SlideShare a Scribd company logo
1 of 9
Directory Service
Computer Management And User Management
Current User Management Concerns
Who Has Access?
Many Users Are Administrator on Each Service or Server
I’m Administrator, So I Can Modify your User!
Any Administrator user has access to modify other users!
Any Administrator user has access to create shared folder and move critical data
Any Administrator user has access to stop critical OS services
Any Administrator user has access to everything!
When server is joined to a domain, just domain admins has access to modify
users and groups.
Current User Management Concerns
Password and Password Policy
Changing Password at least on Ten Local Machines, I’m Tired, I’ll Do it Later!
I Have Seen Your Password!
I’m responsible to my password, my colleagues have seen accidentally. I have
to change my password on all servers!
I’ve used simple password, Who does care? Just I know it, so it’s secure!
I’ll change my password to previous password, who has know about the old
password?
My collogue has left the company, now I have to remove his user from all
servers, devices, management software, monitoring software and …!
Current User Management Concerns
Service Account
Why I Have to Ask Domain Administrator to Create Specific Account for
Specific Service?
I Can Run All Services By My User Account
Using same account to do administration things and run services and
applications is absolutely wrong.
Other Concerns
Policy Based Management, Name Resolution, …..
DNS = Not Implemented
Policy Based Management = Not Implemented
Group Management = Not Implemented
Any Automation = Not Implemented
Centralized Monitoring= Not Implemented
Do You Have Any Concern About Nothing!?
Other Concerns
Directory Service Components and Dependent Components
Active Directory is the properness directory service
Large Environments Needs Automation and Centralization
Directory S
ervice
S
ecurity Tools
(AV, FW, Assessment)
Management Tools
(Patch, Configuration, )
Devices
(S
erver, S
torage, )
OperatingS
ystem
(Windows, Linux, .)
Monitoring Tools
Examples
How Directory Service Resolve Our Concerns?
Integrating Active Directory with Red Hat Identity Management
Using Same Credential on Different Operating Systems
Examples
How Directory Service Resolve Our Concerns?
Please give us same IP with other projects!
Global DNS Server
Examples
Deployment Model – Global Directory Service
Change in South Pole, Use in North Pole
One God, One Directory Domain

More Related Content

Similar to Directory Service - Edited.pptx

What the hell is PowerShell?
What the hell is PowerShell?What the hell is PowerShell?
What the hell is PowerShell?NETUserGroupBern
 
Saurabh Chandorkar Presentation
Saurabh Chandorkar PresentationSaurabh Chandorkar Presentation
Saurabh Chandorkar PresentationSaurabh Chandorkar
 
Dell Password Manager Architecture - Components
Dell Password Manager Architecture - ComponentsDell Password Manager Architecture - Components
Dell Password Manager Architecture - ComponentsAidy Tificate
 
Control panel by
Control panel byControl panel by
Control panel byNoor Fatima
 
The Most Underutilized Configuration Management Features
The Most Underutilized Configuration Management Features  The Most Underutilized Configuration Management Features
The Most Underutilized Configuration Management Features Cireson
 
Hostel Management system Report
Hostel Management system ReportHostel Management system Report
Hostel Management system ReportPrasoon Rawat
 
OTMS-PPT-1moo4l.pptx
OTMS-PPT-1moo4l.pptxOTMS-PPT-1moo4l.pptx
OTMS-PPT-1moo4l.pptxBhanuRoyal4
 
Embrace DevOps and Learn How to Automate Operations - DEV306 - re:Invent 2017
Embrace DevOps and Learn How to Automate Operations - DEV306 - re:Invent 2017Embrace DevOps and Learn How to Automate Operations - DEV306 - re:Invent 2017
Embrace DevOps and Learn How to Automate Operations - DEV306 - re:Invent 2017Amazon Web Services
 
System Administrator_Sivaiah
System Administrator_SivaiahSystem Administrator_Sivaiah
System Administrator_SivaiahSivaiah Yakkanti
 
System Administrator_Sivaiah
System Administrator_SivaiahSystem Administrator_Sivaiah
System Administrator_SivaiahSivaiah Yakkanti
 
10 Best Web Hosting Control Panels.pdf
10 Best Web Hosting Control Panels.pdf10 Best Web Hosting Control Panels.pdf
10 Best Web Hosting Control Panels.pdfHost It Smart
 
The Forgotten Customer (XPDays 2011)
The Forgotten Customer (XPDays 2011)The Forgotten Customer (XPDays 2011)
The Forgotten Customer (XPDays 2011)Thomas Krause
 

Similar to Directory Service - Edited.pptx (20)

What the hell is PowerShell?
What the hell is PowerShell?What the hell is PowerShell?
What the hell is PowerShell?
 
Saurabh Chandorkar Presentation
Saurabh Chandorkar PresentationSaurabh Chandorkar Presentation
Saurabh Chandorkar Presentation
 
Dell Password Manager Architecture - Components
Dell Password Manager Architecture - ComponentsDell Password Manager Architecture - Components
Dell Password Manager Architecture - Components
 
Control panel by
Control panel byControl panel by
Control panel by
 
Resume(1)
Resume(1)Resume(1)
Resume(1)
 
Tableau powerpoint
Tableau powerpointTableau powerpoint
Tableau powerpoint
 
The Most Underutilized Configuration Management Features
The Most Underutilized Configuration Management Features  The Most Underutilized Configuration Management Features
The Most Underutilized Configuration Management Features
 
Pratyush_Resume
Pratyush_ResumePratyush_Resume
Pratyush_Resume
 
Pratyush_Resume
Pratyush_ResumePratyush_Resume
Pratyush_Resume
 
Pratyush_Resume
Pratyush_ResumePratyush_Resume
Pratyush_Resume
 
Hostel Management system Report
Hostel Management system ReportHostel Management system Report
Hostel Management system Report
 
OTMS-PPT-1moo4l.pptx
OTMS-PPT-1moo4l.pptxOTMS-PPT-1moo4l.pptx
OTMS-PPT-1moo4l.pptx
 
Using Wireframes
Using WireframesUsing Wireframes
Using Wireframes
 
Dev ops
Dev opsDev ops
Dev ops
 
Embrace DevOps and Learn How to Automate Operations - DEV306 - re:Invent 2017
Embrace DevOps and Learn How to Automate Operations - DEV306 - re:Invent 2017Embrace DevOps and Learn How to Automate Operations - DEV306 - re:Invent 2017
Embrace DevOps and Learn How to Automate Operations - DEV306 - re:Invent 2017
 
System Administrator_Sivaiah
System Administrator_SivaiahSystem Administrator_Sivaiah
System Administrator_Sivaiah
 
System Administrator_Sivaiah
System Administrator_SivaiahSystem Administrator_Sivaiah
System Administrator_Sivaiah
 
Ramesh Vemavarapu
Ramesh VemavarapuRamesh Vemavarapu
Ramesh Vemavarapu
 
10 Best Web Hosting Control Panels.pdf
10 Best Web Hosting Control Panels.pdf10 Best Web Hosting Control Panels.pdf
10 Best Web Hosting Control Panels.pdf
 
The Forgotten Customer (XPDays 2011)
The Forgotten Customer (XPDays 2011)The Forgotten Customer (XPDays 2011)
The Forgotten Customer (XPDays 2011)
 

More from Davoud Teimouri

Capacity Planning - Parameters Relation
Capacity Planning - Parameters RelationCapacity Planning - Parameters Relation
Capacity Planning - Parameters RelationDavoud Teimouri
 
مشکلات فرایندی سازمان ها
مشکلات فرایندی سازمان هامشکلات فرایندی سازمان ها
مشکلات فرایندی سازمان هاDavoud Teimouri
 
Why Do We Need to Third-Party Security Solution?
Why Do We Need to Third-Party Security Solution?Why Do We Need to Third-Party Security Solution?
Why Do We Need to Third-Party Security Solution?Davoud Teimouri
 
NTP Server - How it works?
NTP Server - How it works?NTP Server - How it works?
NTP Server - How it works?Davoud Teimouri
 
Virtual Infrastructure Disaster Recovery
Virtual Infrastructure Disaster RecoveryVirtual Infrastructure Disaster Recovery
Virtual Infrastructure Disaster RecoveryDavoud Teimouri
 

More from Davoud Teimouri (8)

Security Concerns.pptx
Security Concerns.pptxSecurity Concerns.pptx
Security Concerns.pptx
 
Capacity Planning - Parameters Relation
Capacity Planning - Parameters RelationCapacity Planning - Parameters Relation
Capacity Planning - Parameters Relation
 
ITSM Change Management
ITSM Change ManagementITSM Change Management
ITSM Change Management
 
مشکلات فرایندی سازمان ها
مشکلات فرایندی سازمان هامشکلات فرایندی سازمان ها
مشکلات فرایندی سازمان ها
 
Why Do We Need to Third-Party Security Solution?
Why Do We Need to Third-Party Security Solution?Why Do We Need to Third-Party Security Solution?
Why Do We Need to Third-Party Security Solution?
 
NTP Server - How it works?
NTP Server - How it works?NTP Server - How it works?
NTP Server - How it works?
 
Virtual Infrastructure Disaster Recovery
Virtual Infrastructure Disaster RecoveryVirtual Infrastructure Disaster Recovery
Virtual Infrastructure Disaster Recovery
 
Microsoft Hyper-V
Microsoft Hyper-VMicrosoft Hyper-V
Microsoft Hyper-V
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Directory Service - Edited.pptx

  • 2. Current User Management Concerns Who Has Access? Many Users Are Administrator on Each Service or Server I’m Administrator, So I Can Modify your User! Any Administrator user has access to modify other users! Any Administrator user has access to create shared folder and move critical data Any Administrator user has access to stop critical OS services Any Administrator user has access to everything! When server is joined to a domain, just domain admins has access to modify users and groups.
  • 3. Current User Management Concerns Password and Password Policy Changing Password at least on Ten Local Machines, I’m Tired, I’ll Do it Later! I Have Seen Your Password! I’m responsible to my password, my colleagues have seen accidentally. I have to change my password on all servers! I’ve used simple password, Who does care? Just I know it, so it’s secure! I’ll change my password to previous password, who has know about the old password? My collogue has left the company, now I have to remove his user from all servers, devices, management software, monitoring software and …!
  • 4. Current User Management Concerns Service Account Why I Have to Ask Domain Administrator to Create Specific Account for Specific Service? I Can Run All Services By My User Account Using same account to do administration things and run services and applications is absolutely wrong.
  • 5. Other Concerns Policy Based Management, Name Resolution, ….. DNS = Not Implemented Policy Based Management = Not Implemented Group Management = Not Implemented Any Automation = Not Implemented Centralized Monitoring= Not Implemented Do You Have Any Concern About Nothing!?
  • 6. Other Concerns Directory Service Components and Dependent Components Active Directory is the properness directory service Large Environments Needs Automation and Centralization Directory S ervice S ecurity Tools (AV, FW, Assessment) Management Tools (Patch, Configuration, ) Devices (S erver, S torage, ) OperatingS ystem (Windows, Linux, .) Monitoring Tools
  • 7. Examples How Directory Service Resolve Our Concerns? Integrating Active Directory with Red Hat Identity Management Using Same Credential on Different Operating Systems
  • 8. Examples How Directory Service Resolve Our Concerns? Please give us same IP with other projects! Global DNS Server
  • 9. Examples Deployment Model – Global Directory Service Change in South Pole, Use in North Pole One God, One Directory Domain