrong Username Figure Attempting to Add Users with No Information Figure Adding Blank Job Titles Figure Adding a Job Title with a Duplicate Name Figure Message Displayed When No Users Are Selected for Job Titles Figure Filters Are Not Allowed to Have Blank Names Figure Filters Are Not Allowed to Have Duplicate Names vii
8 LIST OF TABLES Table 5.1. User Friendliness Evaluation viii
9 1. BACKGROUND AND RATIONALE 1.1 Active Directory As shown below in Figure 1.1, Microsoft's Windows operating system is used widely throughout industry. Companies use Microsoft's Active Directory (AD) service to make single sign-on (SSO) available in company networks and to provide a central point for user and computer management. AD considers users and computers as objects, where each object is contained in a tree structure built using organizational units (OU). Users and computers are also members of groups within AD, and computers are also assigned to a site that represents a local area network (LAN). Based either on OU, group, or site membership, AD provides mechanisms for securing the company's network. However, the tools Microsoft provides for managing users and membership to OUs, groups or sites do not allow system administrators to perform tasks in bulk. To perform bulk operations, system administrators currently must create their own batch and PowerShell scripts utilizing AD commands and commandlets. Figure 1.1. Desktop Operating System Market Share (NetMarketShare 2015) The goal of this project is to implement a management tool for AD that allows system administrators to perform bulk operations. The proposed solution would aid 1
10 system administrators in determining objects that may need attention by filtering based on specified attributes, such as: PasswordLastSet and LastLogonTimeStamp. As a person's role within a company changes, their access to company systems and services also change. Taking advantage of an attribute available in each user's AD profile, this project proposes a method of managing group membership based on each user's business role. System administrators would be tasked to create a dictionary defining the group membership that each business role would be provided Uses of Active Directory AD is a specialized database that is able to operate as a control mechanism to allow or disallow users access to the following within a company's network: Windows services, such as: application services, file shares, print services, Hyper-V virtual environments, terminal services, simple network management protocol (SNMP) monitoring, telnet, file transfer protocol (FTP) services, virtual private network (VPN) services, and more Microsoft services, such as: Microsoft SQL (MSSQL) Server, SharePoint, Lync, OneNote, Azure's cloud services, Exchange, Visual Studio's Team Foundation services, and more Wireless networks with WPA2-Enterprise Remote Authentication Dial In User Service (RADIUS) authentication Management consoles for networking equipment enabled with Authentication, Authorization, and Accounting's (AAA) RADIUS authentication Confidential section of the company's website 2
11 A Microsoft Windows or UNIX based machine that is joined to the AD domain 1.2 Prior Work Microsoft has developed tools to manage AD, however, realizing the shortcomings of these tools provided by Microsoft, various companies have developed their own tools to offset the shortcomings. Companies such as SolarWinds, ManageEngine and WiseSoft have created tools that are capable of performing individual tasks within AD, such as: computer and user account auditing, bulk user management, password management, and more (ManageEngine 2015, SolarWinds 2015, WiseSoft 2015). The disadvantages of current solutions are that most tools provide a means of accomplishing an individual task, and each company s collection of tools does not integrate with each other Microsoft s Active Directory Solutions Microsoft provides GUI-based tools for managing different components within AD, such as users, computers, groups, group policies, sites, domains, forests, trusts, and certificates. The tools provided by Microsoft are called Active Directory Users and Computers, Active Directory Domains and Trusts, Active Directory Sites and Services, Certificate Authority and Group Policy Management. Each component may also be managed using the Windows command line or PowerShell commandlets, which also allows system administrators to script an operation that needs to be performed within the AD environment. 3
12 Active Directory Users and Computers is the tool Microsoft provides to manage AD objects. It allows system administrators to add or remove objects such as users, contacts, printers, computers, shared folders and groups. System administrators may also use this tool to manage group membership or the structure of AD. It offers filtering functionality that accepts multiple constraints to identify AD objects that have attributes containing a given string value SolarWind s Active Directory Solutions SolarWinds has several tools for managing AD, including Inactive User Account Removal Tool, Inactive Computer Account Removal Tool and User Import Tool. The Inactive User Account Removal tool allows system administrators to identify users that have been inactive for a given period of time, and remove the inactive users. The Inactive Computer Account Removal Tool is similar, however, it can identify and remove computers that are a specified age or older. The User Import Tool reads a CSV file and creates users based on the specified attributes WiseSoft s Active Directory Solutions WiseSoft s solutions include applications, such as Account Management Spreadsheet, Bulk AD Users and Password Control. Similar to SolarWind s applications, these tools have individual purposes. Account Management Spreadsheet, for example, allows system administrators to create AD user accounts in bulk. The Bulk AD Users tool can also perform bulk user account creation in addition to other bulk tasks, such as: password reset, password generation, user account deletion and the modification of user attributes. Password Control provides help desk employees a method of resetting a user s 4
13 password, enabling or disabling the user s account or forcing the user to change their password at next logon ManageEngine s Active Directory Solutions ManageEngine has created a software program called ADManager Plus, a single application to assist system administrators with a vast array of AD management tasks. The application is capable of performing bulk tasks, such as AD object creation, and AD object modification. These tasks include adding a list of users to a group in bulk, creating computer accounts and modifying user attributes. Individual filters may be applied to identify AD objects that meet specific criteria. For example, a filter can be applied to identify users that have dial-in access to the network. 5
14 2. NARRATIVE 2.1 Problem Statement As mentioned earlier, current solutions do not integrate with each other in order to manage users, groups and computers within AD. ManageEngine s ADManager Plus does provide a vast array of functionality for system administrators; however, the filters provided by ManageEngine cannot be combined. For example, if a system administrator wanted to identify users that have been inactive for ninety days and currently have expired accounts, two separate reports would have to be generated. The system administrator would have to review the reports for any users that are found in both reports in order to identify the users that have inactive and expired accounts. One solution to get around this problem is to use scripts. For example, a PowerShell script could be written to take in the reports generated by ManageEngine and perform an administrative task. The script could also be written to perform the desired filtering without the use of ManageEngine s tool. This, however, requires that the system administrator creates the required scripts. System administrators are not always fluent in a scripting language. If an inexperienced system administrator writes a script with little knowledge of the scripting language, he/she may cause damage to the AD service. When managing users and groups, system administrators typically create groups to represent business roles that users would perform. Although this method provides the desired outcome, the AD structure becomes cluttered with these groups as these groups are mixed in with other groups that are not named after business roles. Also, not every business role could be associated with more than a single user, which would eliminate the 6
15 need for a group related to that business role. Additionally, when groups are created as business roles, auditing access to systems can become a challenge as it adds an additional layer that the system administrator or security administrator must trace to determine which users have access to which systems. The ADMT eliminates the need for groups that represent business roles by instead using the AD attribute to associate a user with a set of groups. This technique is also beneficial as it allows system administrators to identify the group memberships that are necessary to perform a given duty. For instance, the user jdoe is a programmer for a company, however, jdoe also participates in the company s research practices. As a result, jdoe belongs to the programmer and research groups. When jdoe leaves the company, jsmith is hired to take jdoe s place, however, jsmith does not need access to the research group. In similar scenarios, system administrators currently identify the group memberships that the previous user had, and attempts to determine the group memberships that the new user will need based on the previous user. The ADMT prevents human error in identifying necessary group memberships, therefore, increasing system security using the principal of least privilege. 2.2 Motivation System and security administrators have an assortment of tools to perform various AD management tasks. The tools provided by Microsoft are not always adequate for the task at hand, leaving potentially inexperienced system and security administrators to write their own scripts. System and security administrators may also download an 7
16 application to perform the task, and in some instances, multiple applications may be required to complete the given task. 2.3 Parent Objective The ADMT integrates bulk user, group and computer creation with logical filtering components, allowing system administrators to filter for users or computers that meet specified constraints, and then perform a task on the resulting objects in bulk. The ADMT also allows system administrators to create a dictionary defining each business role s group membership. When a user is assigned to a particular business role, the user will automatically be added to the corresponding groups that the business role is defined to be a member of. 2.4 Functionalities of the Project One goal of the ADMT is to mimic the interface used by Microsoft s Active Directory Users and Computers since this is the standard utility for managing AD. This will decrease the learning curve necessary for understanding how to use the ADMT. The ADMT goes beyond the standard utility by creating bulk user, group and computer management functionality. As well, the tool has a logical filter that is able to base comparisons on more than string comparisons, but also integer, date, time and boolean comparisons. Finally, this tool simplifies the process of managing group membership by allowing a system administrator to specify the business role that a user performs in order to manage the groups that the user is a member of Bulk Management 8
17 At times, system administrators must perform a single task to a collection of AD objects. With the ADMT, system administrators are able to select a collection of user accounts, and with the click of a button change the password of each of the selected user accounts. If a collection of computers are located at a single physical site, the attribute in AD specifying the physical location could be modified for each computer within the collection Logical Filtering The filter provided in Active Directory Users and Computers is only capable of performing string comparisons, such as equal to, begins with, ends with and contains. The logical filter in ADMT allows system administrators to perform comparisons on strings as well as integers, dates, times and boolean values, then specify the comparison operator, such as: less than or equal to or greater than or equal to. For example, the logical filter allows system administrators to perform tasks such as filter for users that have not signed-in within the past ninety days. In comparison to the filters provided by ManageEngine, the logical filter in the ADMT allows multiple filters to be applied. Building on top of the previous example that allowed a system administrator to filter for users that have not signed-in within the past ninety days, an additional filter may then be applied to determine which of those users accounts have expired. The system administrator may then choose to delete each of the user accounts Role Based Group Membership Each user object has an attribute used for describing the business role that the person has within the company. This field is commonly unused; however, the ADMT 9
18 uses this field to store the dictionary word describing the business role. The business role, having been predefined by a system administrator, will specify the groups that a user with a given role should be a member of. When a system administrator changes a user s business role via the ADMT, the tool will add the user to his/her new groups based on the definition provided in the dictionary without removing the user from his/her current group memberships. 10
19 3. PROPOSED SYSTEM DESIGN 3.1 Environment During development of the ADMT, an AD server was required in order to have a functioning service to test against. Microsoft has built the AD service into their Windows Server line of products, requiring the use of a Windows Server operating system. For this project, Windows Server 2008 and Windows Server 2012 were used. The Windows Server operating system was installed in a virtual environment using VMware Workstation. VMware provides the ability to take snapshots, allowing quick and easy restoration in case of any potential malfunction. Additionally, the ADMT was built using the C# programming language. C# is built on top of Microsoft s.net Framework, which provides deep access into the Windows environment..net Framework version 4.5 was used for this project, and as an IDE, Visual Studio was used for the development of the program as it provides debugging features for C# development. 3.2 Lightweight Directory Access Protocol The Lightweight Directory Access Protocol (LDAP) is used to access the AD database. An LDAP query requests a particular AD object by specifying the object s common name (CN), organizational unit (OU) and domain controller (DC) in that order. The purpose for these objects being in the order of CN, followed by OU, then followed by DC is due to how AD is structured. In AD, CN objects can be contained in either an OU or a DC object. OU objects are contained within either OU or DC objects. DC 11
20 objects may only be contained within other DC objects. When the names of these objects are combined, the central object s distinguished name is created. In Figure 3.1, the distinguished name for the user object, JSmith, is created. Figure 3.1. Distinguished Name for the User JSmith (Object Naming 2015) As shown above, the resulting distinguished name for user JSmith is CN=JSmith,OU=Promotions,OU=Marketing,DC=noam,DC=reskit,DC=com. Using the distinguished name, it is possible to create an LDAP query to then perform various tasks on the user s account. 3.3.NET Framework Classes Microsoft s.net Framework has a multitude of classes available for C# developers, including several classes for AD programming. The following are classes necessary for the ADMT DirectoryEntry Class The DirectoryEntry class is used to perform LDAP queries against the AD service. The constructor accepts the distinguished name of the object to be queried, the username, the password and the authentication type, such as anonymous or secure 12
21 (AuthenticationTypes 2015). When an instance is created, the instance object contains some, but not all, attributes related to the queried AD object. Additional attributes can still be accessed or modified using the instance object by utilizing functions built-in to the DirectoryEntry class (DirectoryEntry 2015) DirectoryEntryConfiguration Class Using the DirectoryEntryConfiguration class, it is possible to modify search options that are not related to the query. For instance, to ensure a secure method of communication is being used to send the password to the server, the DirectoryEntryConfiguration property PasswordEncodingMethod can be set to PasswordEncodingSsl (DirectoryEntryConfiguration 2015). If the DirectoryEntry instance has already specified similar options when it was initialized, the options do not have to be set using the DirectoryEntryConfiguration class DirectorySearcher Class The DirectorySearcher class makes basic filtering possible. This class allows AD object attributes to be compared to user specified values. If the user does not need all attributes associated with each object with matching values, the DirectorySearcher can request specific attributes to be returned from the query. The query results will contain all objects and their attributes that match the specified constraints (DirectorySearcher 2015) SearchResult Class When a query is placed using an instance of the DirectorySearcher class, the query results are returned as a SearchResultCollection object, similar to an array. Each individual result in the collection is a SearchResult item. The elements of the collection 13
22 may be used to create a DirectoryEntry instance of the matched item, thus, allowing access to the matched item s attributes (SearchResult 2015) DirectoryServicesCOMException Class When an error occurs while attempting to access an AD object, an exception is thrown. The exception is a subset of the DirectoryServicesCOMException class. The exception contains extended information about the error that occurred and provides details to trace the issue (DirectoryServicesComException 2015) DirectoryContext Class In order to access additional attributes related the AD domain, an instance of the DirectoryContext class must first be created. For the purpose of the project, the DirectoryContext would be configured to operate in a domain as a given user; however, this class could also be configured to operate on an AD forest or directory server (DirectoryContext 2015) Domain Class The Domain class represents the AD domain that would be managed by the ADMT. To identify the domain, an instance of the DirectoryContext class is utilized. The instance of the Domain class is then be used to gain additional information regarding the domain (Domain 2015) PrincipalContext Class The PrincipalContext class is used to provide principal objects (i.e., UserPrincipal, GroupPrincipal, ComputerPrincipal and Principal) a context in which they can operate (PrincipalContext 2015). In order to access objects within AD, the context is set for the AD domain. This is specified using the ContextType enumeration (ContextType 2015). 14
23 3.3.9 UserPrincipal Class The UserPrincipal class offers access to a user object and its attributes. This also provides functionality to change a user s password, force a user s password to expire, determine group memberships, delete a user, get a DirectoryEntry instance of the user, and more. Instances of this class utilize an instance of the PrincipalContext class to determine the context in which it should operate (UserPrincipal 2015) GroupPrincipal Class Similar to the UserPrincipal class, the GroupPrincipal class offers access to a group object and its attributes. This also provides functionality to determine the groups that a group is a member of, enumerate the current members of a group, add members to a group, delete a group, get a DirectoryEntry instance of a group, and more. Instances of this class also utilize an instance of the PrincipalContext class to determine the context in which it should operate (GroupPrincipal 2015) ComputerPrincipal Class The ComputerPrincipal class offers access to a computer object and its attributes. This also provides functionality to determine a computer s group memberships, delete a computer, get a DirectoryEntry instance of a computer, and more. Instances of this class also utilize an instance of the PrincipalContext class to determine the context in which it should operate (ComputerPrincipal 2015) ActiveDirectorySecurity Class Each object in AD has an access control list associated with it that controls the level of access necessary to view, modify or delete the object. An instance of the ActiveDirectorySecurity class can be obtained from a DirectoryEntry instance. This is 15
24 used to then determine the effective permissions associated with an object in AD (ActiveDirectorySecurity 2015) ActiveDirectoryAccessRule Class An ActiveDirectoryAccessRule is an individual access control list entry obtained from an instance of the ActiveDirectorySecurity class. This is used to identify and delete existing access control list entries that prevent object deletion (ActiveDirectoryAccessRule 2015). 3.4 File Formats In the ADMT, there are several instances where files would be utilized. When a user imports a list of users, groups or computers, a comma separated value (CSV) file is used. The dictionary defining business roles is stored using a custom format, and the filters are saved in a binary format Import Files When importing a list of group or computer objects to be created by the ADMT, the CSV file only requires a single column containing the name of the object. The CSV file for users, however, requires the following columns: username, first name, last name, password, the true or false value if the user must change their password at next logon, the true or false value if the user cannot change their password, the true or false value if the password never expires and the true or false value if the user s account is disabled. For instance, the user John Smith may have the following configuration: Username: jsmith First Name: John Last Name: Smith Password: Password1! 16
25 User Must Change Password at Next Logon: False User Cannot Change Password: False Password Never Expires: True Account is Disabled: False The following is an example line using the CSV format that would create the user John Smith from the parameters above: jsmith,john,smith,password1!,false,true,false,false Dictionary File The dictionary for business roles uses a similar format to CSV files. The dictionary term, A.K.A. the business role, is separated from its definition(s), A.K.A. the group memberships, by a colon. Each individual group membership is separated by a comma. For example, the dictionary term CS Professor may need to be a member of the groups Domain Users, Development Server and CSLab. In the dictionary file, this entry would be represented by the following line: CS Professor:Domain Users,Development Server,CSLAB Filters File Filters are saved using an instance of the BinaryFormatter class. This class can serialize and deserialize any object in a binary format (BinaryFormatter 2015). This allows the ADMT to save the data directly from an instance of an object to a file, and read the file back into an instance of the same object. 17
26 4. Implementation and Results 4.1 Authenticating to the Domain As users of this tool perform various tasks, their domain level credentials are necessary to access AD. These credentials are obtained from the user in the form shown in Figure 4.1, which is displayed when the program begins execution. Figure 4.1. Active Directory Management Tool s Login Interface When the user clicks the Login button, the form information is used to create an instance of a DirectoryEntry object, as shown in the code snippet below. However, the AD server is not queried until the program attempts to get the Name value for the DirectoryEntry instance. If this query fails, a catch statement will be able to determine the reason, and the program will make the user aware of the error so that the user may resolve the issue. DirectoryEntry direntry = new DirectoryEntry( "LDAP://" + Domain, Username, Password, AuthenticationTypes.Secure); 18
27 string dirname = direntry.name; 4.2 Building the Tree The AD structure is similar to that of a tree. To give users a visual representation of this tree, AD is recursively queried to obtain a listing of each AD object and its children objects. As shown in the code segment below, each AD object is checked for child objects. Every child object is added to the list of child nodes, and then its information is forwarded to the recursive function, getadobjects, to query if it has any children of its own. DirectoryEntry direntry = new DirectoryEntry( "LDAP://" + DomainName, User, Pass, AuthenticationTypes.Secure); foreach (DirectoryEntry x in direntry.children) { Tree node = new Tree( x.path.tostring().split('/').last(), DomainName, x.schemaclassname); ADObjs[0].childNode.Add(node); } getadobjects(ref node, x.path.tostring().split('/').last()); After the logical tree is built, it is possible to create the visual representation of this tree structure, as illustrated in the left portion of Figure 4.2. Since users managing AD services are familiar with Microsoft s Active Directory Users and Computers management interface, a similar design was followed in the making of this tool. As demonstrated in Figure 4.2, in the visual representation of the tree structure, it would 19
28 appear that the selected AD object, Users, does not have any child objects. However, the right portion of Figure 4.2 lists a number of children that exist under the Users container. In AD, there are six object types that are considered to be leaf objects: computers, contacts, groups, printers, users and volumes. Since these are leaves, these objects are not represented in the visual tree structure, similar to how Microsoft has designed Active Directory Users and Computers. Figure 4.2. Visual Representation of Active Directory s Structure 4.3 Object Management This tool provides the user the ability to manage objects in AD. Several functions include adding objects, deleting objects and adding members to a group. The ADMT utilizes a dictionary of business roles to manage group memberships Adding Objects When adding an object, such as a user, group or computer, the user has the ability to add a single object, as shown in Figure 4.3. The user also has the ability to import a list of objects from a CSV formatted file, as illustrated in Figure 4.4. After adding an object, a status message is provided notifying the user of any issues. This can be seen in the left column of the grid shown in Figure
29 Figure 4.3. Dialog For Adding a Single User Figure 4.4. Results of Importing a List of Users 21
30 A function has been created to handle the creation of each kind of object. This function has been designed to build each object in a similar fashion to how the object would normally be created within AD. For example, when adding an object, the snippet of code below is used: direntry.children.add(objectname, objecttype); However, if the object being added were a computer, the samaccountname attribute associated with the computer object should be the object s name followed by the $ symbol. This can be assigned using an instance of the ComputerPrincipal class that is associated with the new computer object. User objects also have additional attributes that must be set, and similar to computer objects, these attributes can be set using an instance of the UserPrincipal class that is associated with the new user object. Below is a sample of code demonstrating how these attributes are modified using an instance of a UserPrincipal named useraccount. useraccount.samaccountname = username; useraccount.givenname = firstname; useraccount.surname = lastname; Deleting Objects As opposed to the add function, this tool allows the user to delete any object in AD, not just users, groups and computers. The user can delete a single object or multiple objects at once. The code snippet below demonstrates how an object is deleted by getting two instances of the DirectoryEntry class, the first for the parent of the object being deleted and the second is for the object itself. The object is then removed from the list of the parent s children, thus, deleting the object from AD. DirectoryEntry direntry = new DirectoryEntry( 22
31 LDAPPath_Container, username, password, AuthenticationTypes.Secure); DirectoryEntry object = new DirectoryEntry( LDAPPath_Object, username, password, AuthenticationTypes.Secure); direntry.children.remove(object); Objects can be protected from accidental deletion in AD. To verify if the user wants to delete the object, a prompt is provided, as shown in Figure 4.5. If the user chose to delete a single object, a message box will appear with the status of the deletion process. Otherwise, a window will appear with the statuses of each deleted object, as shown in Figure 4.6. Figure 4.5. Accidental Deletion Protection Prompt 23
32 Figure 4.6. Results of Deleting Multiple Objects Adding Members to a Group Based on Business Roles Groups are maintained in the ADMT by assigning job titles to users. Before a job title can be assigned, the Job Title Manager must be used to define the group memberships associated with a job title. As shown in Figure 4.7, the New Job Title field is used to create a common phrase that represents a business role. To prevent duplicate entries, the Job Title Manager will not allow job titles with the same name to be added. Once a job title has been added, the user can associate groups with the job title. 24
33 Figure 4.7. Job Title Manager The ADMT can then be used to assign a job title to a user. This process will join the user to the groups associated with the job title. The window shown in Figure 4.8 will provide the status of joining each user to each group after the assignment of job titles. 25
34 Figure 4.8. Resulting Group Memberships Due to Job Title Assignment 4.4 Filtering Filters can be can be created using the Filter Manager shown in Figure 4.9. This window gives the user the ability to flatten the view of the tree structure. In other words, this allows the user to see all AD objects, excluding those that are filtered out, in a single list. The user can deselect the Flat View box to return to the tree structure. To use the flat view, the scope of the filtering performed on the domain is set to Subtree as shown in the code snippet below. dirsearcher.searchscope = SearchScope.Subtree; When the user switches back to the tree structure, the scope of the filtering is set to OneLevel as shown below in the code snippet. dirsearcher.searchscope = SearchScope.OneLevel; 26
35 The user also has the ability to create a new filter and provide it with a name to easily derive the filter s purpose. Figure 4.9. Filter Manager The filter is then edited, as shown in Figure 4.10, so that the user can place constraints on the displayed AD objects. The purpose of the filter shown in Figure 4.10, for example, is to limit the objects displayed in ADMT to only the users that were last logged into the domain between April 20, :00:00 AM and April 20, :59:59 PM and the computers that were last logged into between April 20, :00:0 AM and April 20, :59:59 PM. 27
36 Figure Filter Editor When the example filter above is applied, the LDAP filter is generated. This filter would be written using prefix notation, as follows: ( (&(objectcategory=user)(lastlogon>= )(lastLogon<= ))(&(objectCategory=compute r)(lastlogon>= )(lastlogon<= ))) The date and time stamps have been converted to an integer value that represents the number of 100-nanosecond intervals that have occurred since January 01, :00:00 AM UTC (DateTime 2015). This is necessary for comparisons since AD stores date and time values using this format. The code snippet below demonstrates the conversion process from a date and time stamp to a long integer. DateTime datetimestamp = DateTime.Now; long converteddts = datetimestamp.tofiletimeutc(); 28
37 4.5 Grouping The data grid used to display the AD objects has a grouping feature that allows users to group similar objects by the properties displayed in the grid. For instance, grouping objects by their class (i.e., user, computer, group, etc.), then by their job title, then by whether or not they are disabled is illustrated in Figure This allows system administrators to focus on particular groupings of AD objects, such as the Computer Science Professor whose account is disable as shown below in Figure Figure Grouping Similar Objects 29
38 5. Testing and Evaluation 5.1 Testing Testing has been performed on the various features offered by the ADMT. The following sections demonstrate these tests Testing Bulk Operations Sample CSV files containing users, groups and computers have been made, as shown in Figure 5.1, Figure 5.2, and Figure 5.3. Figure 5.1. Sample CSV File for Importing Users Figure 5.2. Sample CSV File for Importing Groups 30
39 Figure 5.3. Sample CSV File for Importing Computers These files were then used to create each of the objects in bulk, as shown in Figure 5.4, Figure 5.5, and Figure 5.6. Figure 5.4. Result of the Importing the Sample Users CSV File 31
40 Figure 5.5. Result of Importing the Sample Groups CSV File Figure 5.6. Result of Importing the Sample Computers CSV File 32
41 in Figure 5.7. The final result after importing the users, groups and computers in bulk is shown Figure 5.7. Display of All Imported Active Directory Objects The ADMT can also perform bulk deletion of objects. Figure 5.8 demonstrates the result of deleting the previously created AD objects. 33
42 Figure 5.8. Result of Deleting Active Directory Objects in Bulk Testing Group Management via Business Roles Business Roles were created using the Job Title Manager shown in Figure 5.9. Figure 5.9. Job Title Manager 34
43 From the imported users created during testing, the users Amber Greene, John Doe, Kim Silvas, Nick Jackson and Ryan Daranger are assigned the Computer Science Professor job title. The users Mike Lewis, John Smith, Janice Coleman, Bill Young and Lilly Weber are assigned the Math Professor job title. Figure 5.10 shows the groups that each user was added to as a result of assigning the Computer Science Professor job title, and Figure 5.11 shows the groups that each user was added to as a result of assigning the Math Professor job title. Figure Result of Assigning the Computer Science Professor Job Title 35
44 Figure Result of Assigning the Math Professor Job Title As shown, the users that have been assigned job titles have been joined to the groups that a person that functions as a Computer Science Professor or Math Professor should be a member of Testing Filters The filters can be managed using the Filter Manager shown in Figure New filters can be created and saved for future use. 36
45 edit a filter. Figure Filter Manager Once a filter has been made, the Filter Editor shown in Figure 5.13 can be used to Figure Filter Editor The result of this filter when applied with the flat view is shown below in Figure A single computer, W2K8R2-X64, and a single user, Administrator, are shown to have logged in on April 20,
46 Figure Results of Filter with Flat View Enabled 5.2 Error Handling During the development of the project, bad data would be provided to the ADMT to evaluate its reaction. For instance, the logon screen would be provided with a bad domain, username or password. In return, it provides an error message with details as to why the logon failed, as shown in Figure 5.15 and Figure Figure Logon Using the Wrong Domain Name 38
47 Figure Logon Using the Wrong Username When creating users, groups or computers, error checking is put in place to ensure that the necessary information is provided, as illustrated in Figure
48 be duplicated. Figure Attempting to Add Users with No Information Figure 5.18 and Figure 5.19 illustrate that job titles cannot be blank, and must not 40
49 Figure Adding Blank Job Titles Figure Adding a Job Title with a Duplicate Name As shown in Figure 5.20, the ADMT does not have the ability to add a job title to any kind of AD object other than users, since AD does not have a title field for any kind of object other than users. 41
50 Figure Message Displayed When No Users Are Selected for Job Titles Similar to the Job Title Manager, the Filter Manager requires a non-blank and unique name in order to create a new filter, as shown in Figure 5.21 and Figure Figure Filters Are Not Allowed to Have Blank Names 42
51 Figure Filters Are Not Allowed to Have Duplicate Names 5.3 User Evaluations Volunteers that are familiar with managing AD services were asked to perform a series of tasks using the ADMT. Tasks consisted of adding users, groups and computers, deleting users, groups and computers, creating a job title with associated group memberships, assign job titles to users, filter for specific job titles, and group the filtered users by job title and whether or not their account was enabled. The following table lists the average of the volunteers opinions of how each function within the ADMT ranks in terms of whether or not it is user friendly at first glance: 43
52 Table 5.1. User Friendliness Evaluation Strongly Disagree Disagree Neutral Agree Strongly Agree Bulk Operations Group Management via Job Titles Filtering Each volunteer noted that after a few minutes of learning how the ADMT works, it became simple to accomplish complex tasks. 44
53 6. Conclusion and Future Work The ADMT developed builds on top of the functionality provided by Microsoft s Active Directory Users and Computers. ADMT is capable of bulk creation of users, groups and computers, bulk deletion of AD objects, managing group memberships based on a user s business role, logical filtering on string, integer, date, time and boolean values and grouping of AD objects based on displayed properties. Through the use job titles, adding new users to groups helps to ensure the principal of least privilege is satisfied. Additionally, the use of multiple logical filters provides system administrators and security administrators more flexibility to identify objects in the domain that may need attention without the use of scripting languages. In the future, ADMT could be broadened to include other features provided by Microsoft s Active Directory Users and Computers, such as: group management without assigning job titles, assigning new passwords to users, management of AD object properties, and the creation of any kind of AD object. Also, the user interface could include additional features that a user familiar with Microsoft s Active Directory Users and Computers would be accustomed to, such as: context menus, and the option to use a menu bar. Finally, the speed at which tasks are performed may be improved with the use of threading. 45
54 BIBLIOGRAPHY AND REFERENCES [ActiveDirectoryAccessRule 2015] Microsoft. Available from px (visited Apr. 12, 2015). [ActiveDirectorySecurity 2015] Microsoft. Available from (visited Apr. 12, 2015). [AuthenticationTypes 2015] Microsoft. Available from (visited Apr. 12, 2015). [BinaryFormatter 2015] Microsoft. Available from (visited Apr. 20, 2015). [ComputerPrincipal 2015] Microsoft. Available from vs.110%29.aspx (visited Apr. 12, 2015). [ContextType 2015] Microsoft. Available from %29.aspx (visited Apr. 12, 2015). [DateTime 2015] Microsoft. Available from (visited Apr. 21, 2015). [DirectoryServicesComException 2015] Microsoft. Available from %29.aspx (visited Apr. 12, 2015). [DirectoryContext 2015] Microsoft. Available from %29.aspx (visited Feb. 28, 2015). [DirectoryEntry 2015] Microsoft. Available from (visited Feb. 28, 2015). [DirectoryEntryConfiguration 2015] Microsoft. Available from 46
55 us/library/system.directoryservices.directoryentryconfiguration%28v=vs.110%29. aspx (visited Feb. 28, 2015). [DirectorySearcher 2015] Microsoft. Available from (visited Feb. 28, 2015). [Domain 2015] Microsoft. Available from (visited Apr. 12, 2015). [GroupPrincipal 2015] Microsoft. Available from 110%29.aspx (visited Apr. 12, 2015). [ManageEngine 2015] ManageEngine. Available from (visited Feb. 8, 2015). [NetMarketShare 2015] NetMarketShare. Available from (visited Jan. 31, 2015). [Object Naming 2015] Microsoft. Available from (visited Feb. 28, 2015). [PrincipalContext 2015] Microsoft. Available from (visited Apr. 12, 2015). [SearchResult 2015] Microsoft. Available from (visited Feb. 28, 2015). [SolarWinds 2015] SolarWinds. Available from (visited Feb. 8, 2015). [UserPrincipal 2015] Micorosoft. Available from 0%29.aspx (visited Apr. 12, 2015). [WiseSoft 2015] WiseSoft. Available from (visited Feb. 8, 2015). 47
LDAP Directory Integration with Cisco Unity Connection
CHAPTER 6 LDAP Directory Integration with Cisco Unity Connection The Lightweight Directory Access Protocol (LDAP) provides applications like Cisco Unity Connection with a standard method for accessing
Configuring Sponsor Authentication
CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five
HDA Integration Guide. Help Desk Authority 9.0
HDA Integration Guide Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic
ECAT SWE Exchange Customer Administration Tool Web Interface User Guide Version 6.7
ECAT SWE Exchange Customer Administration Tool SWE - Exchange Customer Administration Tool (ECAT) Table of Contents About this Guide... 3 Audience and Purpose... 3 What is in this Guide?... 3 CA.mail Website...
Quality Center LDAP Guide
Information Services Quality Assurance Quality Center LDAP Guide Version 1.0 Lightweight Directory Access Protocol( LDAP) authentication facilitates single sign on by synchronizing Quality Center (QC)
How to monitor AD security with MOM
How to monitor AD security with MOM A article about monitor Active Directory security with Microsoft Operations Manager 2005 Anders Bengtsson, MCSE http://www.momresources.org November 2006 (1) Table of
Stellar Active Directory Manager
Stellar Active Directory Manager What is the need of Active Directory Manager? Every organization uses Active Directory Services (ADMS) to manage the users working in the organization. This task is mostly
Using LDAP Authentication in a PowerCenter Domain
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
User Management Tool 1.5
User Management Tool 1.5 2014-12-08 23:32:23 UTC 2014 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents User Management Tool 1.5... 3 ShareFile User Management
SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support
SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support Document Scope This document describes the integration of SonicOS Enhanced 3.2 with Lightweight Directory
Migrating Exchange Server to Office 365
Migrating Exchange Server to Office 365 By: Brien M. Posey CONTENTS Domain Verification... 3 IMAP Migration... 4 Cut Over and Staged Migration Prep Work... 5 Cut Over Migrations... 6 Staged Migration...
Skyward LDAP Launch Kit Table of Contents
04.30.2015 Table of Contents What is LDAP and what is it used for?... 3 Can Cloud Hosted (ISCorp) Customers use LDAP?... 3 What is Advanced LDAP?... 3 Does LDAP support single sign-on?... 4 How do I know
User Management Guide
AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
LANDESK Service Desk. Desktop Manager
LANDESK Service Desk Desktop Manager LANDESK SERVICE DESK DESKTOP MANAGER GUIDE This document contains information, which is the confidential information and/or proprietary property of LANDESK Software,
Tool Tip. SyAM Management Utilities and Non-Admin Domain Users
SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with
Integrating PISTON OPENSTACK 3.0 with Microsoft Active Directory
Integrating PISTON OPENSTACK 3.0 with Microsoft Active Directory May 21, 2014 This edition of this document applies to Piston OpenStack 3.0. To send us your comments about this document, e-mail [email protected].
Managing Users and Identity Stores
CHAPTER 8 Overview ACS manages your network devices and other ACS clients by using the ACS network resource repositories and identity stores. When a host connects to the network through ACS requesting
Creating Organizational Units, Accounts, and Groups. Active Directory Users and Computers (ADUC) 21/05/2013
Creating Organizational Units, Accounts, and Groups Tom Brett Active Directory Users and Computers (ADUC) Active Directory Users and Computers (ADUC) After installing AD DS, the next task is to create
User Management Tool 1.6
User Management Tool 1.6 2014-12-08 23:32:48 UTC 2014 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents User Management Tool 1.6... 3 ShareFile User Management
ADSelfService Plus Client Software Installation Guide
ADSelfService Plus Client Software Installation Guide ( I n s t a l l a t io n t h r o u g h A DS e l f S e r v ic e P l u s w e b p o r t a l a n d M a n u a l I n s t a l l a t io n ) 1 Table of Contents
VMware Mirage Web Manager Guide
Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
Discovery Guide. Secret Server. Table of Contents
Secret Server Discovery Guide Table of Contents Introduction... 3 How Discovery Works... 3 Active Directory / Local Windows Accounts... 3 Unix accounts... 3 VMware ESX accounts... 3 Why use Discovery?...
Module 4: Implementing User, Group, and Computer Accounts
Module 4: Implementing User, Group, and Computer Accounts Contents Overview 1 Lesson: Introduction to Accounts 2 Lesson: Creating and Managing Multiple Accounts 8 Lesson: Implementing User Principal Name
Embedded Web Server Security
Embedded Web Server Security Administrator's Guide September 2014 www.lexmark.com Model(s): C54x, C73x, C746, C748, C792, C925, C950, E260, E360, E46x, T65x, W850, X264, X36x, X46x, X543, X544, X546, X548,
Using DC Agent for Transparent User Identification
Using DC Agent for Transparent User Identification Using DC Agent Web Security Solutions v7.7, 7.8 If your organization uses Microsoft Windows Active Directory, you can use Websense DC Agent to identify
SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support
SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support Document Scope This document describes the integration of SonicOS Enhanced 3.2 with Lightweight Directory
HELP DOCUMENTATION UMRA USER GUIDE
HELP DOCUMENTATION UMRA USER GUIDE Copyright 2013, Tools4Ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means without the
LT Auditor+ 2013. Windows Assessment SP1 Installation & Configuration Guide
LT Auditor+ 2013 Windows Assessment SP1 Installation & Configuration Guide Table of Contents CHAPTER 1- OVERVIEW... 3 CHAPTER 2 - INSTALL LT AUDITOR+ WINDOWS ASSESSMENT SP1 COMPONENTS... 4 System Requirements...
Managing and Maintaining a Windows Server 2003 Network Environment
Managing and maintaining a Windows Server 2003 Network Environment. AIM This course provides students with knowledge and skills needed to Manage and Maintain a Windows Server 2003 Network Environment.
Step-by-Step Guide to Active Directory Bulk Import and Export
Page 1 of 12 TechNet Home > Windows Server TechCenter > Identity and Directory Services > Active Directory > Step By Step Step-by-Step Guide to Active Directory Bulk Import and Export Published: September
Backup Assistant. User Guide. NEC NEC Unified Solutions, Inc. March 2008 NDA-30282, Revision 6
Backup Assistant User Guide NEC NEC Unified Solutions, Inc. March 2008 NDA-30282, Revision 6 Liability Disclaimer NEC Unified Solutions, Inc. reserves the right to change the specifications, functions,
WatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
Embedded Web Server Security
Embedded Web Server Security Administrator's Guide September 2014 www.lexmark.com Model(s): MS911de, MX910de, MX911, MX912, XM9145, XM9155, XM9165, CS310, CS410, CS510, CX310, CX410, CX510, M1140, M1145,
Managing users. Account sources. Chapter 1
Chapter 1 Managing users The Users page in Cloud Manager lists all of the user accounts in the Centrify identity platform. This includes all of the users you create in the Centrify for Mobile user service
Video Administration Backup and Restore Procedures
CHAPTER 12 Video Administration Backup and Restore Procedures This chapter provides procedures for backing up and restoring the Video Administration database and configuration files. See the following
Integrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
Enabling single sign-on for Cognos 8/10 with Active Directory
Enabling single sign-on for Cognos 8/10 with Active Directory Overview QueryVision Note: Overview This document pulls together information from a number of QueryVision and IBM/Cognos material that are
Contents About the Contract Management Post Installation Administrator's Guide... 5 Viewing and Modifying Contract Management Settings...
Post Installation Guide for Primavera Contract Management 14.1 July 2014 Contents About the Contract Management Post Installation Administrator's Guide... 5 Viewing and Modifying Contract Management Settings...
Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication
Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication This application note describes how to authenticate users on a Cisco ISA500 Series security appliance. It includes these
Managing Identities and Admin Access
CHAPTER 4 This chapter describes how Cisco Identity Services Engine (ISE) manages its network identities and access to its resources using role-based access control policies, permissions, and settings.
User Management Resource Administrator. Managing LDAP directory services with UMRA
User Management Resource Administrator Managing LDAP directory services with UMRA Copyright 2005, Tools4Ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted
Workflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
User Migration Tool. Note. Staging Guide for Cisco Unified ICM/Contact Center Enterprise & Hosted Release 9.0(1) 1
The (UMT): Is a stand-alone Windows command-line application that performs migration in the granularity of a Unified ICM instance. It migrates only Unified ICM AD user accounts (config/setup and supervisors)
SharePoint AD Information Sync Installation Instruction
SharePoint AD Information Sync Installation Instruction System Requirements Microsoft Windows SharePoint Services V3 or Microsoft Office SharePoint Server 2007. License management Click the trial link
EventTracker: Support to Non English Systems
EventTracker: Support to Non English Systems Publication Date: April 25, 2012 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Introduction This document has been prepared to
Objectives. At the end of this chapter students should be able to:
NTFS PERMISSIONS AND SECURITY SETTING.1 Introduction to NTFS Permissions.1.1 File Permissions and Folder Permission.2 Assigning NTFS Permissions and Special Permission.2.1 Planning NTFS Permissions.2.2
SchoolBooking LDAP Integration Guide
SchoolBooking LDAP Integration Guide Before you start This guide has been written to help you configure SchoolBooking to connect to your LDAP server. Please treat this document as a reference guide, your
Single Sign-On. Document Scope. Single Sign-On
Single Sign-On Document Scope This document describes how to plan, design, implement, and maintain the Single Sign-On feature in the SonicWALL SonicOS 5.1 Enhanced. This document contains the following
ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management
ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management Problem: The employees of a global enterprise often need to telework. When a sales representative
About the Authors Fundamentals p. 1 Introduction to LDAP and Active Directory p. 3 A Brief History of Directory Services p. 3 Definition of LDAP p.
Listings p. xv Tables p. xix Foreword p. xxi Preface p. xxiii Acknowledgments p. xxix About the Authors p. xxxi Fundamentals p. 1 Introduction to LDAP and Active Directory p. 3 A Brief History of Directory
LepideAuditor Suite for File Server. Installation and Configuration Guide
LepideAuditor Suite for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers
Access Control and Audit Trail Software
Varian, Inc. 2700 Mitchell Drive Walnut Creek, CA 94598-1675/USA Access Control and Audit Trail Software Operation Manual Varian, Inc. 2002 03-914941-00:3 Table of Contents Introduction... 1 Access Control
Active Directory Quick Reference Guide for PowerCAMPUS Self-Service 7.x. Release 5 July 2011
Active Directory Quick Reference Guide for PowerCAMPUS Self-Service 7.x Release 5 July 2011 Trademark, Publishing Statement and Copyright Notice SunGard or its subsidiaries in the U.S. and other countries
Active Directory Cleaner User Guide 1. Active Directory Cleaner User Guide
Active Directory Cleaner User Guide 1 Active Directory Cleaner User Guide Active Directory Cleaner User Guide 2 Table of Contents 1 Introduction...3 2 Benefits of Active Directory Cleaner...3 3 Features...3
Content Filtering Client Policy & Reporting Administrator s Guide
Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
ThinManager and Active Directory
ThinManager and Active Directory Use the F1 button on any page of a ThinManager wizard to launch Help for that page. Visit http://www.thinmanager.com/kb/index.php/special:allpages for a list of Knowledge
How To Take Advantage Of Active Directory Support In Groupwise 2014
White Paper Collaboration Taking Advantage of Active Directory Support in GroupWise 2014 Flexibility and interoperability have always been hallmarks for Novell. That s why it should be no surprise that
Section 4 Application Description - LDAP
Section 4 Application Description - LDAP This section describes the applications and configuration required for authentication utilizing Windows 2000 Server s Active Directory features and a NetScreen
Clientless SSL VPN Users
Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you
NetWrix SQL Server Change Reporter
NetWrix SQL Server Change Reporter Version 2.2 Administrator Guide Contents NetWrix SQL Server Change Reporter Administrator Guide 1. INTRODUCTION... 3 1.1 KEY FEATURES... 3 1.2 LICENSING... 4 1.3 HOW
Quick Start Guide. IT Management On-Demand
1 Quick Start Guide Quick Start Guide IT Management On-Demand Introduction... 2 Getting Started... 3 Planning Your Deployment... 5 Performing a Test Deployment... 6 Enterprise Deployment Options... 8 Remote
Active Directory Change Notifier Quick Start Guide
Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not
Special Edition for FastTrack Software
08/14 The magazine for professional system and networkadministration Special Edition for FastTrack Software Tested: FastTrack Automation Studio www.it-administrator.com TESTS I FastTrack Automation Studio
Windows PowerShell Cookbook
Windows PowerShell Cookbook Lee Holmes O'REILLY' Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo Table of Contents Foreword Preface xvii xxi Part I. Tour A Guided Tour of Windows PowerShell
IIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
Special thanks to the following people for reviewing and providing invaluable feedback for this document: Joe Davies, Bill Mathers, Andreas Kjellman
Test Lab Guide: Creating a Microsoft Azure Active Directory and Windows Server Active Directory Environment using Microsoft Azure Active Directory Sync Services Microsoft Corporation Published: December
Single Sign-On in SonicOS Enhanced 4.0
Single Sign-On in SonicOS Enhanced 4.0 Document Scope This document describes how to plan, design, implement, and maintain the Single Sign-On feature in the SonicWALL SonicOS Enhanced 4.0. This document
GP REPORTS VIEWER USER GUIDE
GP Reports Viewer Dynamics GP Reporting Made Easy GP REPORTS VIEWER USER GUIDE For Dynamics GP Version 2015 (Build 5) Dynamics GP Version 2013 (Build 14) Dynamics GP Version 2010 (Build 65) Last updated
HP Device Manager 4.7
Technical white paper HP Device Manager 4.7 LDAP Troubleshooting Guide Table of contents Introduction... 2 HPDM LDAP-related context and background... 2 LDAP in HPDM... 2 Full domain account name login...
Step-by-Step Guide to Bulk Import and Export to Active Directory
All Products Support Search microsoft.com Guide Windows 2000 Home Windows 2000 Worldwide Search This Site Go Advanced Search Windows 2000 > Technical Resources > Step-by-Step Guides Step-by-Step Guide
(Installation through ADSelfService Plus web portal and Manual Installation)
ADSelfService Plus Client Software Installation Guide (Installation through ADSelfService Plus web portal and Manual Installation) 1 Table of Contents Introduction:... 3 ADSelfService Plus Client software:...
Using LDAP with Sentry Firmware and Sentry Power Manager (SPM)
Using LDAP with Sentry Firmware and Sentry Power Manager (SPM) Table of Contents Purpose LDAP Requirements Using LDAP with Sentry Firmware (GUI) Initiate a Sentry GUI Session Configuring LDAP for Active
Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:
Chapter 10 Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Implement and troubleshoot Group Policy. Create a Group Policy object (GPO). Link an existing GPO. Delegate administrative
Oracle Enterprise Single Sign-on Provisioning Gateway. Administrator Guide Release 10.1.4.1.0 E12613-01
Oracle Enterprise Single Sign-on Provisioning Gateway Administrator Guide Release 10.1.4.1.0 E12613-01 March 2009 Oracle Enterprise Single Sign-on Provisioning Gateway, Administrator Guide, Release 10.1.4.1.0
Tracking Network Changes Using Change Audit
CHAPTER 14 Change Audit tracks and reports changes made in the network. Change Audit allows other RME applications to log change information to a central repository. Device Configuration, Inventory, and
Test Lab Guide: Creating a Windows Azure AD and Windows Server AD Environment using Azure AD Sync
Test Lab Guide: Creating a Windows Azure AD and Windows Server AD Environment using Azure AD Sync Microsoft Corporation Published: December 2014 Author: Mark Grimes Acknowledgements Special thanks to the
NETWRIX ACCOUNT LOCKOUT EXAMINER
NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a
Monitoring SQL Server with Microsoft Operations Manager 2005
Monitoring SQL Server with Microsoft Operations Manager 2005 Objectives After completing this lab, you will have had an opportunity to become familiar with several key SQL Management Pack features including:
Module 1: Introduction to Active Directory Infrastructure
Module 1: Introduction to Active Directory Infrastructure Contents Overview 1 Lesson: The Architecture of Active Directory 2 Lesson: How Active Directory Works 10 Lesson: Examining Active Directory 19
Project management integrated into Outlook
Project management integrated into Outlook InLoox PM 7.x off-line operation An InLoox Whitepaper Published: October 2011 Copyright: 2011 InLoox GmbH. You can find up-to-date information at http://www.inloox.com
CA Spectrum and CA Embedded Entitlements Manager
CA Spectrum and CA Embedded Entitlements Manager Integration Guide CA Spectrum Release 9.4 - CA Embedded Entitlements Manager This Documentation, which includes embedded help systems and electronically
Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
Your Question. Net Report Answer
Your Question Article: 00120 Question: How to Configure External Authentication for Net Report Web Portal Net Report Answer Introduction Security devices can be used to control access to network resources.
Configuring Controller 8.2 to use Active Directory authentication
Proven Practice Configuring Controller 8.2 to use Active Directory authentication Product(s): Controller 8.2 Area of Interest: Infrastructure Configuring Controller 8.2 to use Active Directory authentication
SafeGuard Enterprise Administrator help
SafeGuard Enterprise Administrator help Product version: 5.60 Document date: April 2011 Contents 1 The SafeGuard Management Center...4 2 Log on to the SafeGuard Management Center...5 3 Operating steps
RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide
RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks
Coveo Platform 7.0. Microsoft Active Directory Connector Guide
Coveo Platform 7.0 Microsoft Active Directory Connector Guide Notice The content in this document represents the current view of Coveo as of the date of publication. Because Coveo continually responds
INTEGRATING MICROSOFT DYNAMICS CRM WITH SIMEGO DS3
INTEGRATING MICROSOFT DYNAMICS CRM WITH SIMEGO DS3 Often the most compelling way to introduce yourself to a software product is to try deliver value as soon as possible. Simego DS3 is designed to get you
User Management Resource Administrator. UMRA tables. User Guide
User Management Resource Administrator UMRA tables User Guide ii Contents Copyright 2005, Tools4Ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
ADMT v3 Migration Guide
ADMT v3 Migration Guide Microsoft Corporation Published: November 2006 Abstract This guide explains how to use the Active Directory Migration Tool version 3 (ADMT v3) to restructure your operating environment.
Deploying System Center 2012 R2 Configuration Manager
Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.
HP Device Manager 4.6
Technical white paper HP Device Manager 4.6 LDAP Troubleshooting Guide Table of contents Introduction... 2 HPDM LDAP-related context and background... 2 LDAP in HPDM... 2 Configuring User Authentication...
Security Provider Integration LDAP Server
Security Provider Integration LDAP Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
Quick Start Guide for Parallels Virtuozzo
PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current
How to Logon with Domain Credentials to a Server in a Workgroup
How to Logon with Domain Credentials to a Server in a Workgroup Johan Loos [email protected] Version 1.0 Authentication Overview Basically when you logon to a Windows Server you can logon locally using
Introduction to Directory Services
Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory
HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION
HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION Version 1.1 / Last updated November 2012 INTRODUCTION The Cloud Link for Windows client software is packaged as an MSI (Microsoft Installer)
Using Logon Agent for Transparent User Identification
Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense
