Archive

Archive for the ‘Uncategorized’ Category

AD DS – Services & Ports Overview

November 14, 2012 1 comment

I actually made this Visio drawing for quite some time ago, however today a friend of mine asked me if I knew what ports AD DS used, so I just thought that I would share this with everybody 🙂

AD DS – Services and Ports Overview

Advertisements
Categories: Uncategorized

What’s going on?

December 16, 2011 Leave a comment

Hey folks

Really sorry for the absence but I’ve been really busy in the last month.

I’m currently involved in a few migration projects for some of our customers and as a bonus I’ve somehow got involved in another case with some strange VDI behavior which is top priority.

However I’ve just been so lucky that I was able to attend a course where Craig Forster were the instructor – this is one hell of a skilled guy… if you ever get a tough case regarding Active Directory, this guy is the one you need to call Microsoft for.
Craig is working for Microsoft as a Senior Premier Field Engineer and he really deserves that title.

Craig has a LinkedIn profile which you can find here: http://www.linkedin.com/in/craigforster

Anyway… please stay tuned as I’m about to post some really sweet new posts here on quite some interesting subjects.

Categories: Uncategorized

Achieved My Enterprise Administrator Title

October 25, 2011 Leave a comment

Just a simple post to let you all know, that I’m now certified as an Enterprise Administrator (MCITP: Enterprise Administrator).

I earned my title the October 14, 2011.

MCITP: Enterprise Administrator Certification

MCITP: Enterprise Administrator Certification

Categories: Uncategorized

Authentication vs. Authorization

September 19, 2011 Leave a comment

So what’s the difference between these 2 terms? Quite a lot of people, even senior enterprise administrators tend to get this one wrong.

Well let’s try to establish this once and for all:

Authentication is all about checking and validating that a user is who he says he is. Authentication is commonly based upon a username and a password (but from now on and in the future we should all really be heading towards certificates).
To set a daily task to the word “Authentication”, this is really what you do once you logon to the domain at work once you’ve booted up your computer.

Authorization determines wheter a user has access to resources – i.e. on a specific share on the company fileserver.
It involves SAM, ACLs (Access Control Lists) and Kerberos.

So to keep it in a phrase:
“You need to authenticate at a DC to be authorized access to a share”

Categories: Uncategorized