Search icon CANCEL
Subscription
0
Cart icon
Cart
Close icon
You have no products in your basket yet
Save more on your purchases!
Savings automatically calculated. No voucher code required
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Active Directory Administration Cookbook

You're reading from  Active Directory Administration Cookbook

Product type Book
Published in May 2019
Publisher Packt
ISBN-13 9781789806984
Pages 620 pages
Edition 1st Edition
Languages
Author (1):
Sander Berkouwer Sander Berkouwer
Profile icon Sander Berkouwer
Toc

Table of Contents (16) Chapters close

Preface 1. Optimizing Forests, Domains, and Trusts 2. Managing Domain Controllers 3. Managing Active Directory Roles and Features 4. Managing Containers and Organizational Units 5. Managing Active Directory Sites and Troubleshooting Replication 6. Managing Active Directory Users 7. Managing Active Directory Groups 8. Managing Active Directory Computers 9. Getting the Most Out of Group Policy 10. Securing Active Directory 11. Managing Federation 12. Handling Authentication in a Hybrid World (AD FS, PHS, PTA, and 3SO) 13. Handling Synchronization in a Hybrid World (Azure AD Connect) 14. Hardening Azure AD 15. Other Books You May Enjoy

Handling Authentication in a Hybrid World (AD FS, PHS, PTA, and 3SO)

Azure Active Directory is Microsoft's cloud-based identity and access management service. Organizations can register for an Azure Active Directory (Azure AD) tenant, where they can store and use the information on their identities.

Hybrid identity is Microsoft Marketing speak for connecting an on-premise Active Directory environment to Azure AD. When done correctly, the hybrid identity implementation allows end-users to authenticate to both on-premise and cloud-based applications, systems, and services:

  • When accessing NTLM-, LDAP-, and Kerberos-integrated applications, systems, and services, the on-premise Active Directory takes care of authentication and authorization. These protocols are designed for safe networks and have been offering single sign-on for decades.
  • When accessing cloud-based applications...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €14.99/month. Cancel anytime}