Categories
Tags
593 words
3 minutes
Active Directory Terminology
1. Core Components
1.1. Object
- Definition: Any resource within Active Directory (AD), such as users, computers, printers, OUs, and domain controllers.
- Examples:
- User:
bjones
- Computer:
WS01
- Organizational Unit (OU):
IT Department
- User:
1.2. Attributes
- Definition: Characteristics that define an object.
- Examples:
- User attributes:
givenName
(First Name),sn
(Surname),mail
(Email) - Computer attributes:
dNSHostName
,operatingSystem
- User attributes:
- LDAP Names: Used in queries (e.g.,
displayName
for “Full Name”).
1.3. Schema
- Definition: The blueprint of AD, defining object types and their attributes.
- Key Points:
- Defines classes (e.g.,
user
,computer
). - Each object is an instance of a class (e.g.,
RDS01
is an instance of thecomputer
class). - Instantiation: Creating an object from a class.
- Defines classes (e.g.,
2. Hierarchical Structure
2.1. Domain
- Definition: A logical group of AD objects (users, computers, OUs).
- Analogy: Like a city within a state.
- Key Points:
- Domains can be independent or connected via trust relationships.
2.2. Forest
- Definition: The top-level container holding all AD objects.
- Analogy: Like a country or state.
- Key Points:
- Contains one or more domains.
- Operates independently but may have cross-forest trusts.
2.3. Tree
- Definition: A collection of domains under a single root domain.
- Example:
- Root:
inlanefreight.local
- Child:
corp.inlanefreight.local
- Root:
- Key Points:
- Domains in a tree share a Global Catalog.
- Parent-child trust relationships exist.
2.4. Organizational Unit (OU)
- Definition: A container for organizing objects within a domain.
- Purpose: Used for applying Group Policies (GPOs) and delegation.
3. Identifiers & Security
3.1. Global Unique Identifier (GUID)
- Definition: A 128-bit unique ID assigned to every AD object.
- Key Points:
- Stored in
ObjectGUID
. - Never changes, even if the object is moved.
- Stored in
3.2. Security Identifier (SID)
- Definition: A unique ID for security principals (users, groups, computers).
- Format:
S-1-5-21-3623811015-3361044348-30300820-1013
- Key Points:
- Used in access tokens.
- Well-known SIDs (e.g.,
S-1-1-0
= “Everyone” group).
3.3. Distinguished Name (DN)
Definition: The full path to an object in AD.
Example:
cn=bjones,ou=IT,ou=Employees,dc=inlanefreight,dc=local
3.4. Relative Distinguished Name (RDN)
Definition: The unique name at a given level in the hierarchy.
Example:
In
cn=bjones,ou=IT
,bjones
is the RDN.
3.5. sAMAccountName
- Definition: The logon name (e.g.,
bjones
). - Limitation: Must be unique and ≤ 20 characters.
3.6. User Principal Name (UPN)
- Definition: An alternate login format (e.g.,
bjones@inlanefreight.local
).
4. Domain Controllers & Replication
4.1. FSMO Roles
- Definition: Flexible Single Master Operation roles for AD management.
- Five Roles:
- Schema Master (Forest-wide) – Manages schema changes.
- Domain Naming Master (Forest-wide) – Handles domain additions.
- RID Master (Per-domain) – Allocates Relative IDs for SIDs.
- PDC Emulator (Per-domain) – Manages password changes & time sync.
- Infrastructure Master (Per-domain) – Updates cross-domain references.
4.2. Global Catalog (GC)
- Definition: A DC that stores partial copies of all objects in a forest.
- Functions:
- Enables cross-domain searches.
- Assists in authentication.
4.3. Read-Only Domain Controller (RODC)
- Definition: A non-writable DC for branch offices.
- Security Features:
- No password caching (except its own).
- Prevents malicious replication.
4.4. Replication
- Definition: Synchronizing AD changes across DCs.
- Process:
- KCC (Knowledge Consistency Checker) manages replication paths.
- Ensures high availability.
5. Security & Access Control
5.1. Security Principals
- Definition: Objects that can be authenticated (users, computers, services).
- Example: A service account running
Tomcat
.
5.2. Access Control Lists (ACLs)
- Definition: Defines who can access an object.
- Components:
- DACL (Discretionary ACL) – Grants/denies access.
- SACL (System ACL) – Logs access attempts.
- ACE (Access Control Entry) – Individual permissions.
5.3. AdminSDHolder
- Definition: Protects privileged groups (e.g., Domain Admins).
- SDProp Process:
- Runs hourly on the PDC Emulator.
- Resets ACLs for protected groups.
5.4. adminCount Attribute
- Definition: Indicates if a user is protected by AdminSDHolder.
- Values:
1
= Protected.0
= Not protected.
6. Additional Concepts
6.1. Service Principal Name (SPN)
- Definition: Unique identifier for a service in Kerberos.
- Example:
HTTP/webserver.inlanefreight.local
6.2. Group Policy Object (GPO)
- Definition: A policy setting applied to users/computers.
- Stored in:
SYSVOL
(replicated across DCs).
6.3. NTDS.DIT
- Definition: The AD database file containing:
- User accounts.
- Password hashes (NTLM, Kerberos).
- Group memberships.
- Location:
C:\Windows\NTDS\NTDS.DIT
6.4. Tombstone & AD Recycle Bin
- Tombstone:
- A deleted object retained for 60-180 days.
isDeleted
flag set toTRUE
.
- AD Recycle Bin:
- Allows full recovery of deleted objects.
- Preserves most attributes.
6.5. SYSVOL
- Definition: A shared folder storing:
- GPOs.
- Logon scripts.
- File replication data.
6.6. sIDHistory
- Definition: Stores previous SIDs after migration.
- Security Risk: Can be abused for privilege escalation.
6.7. MSBROWSE (Legacy)
- Definition: Old protocol for network browsing.
- Replaced by: SMB/CIFS.
7. Tools
- ADUC (Active Directory Users & Computers) – GUI for managing AD.
- ADSI Edit – Advanced AD object editor.
- PowerShell – Scripted AD management.
Conclusion
Understanding these terms is critical for:
- AD administration.
- Security auditing.
- Penetration testing (e.g., exploiting
sIDHistory
, dumpingNTDS.DIT
).
Active Directory Terminology
https://fuwari.vercel.app/posts/ad-terminology/