Chapter2 - Account Management
Chapter2 - Account Management
COURSE
NETWORK TECHNOLOGY
5/44
/50 6/44
/50
And more
7/44
/50 8/44
/50
Local USERS Account Local GROUP Account
Computers that are part of a workgroup (peer-to- Local group accounts can be used to simplify assigning rights and
peer networking) maintain their own database of permissions to multiple local user accounts.
local users and groups. When you assign rights or permissions to a local group account,
each member of the group receives those rights and permissions.
When connecting to a shared resource on another computer, you
must prove your identity to that computer before it allows you access rights and
permissions 2
to the resources based on your permissions within the ACL.
Log into that computer using a local user account that has rights and
permissions to the resource. permissions 1 rights and
permissions 4
rights and
permissions 3
9/44
/50 10/44
/50
The computer account password is initially set when the computer joins
A computer account in AD is a security principal (same as user accounts
the domain and is used for authentication in much the same way as a
and security groups)
password is.
The difference is that a password have to be
Has a number of attributes: changed on a regular basis in order for the computer to authenticate
o Security IDentifier (SID), to the domain.
o memberOf, o Ex: No need to change computer account password about every
o lastlogondate, 30 days.
o passwordlastset,
Computer accounts are members of the Domain Computers AD
o etc.
group by default.
13/44
/50 14/44
/50
Active directory users and Computers Active directory users and Computers
The most common utility used to create and manage OUs, Users, and By default, a new domain only has one OU called Domain Controllers
Groups within an Active Directory domain that contains the computer accounts for the domain controllers within
the domain.
Other folders exist to organize the default objects within the domain:
Builtin contains domain local security groups that were previously
local groups within the SAM database on the computer that was
promoted to become the first domain controller in the domain (e.g.,
Administrators, Users, and Guests).
Account: logon name, domain name, and account options o Associate a logon script and a home folder (directory) with an
o Ex: requiring the user to change her or his password at next account.
logon, and account expiration date, if one applies. A logon script is a file of commands that are executed at
o Ex: Set up an account only signs in to the domain at designated logon.
times, such as only from 8:00am to 7:00pm Monday through home folder is disk space on a particular server given to a
Friday. user to store his or her files.
19/44
/50 20/44
/50
Domain User Accounts Domain User Accounts
User attributes: User attributes:
Telephones: telephone contact numbers for an account holder Member Of: group belong to.
(home, pager, mobile, fax, and IP phones).
Dial-In: Allows to control remote access from dial-in modems or
Organization: account title, department, company name, from virtual private networks (VPNs).
and the name of the manager.
Environment: startup environment for clients who access one or
Remote Control: remote control parameters for a client who uses
more servers using Remote Desktop Services (for running programs
Remote Desktop Services.
on the server).
Remote Desktop Services Profile: User profile for a client who
uses Remote Desktop Services. Sessions: session parameters for a client using Remote Desktop
Services (session time limit, a limit on how long a session can be
COM1: Specifies the COM1 partition set of which the user is a idle, what to do when a connection is broken, and how to
member. reconnect).
21/44
/50 22/44
/50
There are two types of groups in Active Directory: Are not security enabled.
Distribution groups: Used to create email distribution lists. o have Security Identifier (SID).
Security groups: Used to assign permissions to shared resources. o Cannot be listed in Access control lists (ACLs).
23/44
/50 24/44
/50
Domain Group Accounts Domain Group Accounts
Security groups Security groups
Provide an efficient way to assign access to resources on your Listed in ACLs that define permissions on resources and objects.
network.
o Each group has a unique SID. When assigning permissions for resources (file shares, printers, and
o Assign user rights to security groups in Active Directory. so on), should assign them to a security group rather than to
User rights are assigned to a security group to determine what individual users.
members of that group can do within the scope of a domain
or forest. Security groups can also be used as an email entity.
o Assign permissions to security groups for resources.
Permissions are assigned to the security group for the shared
resource. Permissions determine who can access the resource
and the level of access
o Adding a group to the membership list of another group. Three group scopes are defined by Active Directory
o Universal
o Member group will be applied the right and permission of the o Global
container group. o Domain Local
o (Local)
27/44
/50 28/44
/50
Group scope Group scope
Local (Machine Local) group Universal group
Are specific to and available only on the computer they were created Possible Members:
on. o Accounts from any domain in the same forest.
o Global groups from any domain in the same forest.
Stored on the local SAM (Local Computer) use for security settings o Other Universal groups from any domain in the same forest.
that apply just to this one machine.
29/44
/50 30/44
/50
31/44
/50 32/44
/50
Group scope
Recommends using a combination of global, universal, and domain local
security groups within a forest to organize the assignment of
permissions in a way that is easy to modify and document.
3 Account creating
Default Active Directory security groups:
https://docs.microsoft.com/en-us/windows-server/identity/ad-
ds/manage/understand-security-groups#account-operators
33/44
/50 34
Account creating
4 Account policies
35/44
/50 36
Account Policies Password Policy
Contains: Setting Description
Password Policy: allows to set password requirements Enforce password history Sets the number of passwords (between 0
Account Lockout Policy: defines when an account will be locked and 24) that have to be unique before a user
out and for how long it will be locked can reuse an old password.
Kerberos Policy: allows you to define the lifetime for the different Maximum password age Sets the maximum number of days that a
ticket types password can be used before the user is
required to change it. A value of 0 ensures
that passwords do not expire.
Minimum password age Sets the number of days that a password
must be used before a user is allowed to
change it.
Minimum password length Sets the minimum number of characters
required in a password (from 0 to 14)
37/44
/50 38/44
/50
Kerberos Policy
THANK YOU FOR YOUR ATTENTION
Setting Description
Maximum Tolerance For Maximum time difference allowed between a
Computer Clock Kerberos message timestamp and the
Synchronization receiving current time.
If the time difference falls outside this limit,
the message is considered invalid. The
default is 5 minutes. Timestamp messages
are corrected for time zone, so important
to have the correct time zone set on all
computers in the domain and have the
domain controller clocks synchronized with a
reliable source. Nguyen Minh Tri, Ph.D.
By default, member computers are Department of Telecommunications - Networks
synchronized with the clock. Faculty of Electronics - Communications
University of Science, Vietnam National University Ho Chi Minh City
Email: [email protected]
43/44
/50