Search results
Results from the Health.Zone Content Network
Active Directory (AD) is a set of processes and services developed by Microsoft for Windows domain networks. It provides authentication, authorization, security, and other directory-based services for users, computers, and applications.
A Windows domain is a form of a computer network in which all user accounts, computers, printers and other security principals, are registered with a central database on domain controllers. Learn about the configuration, integration, Active Directory and workgroups of Windows domains.
AGDLP is an abbreviation for "account, global, domain local, permission", a scheme for implementing role-based access controls (RBAC) using nested groups in a native-mode Active Directory domain. Learn how AGDLP simplifies account management and security audits, and how it differs from other RBAC implementations in AD forests and Windows NT domains.
A domain controller (DC) is a server that responds to security authentication requests within a computer network domain. Learn about the software, implementation and examples of DCs in Windows, Linux and other platforms.
Group Policy is a feature of Windows operating systems that controls the working environment of user and computer accounts. It provides centralized management and configuration of operating systems, applications, and users' settings in an Active Directory environment.
Microsoft Entra ID is a cloud-based identity and access management solution that offers authentication and authorization services to various Microsoft services and third-party services. It was formerly known as Azure Active Directory and renamed in July 2023.
Learn how Windows creates and uses user profiles to represent the characteristics of the user. Find out the contents and functions of the profile folder, the NTUSER.DAT file, and the special profiles such as Default User and All Users.
ADFS is a software component by Microsoft that provides single sign-on access to systems and applications across organizational boundaries. It uses claims-based authentication and identity federation to maintain security and trust between security realms.