Active Directory - The Powerhouse of Network Management
Active Directory - The Powerhouse of Network Management
authentication and management of network resources. It is like a digital directory for users’
computers and devices within a network.
Why Active Directory? Centralized management, Authentication and access control, Enhanced
Security, Scalability, SSO
What happens behind the scene? For example: employee logs in into their computer > AD
verifies their user and password > user can access shared files, printers or applications
Domain Controller (DC) is a server that hosts and runs Active Directory services handling these
authentication requests, enforcing security policies and ensuring proper access control across the
network.
These are the steps to configure and deploy Active Directory.
Step 1: Assign Static IP to the Server. Double check Default Gateway and Subnet Mask. The DNS
IP address must be the same as DC (this server).
Step 2: Change server name. The server reboots automatically.
Step 7: Check the box with Active Directory Domain Services. Here, we are configuring this
server as Active Directory Domain Controller Server. So, we are going to add that role. Click Add
Feature. Click Next.
Step 8: Click Next.
Step 13: Click Add a new forest. Add your Root Domain Name. Here it is techgirl.life.
Step 14: Add Directory Services Recovery Mode password. This password is used to access the
AD database for maintenance or recovery purposes when the domain controller is started in
Directory Services Restore Mode. Click Next.
Step 17: This is the Path in your Server where the Database of your Active Directory is stored.
Click Next.
Step 18: Verify all the information. Click Next.
Step 21: Click Tools. Click Users and Computers. The domain techgirl.life is here.
Conclusion: Deploying and configuring Active Directory Domain Services (AD DS) establishes
a centralized framework for managing network resources, user authentication, and security
policies. By following the outlined steps, the server is successfully promoted to a Domain
Controller, capable of handling authentication requests, enforcing security measures, and
managing access across the network. This setup provides scalability, enhances security, and
simplifies administration through centralized management, ensuring a robust and efficient network
infrastructure.