Back to CyberPedia
Active Directory

What Is Active Directory?
Services, Components, and Enterprise Architecture Explained

Active Directory is a directory service developed by Microsoft for Windows domain networks that provides centralized authentication, authorization, and resource management. This article covers all five AD services, logical and physical architecture, Kerberos and LDAP protocols, security threats and hardening practices, hybrid identity with Microsoft Entra ID, and deployment planning for enterprise environments.

25 min read
Cybersecurity
54 views

Active directory is a directory service developed by microsoft for windows domain networks. It gives admins one place to manage network users, devices, and rules. Every firm that runs a windows server setup relies on active directory for login checks and access control. Below, you will learn how active directory works, what parts it has, and how to keep it safe.

What Active Directory Does and Why It Matters

Active directory is a cybersecurity cornerstone for business networks. Microsoft built this directory service to help admins run network users, devices, and resources from one spot. In short, active directory stores information about every object on a network. It then shares that data with users who have the right access. In short, it acts as a central location for access control across windows domain networks.

Before active directory existed, administrators had to manage user accounts on each machine separately. However, active directory changed that model. So now, firms create user accounts in one place and push security policies to every machine. For example, when a network user logs in, active directory checks the name and password against its records. If the credentials match, then the user gains access to permitted resources. This process covers both login and authorization.

Active directory stores information about objects such as user accounts, computers, printers, shared folders, and security groups. Essentially, all of these sit inside a structured data store set up as a tree-like hierarchy. From there, admins can search, sort, and manage thousands of objects from one screen. Moreover, active directory uses users groups and organizational units ous to ease bulk changes to rights and rules.

Organizations rely on active directory for three core reasons. First, it gives central login so network users prove their identity once and get access across the domain. Second, it pushes rules to thousands of devices from a central location through Group Policy. Third, it supports single sign-on so network users reach all allowed items without typing a password again. As a result, active directory cuts overhead and tightens access control across the whole domain.

90%
Cyberattacks exploit Active Directory (Mandiant)
~50%
Microsoft IR cases find insecure AD configs
99.9%
Automated attacks blocked by MFA (Microsoft)

Core Services Under the AD Umbrella

Most people think of AD as one product. In reality, it is a collection of related services that work together under one umbrella. Above all, the core piece is active directory domain services ad ds. However, four more services add features for federation, certificates, lightweight data stores, and rights protection. Clearly, each one fills a different need. Together, they form the identity backbone of windows server setups.

Active Directory Domain Services AD DS

Active directory domain services ad ds is the base of every windows domain network. Specifically, it holds data about domain members, checks their logins, and sets their access rights. In other words, the server that runs this role is called a domain controller. Once you install the ad ds role on a windows server, that box turns into a domain controller.

AD DS uses a structured data store based on the ntds.dit database file. Specifically, this file holds all objects in the directory, such as user accounts, computer records, and security policies. In detail, the engine behind ntds.dit is the Extensible Storage Engine (ESE). Microsoft also uses ESE in Exchange Server. In turn, domain controllers copy this data among themselves so each one has a full set. So if one domain controller goes down, the rest keep handling login requests. This way of storing directory data keeps things running at all times.

Active directory domain services ad ds also provides the schema. The schema defines what types of objects and traits can exist in the directory. It is shared across the full forest. Only the Schema Master FSMO role holder can change it. In addition, AD DS keeps a global catalog with data about every object across all domains in a forest. This catalog speeds up searches and cross-domain lookups. It is vital for large firms. Apps that need to find objects across domain lines query the global catalog instead of single domain controllers.

AD DS vs. AD — Same Thing?

Many people use “Active Directory” and “AD DS” as if they mean the same thing. In truth, active directory is the umbrella brand. Meanwhile, active directory domain services ad ds is the specific server role. But when someone says “AD,” they almost always mean AD DS.

Federation, Certificate, Lightweight, and Rights Services

Beyond AD DS, active directory includes four more services. First, Active Directory Federation Services (AD FS) gives single sign-on for web apps. It uses SAML, OAuth, and OpenID Connect to pass tokens between firms. As a result, users reach third-party apps outside the forest with no extra passwords.

Next, Active Directory Certificate Services (AD CS) issues and manages digital certificates. Firms use AD CS for encrypted traffic, code signing, and smart card login. Then, active directory lightweight directory domain services ad ds (AD LDS) works apart from domains. It gives apps their own directory store without touching the main domain.

Lastly, Active Directory Rights Management Services (AD RMS) guards sensitive documents. It uses encryption to block actions like viewing, editing, copying, or printing. Together, these services make active directory far more than a plain user database. They form a full identity and access control platform for business IT.

ServicePrimary FunctionRuns on Domain Controller?Requires AD DS?
AD DSAuthentication, authorization, directory storage✓ YesN/A — is AD DS
AD FSSingle sign-on, federated identity✕ Separate server✓ Yes
AD CSDigital certificate issuance and management◐ Optional✓ Yes
AD LDSLightweight directory for applications✕ Independent✕ No
AD RMSDocument rights protection, encryption✕ Separate server✓ Yes

Logical Structure of Active Directory — Domains, Trees, and Forests

Active directory puts objects into a logical tree. Obviously, knowing this tree is key for planning setups and managing access control. The three main tiers are domains, trees, and forests. On top of that, organizational units ous and groups give finer control inside each domain.

A domain is the basic admin boundary. Essentially, it groups network users, computers, and other objects that share one directory database. Each domain has its own security policies. Admins can manage all objects in that domain from one console. For reference, domains use DNS names, such as corp.example.com. In fact, active directory relies on DNS for name lookups and service finding.

When two or more domains share a contiguous namespace, they form a domain tree. For instance, corp.example.com and sales.corp.example.com form a tree because they share the example.com namespace. Trust links between domains in a tree are automatic and flow both ways. Therefore, users in one domain can reach items in another domain of the same tree if they have the right rights.

A forest is the highest-level container. It holds one or more domain trees under a single schema, config, and global catalog. The forest is also the top security boundary. As a rule, objects in different forests cannot talk to each other unless admins create explicit trust links. Typically, most small to mid-sized firms run a single forest. However, large firms or those born from mergers may use multiple forests.

Trust Relationships Between Domains and Forests

Trust links define how domains and forests share login authority. Inside a forest, all domains trust each other by default through two-way, transitive links. Between forests, however, admins must set up external or forest trusts by hand. Specifically, an external trust joins two specific domains in different forests. Meanwhile, a forest trust joins two full forests and can be one-way or two-way. Setting up trust links properly is vital for firms that buy other companies or keep separate security zones for compliance.

Organizing Objects with OUs and Groups

Inside each domain, organizational units ous act as sub-folders. They let admins hand off control over certain objects without giving domain-wide rights. For example, an OU named “Finance” can hold all finance department user accounts, and a junior administrator can manage just that OU. Also, organizational units ous are the main target for Group Policy Objects. When you link a GPO to an OU, those settings apply to every object inside it. Users groups further ease access control because admins set rights on groups instead of on each user account.

OU Design Tip

Build organizational units ous around who needs control, not around org charts. If two teams need the same rules, they can share an OU. On the other hand, split a team into two OUs if they need different rules.

Physical Components — Domain Controllers and Sites

The logical structure says how objects are sorted. In contrast, the physical structure says where data lives and how it moves. Domain controllers and sites are the two main physical parts. Together, they keep active directory up, fast, and in sync across spread-out networks.

In short, domain controllers are servers that run the active directory domain services ad ds role. Specifically, each domain controller holds a full copy of the domain database. It also handles login requests. As a rule, most firms deploy more than one domain controller for backup. So if one fails, the rest keep checking network users and pushing rules with no downtime.

All domain controllers take part in multi-master replication. So, changes made on one controller flow to all other domain controllers in the same domain. Therefore, admins can update objects on any controller, and those changes spread on their own. There are two types of this: intra-site (within a site) and inter-site (between sites). Intra-site replication fires almost right away using change alerts. Inter-site replication runs on a set schedule and compresses data to save WAN bandwidth.

FSMO Roles and Replication

However, five tasks need a single lead controller. These are the FSMO roles: Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master. Notably, Schema Master and Domain Naming Master are forest-wide. Only one of each exists in the entire forest. In contrast, the other three are domain-wide. Each domain gets its own RID Master, PDC Emulator, and Infrastructure Master. Of these, losing the PDC Emulator hurts the most. It handles password changes, time sync, and lockout checks for all network users.

Sites represent physical network locations. Physically, a site maps to a well-linked subnet or group of subnets. Active directory uses site data to tune replication traffic and point clients to the nearest domain controller. For instance, when a user at a branch office logs in, active directory sends the login to a domain controller at that same site. This avoids slow WAN links.

Global Catalog Servers

The global catalog is another key physical part. A global catalog server is a domain controller with a full copy of its own domain and a partial copy of every other domain in the forest. As a result, this setup enables cross-domain searches and universal group lookups. Without one, users cannot log in when universal group checks are needed.

Schema Master
Controls all updates to the active directory schema. Only one per forest. Required for schema extensions.
Domain Naming Master
Manages adding or removing domains in the forest. Only one per forest.
RID Master
Allocates pools of relative identifiers to domain controllers. One per domain. Prevents duplicate SIDs.
PDC Emulator
Handles password changes, account lockouts, and time synchronization. Most operationally critical FSMO role.
Infrastructure Master
Updates cross-domain references (phantom objects). One per domain. Not needed if all DCs are global catalog servers.

How Active Directory Authentication Works

Authentication checks who a user is before letting them in. Specifically, active directory supports two main login protocols: Kerberos and NTLM. It also uses the lightweight directory access protocol to look up directory data. Therefore, knowing these protocols helps admins fix login issues and tighten access control.

By default, Kerberos is the default login protocol in active directory setups. When a user logs in, the domain controller’s Key Distribution Center (KDC) hands out a Ticket Granting Ticket (TGT). Then the user shows this TGT to get service tickets for specific items. Notably, Kerberos never sends passwords over the wire. Instead, it relies on encrypted tickets and time-stamped tokens. This makes Kerberos far safer than older methods.

In detail, the Kerberos process works in three steps. First, the AS exchange checks the user’s credentials and issues a TGT. Second, the TGS exchange uses the TGT to create a service ticket for one resource. Third, the CS exchange shows the service ticket to the target server, which says yes or no. All tickets have a set life span. TGTs last ten hours by default. So even if a ticket is stolen, it expires soon. Admins can change ticket life spans through Group Policy to balance safety with ease of use.

By contrast, NTLM is an older challenge-response protocol. Active directory keeps NTLM for backward fit with old systems that do not support Kerberos. However, NTLM is less safe because it relies on password hashes. Worse, bad actors can grab and reuse these hashes in Pass-the-Hash attacks. For this reason, admins should turn off NTLM where they can and enforce Kerberos instead.

LDAP — The Directory Query Protocol

The lightweight directory access protocol is the main way to query and change active directory objects. Apps and clients use the directory access protocol ldap to search, pull user traits, and update records. LDAP runs on port 389. LDAPS (LDAP over SSL) uses port 636 for encrypted links. Also, the lightweight directory access protocol is not a login protocol. It is only the pipe that lets systems talk to the directory.

Technically, LDAP queries use a specific syntax tied to the directory tree. Specifically, every object has a Distinguished Name (DN) that pins its spot in the tree. For example, a user named John Smith in the Sales OU of the corp.example.com domain has the DN: CN=John Smith,OU=Sales,DC=corp,DC=example,DC=com. Admins and apps use these DNs to find, read, and change objects in active directory. Port 3268 opens the global catalog via the lightweight directory access protocol. This enables forest-wide searches across all domain controllers.

Disable Unsigned LDAP

Unsigned LDAP links expose credentials to sniffing. So, enforce LDAP signing and channel binding on all domain controllers. Microsoft says LDAPS or LDAP signing is a baseline for every active directory setup.

Group Policy and Access Control in Active Directory

Arguably, Group Policy is one of the strongest tools in active directory. Essentially, it lets admins define and push settings to all domain-joined devices from one place. In practice, Group Policy Objects (GPOs) hold rules for passwords, software, firewalls, and many more items.

GPOs link to sites, domains, or organizational units ous. Whenever a user or computer falls under a GPO, those rules kick in on their own. Technically, the order of weight follows the LSDOU model: Local first, then Site, then Domain, then OU. If rules clash, the last GPO applied wins. Also, security filters and WMI filters let admins aim GPOs at specific users groups.

Furthermore, access control in active directory works through Access Control Lists (ACLs). In practice, every object has an ACL that says which users or groups can read, change, or delete it. Specifically, these rights can be set by hand or passed down from parent objects. By default, rights set on a parent OU flow down to child objects. Admins use organizational units ous to draw permission lines. For instance, a helpdesk team can reset passwords in their OU but see nothing in other OUs.

Importantly, good access control means knowing the gap between security groups and email groups. On one hand, security groups get rights and control access to items. In contrast, email groups only work as email lists. Active directory has three group scopes: domain local, global, and universal. Specifically, domain local groups grant rights inside one domain. Meanwhile, global groups pull users from one domain but can get rights in any domain. Additionally, universal groups span the whole forest and live in the global catalog. A best practice is the AGDLP model: put Accounts in Global groups, nest those into Domain Local groups, then give Permissions to the Domain Local groups.

Delegation and Least Privilege

Delegation of control is another way to cut risk. Instead of giving Domain Admin rights, admins hand off specific tasks like password resets to junior staff. This follows least privilege and shrinks the blast zone if an account is breached. In fact, AD ships a Delegation of Control wizard that makes this easy for organizational units ous.

Active Directory Security Threats and Hardening Practices

Active directory is the top target for attackers in business IT. According to a Mandiant report, nine out of ten cyberattacks hit an active directory server. On top of that, the Microsoft Digital Defense Report says about half of all incident response cases found insecure active directory settings. Clearly, these numbers make hardening a must.

Specifically, common attacks on active directory include Pass-the-Hash, Pass-the-Ticket, Kerberoasting, Golden Ticket, and DCSync. In a Pass-the-Hash attack, a bad actor steals an NTLM hash and uses it to log in without the real password. Kerberoasting goes after service accounts by pulling Kerberos tickets and cracking them offline. Golden Ticket attacks forge TGTs, giving the attacker open access to every item in the domain. Ultimately, each attack exploits gaps in login protocols or how privileges are handed out.

Pass-the-Hash
Attacker reuses a stolen NTLM hash to authenticate. Mitigate by disabling NTLM and enforcing Kerberos on domain controllers.
Kerberoasting
Attacker requests service tickets and cracks them offline. Mitigate with strong service account passwords and managed service accounts.
Golden Ticket
Attacker forges a TGT using the KRBTGT hash. Mitigate by rotating the KRBTGT password regularly and monitoring for anomalous tickets.
DCSync
Attacker mimics replication to extract password hashes from domain controllers. Mitigate by restricting replication rights.

Hardening Checklist for AD Environments

Hardening active directory calls for layers of defense. Start by applying least privilege. Then, remove extra accounts from Domain Admins, Enterprise Admins, and Administrators groups. Then, use tiered admin: Tier 0 for domain controllers, Tier 1 for servers, Tier 2 for workstations. Never use Tier 0 logins on lower-tier devices.

Next, enforce multi-factor authentication for all privileged accounts. The Microsoft report shows MFA blocks 99.9% of automated attacks. Also, turn on LDAP signing and channel binding on all domain controllers. Then, watch active directory logs for red flags like failed logins, odd replication calls, and changes to high-privilege groups. Forward these logs to a SIEM platform for real-time alerting.

Patching is another key hardening step. Above all, domain controllers must get security patches fast. Unpatched holes can give attackers direct access to the active directory database. Also, deploy domain controllers on their own hardware. Strengthen each connected device with endpoint security agents. Do not put them next to app workloads, file shares, or web servers. This keeps the attack surface small and blocks lateral movement.

Stale accounts pose a quiet but real risk. For example, old employee accounts, orphaned computer accounts, and idle service accounts all open attack paths. So, run audits to disable or delete accounts that have not logged in within 90 days. Additionally, review service account rights each quarter to make sure they follow least privilege. Fortunately, managed service accounts automate password rotation and cut the risk of leaked credentials.

Key Takeaway

Hardening is not a one-time project. Treat it as a continuous cycle of auditing privileged access, patching domain controllers, rotating credentials, and monitoring for anomalous behavior.

Active Directory and Microsoft Entra ID — On-Premises Meets Cloud

Active directory was built for on-premises windows domain networks. It excels at managing devices, user accounts, and rules inside a corporate LAN. However, as firms adopt cloud tools, they need an identity platform that goes beyond the LAN. Microsoft Entra ID (once called Azure Active Directory) fills that role.

Essentially, Entra ID is a cloud-based identity and access management service. It handles logins for cloud apps like Microsoft 365, Azure, and thousands of third-party SaaS products. While active directory uses Kerberos and the lightweight directory access protocol, Entra ID uses OAuth 2.0, OpenID Connect, and SAML. The two serve different worlds but share one goal: checking identities and controlling access.

In practice, most firms do not pick one over the other. Instead, they run both in a hybrid setup. Specifically, Azure AD Connect syncs user accounts, passwords, and group links between on-premises active directory and Entra ID. This gives network users one identity across both worlds. They log in on-prem through active directory and reach cloud apps through Entra ID with one set of credentials.

Hybrid Identity Synchronization Methods

Currently, hybrid setups offer three sync methods. Password hash sync copies hashed passwords to Entra ID. So cloud logins do not depend on local domain controllers. Pass-through login sends every cloud login back to local domain controllers in real time. Federation with AD FS hands cloud logins to the firm’s own federation servers. Each method trades off between complexity, speed, and resilience. Password hash sync is the simplest. It also gives disaster recovery power because cloud logins still work even if on-premises active directory goes down.

CapabilityActive Directory (On-Premises)Microsoft Entra ID (Cloud)
Authentication ProtocolKerberos, NTLMOAuth 2.0, OpenID Connect, SAML
Directory ProtocolLightweight directory access protocol (LDAP)REST APIs (Microsoft Graph)
Device ManagementGroup Policy, domain joinIntune, Entra ID Join
FederationAD FSBuilt-in federation
DeploymentOn-premises domain controllersMicrosoft-managed cloud setup
Best ForLAN-based, windows server workloadsCloud-first, SaaS-heavy setups

Firms planning a full cloud move should check how much they rely on on-premises active directory services. Apps that rely on Kerberos, NTLM, or the lightweight directory access protocol may need major changes before they can move to Entra ID. A phased move — starting hybrid and shifting step by step — cuts risk and keeps things running for network users.

Planning an Active Directory Setup

Clearly, setting up active directory takes careful planning. Otherwise, a bad design leads to admin headaches, security holes, and slow performance. The planning process covers four areas: naming, domain controller placement, OU layout, and DNS.

First, pick your naming plan. Specifically, choose a DNS domain name that matches the firm’s identity. For example, many firms use a subdomain like ad.company.com to avoid clashes. Since active directory depends fully on DNS for service location, DNS must work well. Essentially, domain controllers put SRV records in DNS. Clients use these records to find the nearest controller. Therefore, set up DNS right before you install the ad ds role on any windows server.

Next, plan where to put domain controllers. As a rule, every site with many network users should have at least one local domain controller. This cuts WAN load for logins and speeds up sign-in times. For backup, deploy at least two domain controllers per site. Put the PDC Emulator FSMO role at the biggest site. It handles time-critical tasks like password changes and lockouts.

Then, design your OU layout around who needs access and what rules apply — not the org chart. Specifically, create top-level organizational units ous for Users, Computers, Servers, and Groups. Nest team-level OUs beneath them. As a result, this makes it easy to apply different rules to each type and hand off admin tasks.

Finally, test everything in a lab before going live. Check replication between domain controllers and verify that the lightweight directory access protocol queries work as expected. After all, fixing active directory design mistakes after go-live is hard and costly, so invest time in testing now.

Backup, Recovery, and Documentation

Backup and disaster recovery need equal focus. Active directory data is part of the Windows Server system state. Specifically, regular system state backups guard against accidental deletes, data corruption, and ransomware aimed at domain controllers. Also, turn on the AD Recycle Bin to allow quick restore of deleted objects with all their traits intact. Without it, restoring a deleted user account means a full restore from backup, which takes much longer.

Also, document the active directory topology well. Specifically, write down FSMO role spots, DNS zone settings, replication schedules, trust links, and GPO ties. If a domain controller fails or organizational units ous need changes, good docs save hours of troubleshooting. Always treat these docs as a living record that updates each time the directory changes.

Enterprise IT Integration and Automation

Importantly, active directory is not just a login engine. It also serves as the glue for dozens of business apps and services. Exchange Server, SharePoint, SCCM, and Remote Desktop Services all depend on active directory domain services ad ds for identity checks and access control.

For example, For example, Exchange Server uses active directory to store mailbox data, email lists, and address book info. Whenever a user sends an email, Exchange queries the directory to find the recipient and check rights. Similarly, SharePoint relies on active directory for user login and group-based access to sites and documents. Consequently, without working domain controllers, both platforms go down.

Similarly, SCCM uses active directory for device discovery, software push, and compliance reports. In practice, it reads the directory to find computers, check their OU, and apply software packages. Likewise, Remote Desktop Services uses active directory to verify users before granting sessions. In every case, the app trusts domain controllers to check identities and enforce access control.

Active directory also integrates with non-Microsoft systems. Linux and macOS devices can join active directory domains using tools like SSSD, Samba, or native directory bindings. Network appliances such as firewalls, VPN concentrators, and wireless controllers authenticate users against active directory via RADIUS or the lightweight directory access protocol. As a result, this cross-platform skill makes active directory the de facto identity standard in mixed-OS business setups running on windows server gear.

Compliance, Auditing, and Automation

Beyond app ties, active directory plays a big role in compliance and auditing. For example, rules like HIPAA, PCI DSS, and SOX require firms to show who accessed what data and when. Active directory logs login events, group changes, and permission changes. Feeding these logs into a central SOC allows security teams to generate audit reports, detect rule violations, and respond to incidents before they escalate. Without a well-kept active directory, compliance and data loss prevention get much harder.

Automation is another area where active directory shines. For instance, Firms can also engage managed cybersecurity services for ongoing AD monitoring. PowerShell modules for active directory domain services ad ds let admins script user setup, group changes, OU creation, and bulk updates. These automated workflows cut human error and speed up onboarding. For example, an HR system can fire a script that creates a user in active directory, puts it in the right organizational units ous, adds it to the right users groups, and sets up a mailbox — all with no manual work.

Conclusion

In summary, active directory remains the base of identity and access management in business IT. Specifically, it is a service developed by microsoft that stores information about network users, computers, and resources in a structured data store. From domain controllers and organizational units ous to Kerberos and the lightweight directory access protocol, each part plays a clear role in securing windows domain networks.

However, active directory is also a high-value target for attackers. So, hardening steps like least privilege, MFA, LDAP signing, and steady monitoring are vital to protect it. As firms move to hybrid and cloud-first setups, linking active directory with Microsoft Entra ID keeps identities safe in both worlds. Whether you manage ten user accounts or ten thousand, active directory offers the structured data store, access control, and rule enforcement that modern firms need.

Sources and References

References

Frequently Asked Questions
What is the difference between Active Directory and LDAP?
Active directory is a complete directory service that manages users, computers, and rules. The lightweight directory access protocol is the communication protocol that applications use to query and modify the active directory database. LDAP is one component of active directory, not a competing product.
Is Active Directory the same as Microsoft Entra ID?
No. Active directory runs on-premises on domain controllers. Microsoft Entra ID (formerly Azure Active Directory) is a cloud-based service. They serve different setups but can work together in hybrid settings using Azure AD Connect.
What are the five FSMO roles in Active Directory?
The five Flexible Single Master Operations roles are Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master. The first two are forest-wide; the remaining three are domain-wide.
Can Active Directory work with non-Windows devices?
Yes. Linux and macOS devices can join active directory domains using SSSD, Samba, or native directory bindings. Network appliances authenticate against active directory via RADIUS or LDAP.
What happens when a domain controller goes down?
If other domain controllers exist, they continue handling login and directory queries. If the failed controller held a FSMO role, that role must be seized or transferred to another controller. Single-DC setups lose all login capability until the controller is restored.


Stay Updated
Get the latest terms & insights.

Join 1 million+ technology professionals. Weekly digest of new terms, threat intelligence, and architecture decisions.