SlideShare a Scribd company logo
1 of 11
Active Directory Domain Services
Authenticated Network Access
By Aliya Saldanha – Business Analyst
 The contact centre environment mandates a
network that needs to be highly secure and
scalable. Its users need access to various
services, functionality and capacities on the
domain or local system. Also, these users
may need to be restricted or barred from
accessing restricted services and network
resources. For this, our client processes work
in a specially demarcated network region
known as a domain. Domains can be shared
i.e. on the general organization domain or
Isolated i.e. within its own domain cut off
from the remaining organization units.
 The applications and functions available to a
user are defined in the Windows Active
Directory which is a database that can be
searched to provide network user
information. It stores a wide range of domain
information in a common and retrievable
format. User accounts, computer accounts,
group accounts, access control lists, security
identifiers, Group Policy Objects (GPOs),
shares, printers, properties about users and
their locations, are all stored in the Active
Directory.
 The Active Directory allows the creation of
hierarchies within a domain that facilitates user
management and their segregation within the
organization. Each domain hierarchy is composed
of a number of ‘Organizational Units or
processes’.
 Eg – a client of a ticketing process may have a
number of users. The TL’s and CSA’s may require
access to certain network resources. For this,
these users may be given the necessary access
rights within that domain using AD services.
Simultaneously the Quality and MIS team for this
process may not require the same and this
disabling or restriction is also done using AD
services.
 Within the organizational unit, there are varied
users with access usage restrictions and control.
So, the organizational unit acts as a container to
group users and objects such as printers,
computers, applications, hardware for
segregation and application of policies.
 The organizational unit hierarchy within a
domain is independent of the structure of other
domains; this means that each domain can
create and implement its own hierarchy. The
structure is totally flexible, and allows creation
of organization environment that mirrors the
administrative model.
 The User Profile facilitates the
authentication of user accounts and
determines that a user who logs on to the
domain is who the user claims to be and that
the user does indeed have an account either
in the domain or in a domain that is trusted.
 After the user is authenticated, however,
the CRM database must provide security role
(authorization) to determine what objects
the authenticated user can view or change
and what kinds of changes are allowed.
 CRM is based on Windows authentication
therefore users logging into the CRM should
have an account in the active directory.
When a user attempts to login to the CRM,
she/he is prompted to enter their
WindowsLoginID, Password etc.
 This entered information along with the
domain name is the passed on to AD service
which authenticates the user. If the details
specified by the user are correct the AD
service sends a reply specifying that the
authentication was successful.
 Upon successful authentication from the AD
service, the application will attempt to
connect to the CRM Database which stores
the roles and their related accessibility.
 If the windows ID has been provided access
to the database a connection will be
established. The application will then fetch
the role assigned for that particular ID from
the CRM Database.
Microsoft active directory services   aliya presentation
Microsoft active directory services   aliya presentation

More Related Content

What's hot

N tier architecture
N tier architectureN tier architecture
N tier architectureNidhi Saurav
 
Web Based Investment Management System
Web Based Investment Management SystemWeb Based Investment Management System
Web Based Investment Management SystemMike Taylor
 
Web–based crm application with interactive graphs
Web–based crm application with interactive graphsWeb–based crm application with interactive graphs
Web–based crm application with interactive graphsMike Taylor
 
IT103Microsoft Windows XP/OS Chap13
IT103Microsoft Windows XP/OS Chap13IT103Microsoft Windows XP/OS Chap13
IT103Microsoft Windows XP/OS Chap13blusmurfydot1
 
Social Platform to Manage Financial Aspects
Social Platform to Manage Financial AspectsSocial Platform to Manage Financial Aspects
Social Platform to Manage Financial AspectsMike Taylor
 
Windows Identity Foundation
Windows Identity FoundationWindows Identity Foundation
Windows Identity Foundationmanz1234
 
Service oriented architecture & web 2.0
Service oriented architecture & web 2.0Service oriented architecture & web 2.0
Service oriented architecture & web 2.0Abhik Tushar Das
 
Managing_Devices_and_Corporate_Data_on_iOS
Managing_Devices_and_Corporate_Data_on_iOSManaging_Devices_and_Corporate_Data_on_iOS
Managing_Devices_and_Corporate_Data_on_iOSGrant Jolly
 

What's hot (11)

IDM Introduction
IDM IntroductionIDM Introduction
IDM Introduction
 
N tier architecture
N tier architectureN tier architecture
N tier architecture
 
Web Based Investment Management System
Web Based Investment Management SystemWeb Based Investment Management System
Web Based Investment Management System
 
Web–based crm application with interactive graphs
Web–based crm application with interactive graphsWeb–based crm application with interactive graphs
Web–based crm application with interactive graphs
 
IT103Microsoft Windows XP/OS Chap13
IT103Microsoft Windows XP/OS Chap13IT103Microsoft Windows XP/OS Chap13
IT103Microsoft Windows XP/OS Chap13
 
SoftAge eDMS
SoftAge eDMSSoftAge eDMS
SoftAge eDMS
 
Social Platform to Manage Financial Aspects
Social Platform to Manage Financial AspectsSocial Platform to Manage Financial Aspects
Social Platform to Manage Financial Aspects
 
Windows Identity Foundation
Windows Identity FoundationWindows Identity Foundation
Windows Identity Foundation
 
Dit yvol4iss44
Dit yvol4iss44Dit yvol4iss44
Dit yvol4iss44
 
Service oriented architecture & web 2.0
Service oriented architecture & web 2.0Service oriented architecture & web 2.0
Service oriented architecture & web 2.0
 
Managing_Devices_and_Corporate_Data_on_iOS
Managing_Devices_and_Corporate_Data_on_iOSManaging_Devices_and_Corporate_Data_on_iOS
Managing_Devices_and_Corporate_Data_on_iOS
 

Similar to Microsoft active directory services aliya presentation

IRJET- Research Paper on Active Directory
IRJET-  	  Research Paper on Active DirectoryIRJET-  	  Research Paper on Active Directory
IRJET- Research Paper on Active DirectoryIRJET Journal
 
Microsoft Active Directory.pptx
Microsoft Active Directory.pptxMicrosoft Active Directory.pptx
Microsoft Active Directory.pptxmasbulosoke
 
LTS Secure Identity Management
LTS Secure Identity ManagementLTS Secure Identity Management
LTS Secure Identity Managementrver21
 
Identity Management
Identity ManagementIdentity Management
Identity Managementrver21
 
Active directory tools and domain
Active directory tools  and domainActive directory tools  and domain
Active directory tools and domainAxmedXasanh
 
PROACTEYE IDENTITY MANAGEMENT
PROACTEYE IDENTITY MANAGEMENTPROACTEYE IDENTITY MANAGEMENT
PROACTEYE IDENTITY MANAGEMENThardik soni
 
Identity management
Identity managementIdentity management
Identity managementhardik soni
 
Active Directory Proposal
Active Directory ProposalActive Directory Proposal
Active Directory ProposalMJ Ferdous
 
Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directorythebigredhemi
 
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...Abhishek Sood
 
LTS Secure Identity Management
LTS Secure Identity ManagementLTS Secure Identity Management
LTS Secure Identity Managementrver21
 
Cis controls v8_guide (1)
Cis controls v8_guide (1)Cis controls v8_guide (1)
Cis controls v8_guide (1)MHumaamAl
 
What is Authentication Active Directory_.pptx
What is Authentication Active Directory_.pptxWhat is Authentication Active Directory_.pptx
What is Authentication Active Directory_.pptxHeenaMehta35
 
2 Configuring Windows Server 2003.pptx
2 Configuring Windows Server 2003.pptx2 Configuring Windows Server 2003.pptx
2 Configuring Windows Server 2003.pptxMitikuAbebe2
 
Windows Server 2012 R2 Jump Start - AIP
Windows Server 2012 R2 Jump Start - AIPWindows Server 2012 R2 Jump Start - AIP
Windows Server 2012 R2 Jump Start - AIPPaulo Freitas
 
Identity and Authentication in Office 2013 and Office 365 from Microsoft
Identity and Authentication in Office 2013 and Office 365 from MicrosoftIdentity and Authentication in Office 2013 and Office 365 from Microsoft
Identity and Authentication in Office 2013 and Office 365 from MicrosoftDavid J Rosenthal
 
2020 07-08 fireside chat sharing architecture
2020 07-08 fireside chat sharing architecture2020 07-08 fireside chat sharing architecture
2020 07-08 fireside chat sharing architectureJihun Jung
 
IDM in telecom industry
IDM in telecom industryIDM in telecom industry
IDM in telecom industryAjit Dadresa
 

Similar to Microsoft active directory services aliya presentation (20)

IRJET- Research Paper on Active Directory
IRJET-  	  Research Paper on Active DirectoryIRJET-  	  Research Paper on Active Directory
IRJET- Research Paper on Active Directory
 
Microsoft Active Directory.pptx
Microsoft Active Directory.pptxMicrosoft Active Directory.pptx
Microsoft Active Directory.pptx
 
LTS Secure Identity Management
LTS Secure Identity ManagementLTS Secure Identity Management
LTS Secure Identity Management
 
Identity Management
Identity ManagementIdentity Management
Identity Management
 
Active directory tools and domain
Active directory tools  and domainActive directory tools  and domain
Active directory tools and domain
 
PROACTEYE IDENTITY MANAGEMENT
PROACTEYE IDENTITY MANAGEMENTPROACTEYE IDENTITY MANAGEMENT
PROACTEYE IDENTITY MANAGEMENT
 
Identity management
Identity managementIdentity management
Identity management
 
Active Directory Proposal
Active Directory ProposalActive Directory Proposal
Active Directory Proposal
 
Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directory
 
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
 
unit4.pptx
unit4.pptxunit4.pptx
unit4.pptx
 
LTS Secure Identity Management
LTS Secure Identity ManagementLTS Secure Identity Management
LTS Secure Identity Management
 
Cis controls v8_guide (1)
Cis controls v8_guide (1)Cis controls v8_guide (1)
Cis controls v8_guide (1)
 
What is Authentication Active Directory_.pptx
What is Authentication Active Directory_.pptxWhat is Authentication Active Directory_.pptx
What is Authentication Active Directory_.pptx
 
2 Configuring Windows Server 2003.pptx
2 Configuring Windows Server 2003.pptx2 Configuring Windows Server 2003.pptx
2 Configuring Windows Server 2003.pptx
 
Windows Server 2012 R2 Jump Start - AIP
Windows Server 2012 R2 Jump Start - AIPWindows Server 2012 R2 Jump Start - AIP
Windows Server 2012 R2 Jump Start - AIP
 
70 640 Lesson06 Ppt 041009
70 640 Lesson06 Ppt 04100970 640 Lesson06 Ppt 041009
70 640 Lesson06 Ppt 041009
 
Identity and Authentication in Office 2013 and Office 365 from Microsoft
Identity and Authentication in Office 2013 and Office 365 from MicrosoftIdentity and Authentication in Office 2013 and Office 365 from Microsoft
Identity and Authentication in Office 2013 and Office 365 from Microsoft
 
2020 07-08 fireside chat sharing architecture
2020 07-08 fireside chat sharing architecture2020 07-08 fireside chat sharing architecture
2020 07-08 fireside chat sharing architecture
 
IDM in telecom industry
IDM in telecom industryIDM in telecom industry
IDM in telecom industry
 

Recently uploaded

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Recently uploaded (20)

Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Microsoft active directory services aliya presentation

  • 1. Active Directory Domain Services Authenticated Network Access By Aliya Saldanha – Business Analyst
  • 2.  The contact centre environment mandates a network that needs to be highly secure and scalable. Its users need access to various services, functionality and capacities on the domain or local system. Also, these users may need to be restricted or barred from accessing restricted services and network resources. For this, our client processes work in a specially demarcated network region known as a domain. Domains can be shared i.e. on the general organization domain or Isolated i.e. within its own domain cut off from the remaining organization units.
  • 3.  The applications and functions available to a user are defined in the Windows Active Directory which is a database that can be searched to provide network user information. It stores a wide range of domain information in a common and retrievable format. User accounts, computer accounts, group accounts, access control lists, security identifiers, Group Policy Objects (GPOs), shares, printers, properties about users and their locations, are all stored in the Active Directory.
  • 4.  The Active Directory allows the creation of hierarchies within a domain that facilitates user management and their segregation within the organization. Each domain hierarchy is composed of a number of ‘Organizational Units or processes’.  Eg – a client of a ticketing process may have a number of users. The TL’s and CSA’s may require access to certain network resources. For this, these users may be given the necessary access rights within that domain using AD services. Simultaneously the Quality and MIS team for this process may not require the same and this disabling or restriction is also done using AD services.
  • 5.
  • 6.  Within the organizational unit, there are varied users with access usage restrictions and control. So, the organizational unit acts as a container to group users and objects such as printers, computers, applications, hardware for segregation and application of policies.  The organizational unit hierarchy within a domain is independent of the structure of other domains; this means that each domain can create and implement its own hierarchy. The structure is totally flexible, and allows creation of organization environment that mirrors the administrative model.
  • 7.  The User Profile facilitates the authentication of user accounts and determines that a user who logs on to the domain is who the user claims to be and that the user does indeed have an account either in the domain or in a domain that is trusted.  After the user is authenticated, however, the CRM database must provide security role (authorization) to determine what objects the authenticated user can view or change and what kinds of changes are allowed.
  • 8.  CRM is based on Windows authentication therefore users logging into the CRM should have an account in the active directory. When a user attempts to login to the CRM, she/he is prompted to enter their WindowsLoginID, Password etc.  This entered information along with the domain name is the passed on to AD service which authenticates the user. If the details specified by the user are correct the AD service sends a reply specifying that the authentication was successful.
  • 9.  Upon successful authentication from the AD service, the application will attempt to connect to the CRM Database which stores the roles and their related accessibility.  If the windows ID has been provided access to the database a connection will be established. The application will then fetch the role assigned for that particular ID from the CRM Database.