This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

The active directory administrative center

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

The active directory administrative center is one of the simplest ways to create new user’s accounts in windows. The administrator is required to log in to windows server 2012 R2 with the domain connected personal computer or domain administrators account, where remote server administration tools are installed. After that, the administrator is required to turn the ADAC on and start the server manager by clicking the blue icon that is situated next to the start button on the PC taskbar or even the server manager title that is on the start screen. When the server manager opens, then the admin should click on the active directory administrative center, then the administrator should click on the user button and then click on the new and users (Bala, 2019). Then the field labeled create user dial box and fill in the entire required field marked with a red star. Then the administrator should create a password and confirm it. After that, the admin should click the refresh button, and the new user will appear in the central pane. After creating this account, the administrator is required to provide the account details to the user and grant him administrative privileges. The purpose of these privileges is to help the user to be in a position to change the password or any other bios. Having these privileges, the user then becomes a member of the enterprise or the domain administrators group.

When there is a need to change account details such as the password, the username, and other bios, the user must open the active directory user and computers. Then the users account that needs changes are selected. After this, you are supposed to click on the right pane and right-click on the user’s account and click on the reset password option (Lundström, 2018).

The password should be typed, saved, and later confirmed. Other techniques also exist, and they include LDAPS or ADSI.

When shifting to the active directory, the administrator must consider the existing accounts and groups and look for means to incorporate them in active directory. As a result, a solution of connecting to office 365 through the Azure AD PowerShell module with a global administrator account is provided. Through the use of PowerShell, the admin is required to collect the groups as well as the existing user’s data from office 365. After all the data have been collected, it will be used during the creation of an active premise directory that later gets synchronized with O365 users. After that, the admin should add the UPN suffix in the domain of active directory and trust to match the domains of the email accounts stored in office 365. Then the OU(s) are created to help in the process of filtering users. Using the SCV file, the administrator should develop a new active directory user (Chilberto, Zaal, Aroraa & Price, 2020). After which the AD users are then added to the created active directory based on their suffixes. Through this, the system administrator will have ensured that existing groups and users are not left behind. They are still given a space to access their services in the active directory created through the Azure active directory connect.

The administrator will use security identifiers to ensure that they do not have challenges with users who have different settings in multiple computers. A security identifier refers to the unique identification number that can be said to be similar to a citizen identification card number, which a processor or a network controller uses to identify users (Vazquez, 2019). As a result, the administrator will only be considering the password as well as the security identifier of the user to grant authentication to use a network or an operating system. Whenever a user boots a personal computer, the windows administrator first checks whether the password entered is similar to that saved in the Kerberos domain authentication or the active directory. This makes it easier to allow a domain user to have access to a different computer, which he has different settings. When the password matches, the logged-in machine takes the user’s security identifiers and ensures that they reflect the administrator to allow the user to access the computer. This is an automated process that configures a person whenever he wants to use his domain account in windows or on a network..

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask