
To say the least, authentication is critical to the Always-On Business. When a user attempts to access a file on the corporate domain-based file server, either Kerberos and NTLM are authentication protocols used to verify the identity of a computer or user.


Domain Controllers are the heads of the infrastructure that controls access to resources through an authentication and login process. Microsoft’s Active Directory Services contains information about individual objects within the forest and stores the necessary information in a relational database ( ntds.dit). Ch.1 - Protecting the Active Directory Domain ServicesĬh.2 - Read-Only Domain Controller (RODC)Ĭh.3 - Recovering the Active Directory Domain ServicesĮvery component of the Modern Data Center requires authentication of some form or fashion.
