Term
Active Directory Users and Computers |
|
Definition
An Active Directory MMC tool that allows you to create various objects such as OUs, user accounts, groups, computers, and contacts. |
|
|
Term
|
Definition
The process by which a user's identity is validated, which is subsequently used to grant or deny access to network resources. |
|
|
Term
|
Definition
A command-line utility that can be used to import and export data to and from Active Directory in a comma-separated file format. |
|
|
Term
down-level operating system |
|
Definition
An operating system running Windows NT 4.0 or earlier. |
|
|
Term
|
Definition
A command-lie utility used to add objects to Active Directory |
|
|
Term
|
Definition
A command-line utility used to modify Active Directory objects. |
|
|
Term
|
Definition
A command-line utility used to move or rename Active Directory objects. |
|
|
Term
|
Definition
A command-line utility used to query for Active Directory objects. |
|
|
Term
|
Definition
A command-line utility used to delete Active Directory objects. |
|
|
Term
|
Definition
Enables the centralized management of user desktop settings, desktop and domain security, and the depoloyment and management of software throughout your network. |
|
|
Term
interactive authentication |
|
Definition
the process by which a user provides their user name and password to be authenticated from the Log On to Windows dialog box. |
|
|
Term
|
Definition
The primary authentication protocol used in Active Directory domain environents. |
|
|
Term
Key Distribution Center [KDC] |
|
Definition
An Active Directory domain controller that stores the directory database containing all users and passwords. |
|
|
Term
|
Definition
A command-line utility that can be used to import and export data to and from Active Directory using the LDAP Interchange Format file format. |
|
|
Term
|
Definition
A user profile stored on a particular computer that doesn't follow a user across the network. |
|
|
Term
|
Definition
A user profile with settings that are not changed when a user logs off. |
|
|
Term
|
Definition
The process by which a network resource or service confirms the identity of a user. |
|
|
Term
|
Definition
The challenge-response protocol that is used for authetication purposes with operating systems running Windows NT 4.0 or earlier. |
|
|
Term
|
Definition
A user profile stored on a centralized server that follows a user across a network. |
|
|
Term
|
Definition
A Kerberos ticket granted by a KDC allowing a client to gain access to a network resource or service. |
|
|
Term
ticket-granting ticket [TGT] |
|
Definition
A ticket passed to a client system by the KDC once successful authentication occurs. |
|
|
Term
|
Definition
An object that is stored in Active Directory that represents all of the information that defines a physical user who has access permissions to the network. |
|
|
Term
|
Definition
A special user account configured with settings that can be copied in order to simplify the creation of user accounts with common settings. |
|
|
Term
|
Definition
The desktop and environment settings associated with a particular user account. |
|
|