Active Directory Services Directory Services Term Paper

The disadvantages of using Directory Services are the costs associated initially for creating and keeping them current, the need to have a staff of engineering and software experts on-hand to add functionality to the system as needed, and the complexity of integration across different Directory Services architectures at the operating system level. Directory Services can be extremely complex and when used for role-based access within enterprises, can lock employees out of their own files and systems and the ones they need to use for their jobs as well if only a slight variation is made in the security levels of the users. There is also the downside risk of technology obsolescence as many companies will standardize on a vendors' specific version fo Directory Services, only to find their company moving in an entirely different direction over time. The risk of incompatibility to other systems from suppliers, partners, and buyer or customers' systems is also significant. This is especially the case in enterprise systems that often rely on hundreds of namespaces on the same network, and the coordination of application instances across each one (Chen, Chen, Maa, 2002). Finally the complexities of licensing across Directory Services implementations can be very expensive and also very complex, especially for Microsoft Active directory Services (Pleas, 1999).

What disaster recovery options are available for Directory Services?

The basic nature of a Directory Service is to replicate content and files to ensure fault tolerance and redundancy over time. The use of namespaces for fault tolerance has also been incorporated into specific variations of the UNIX operating system (Thibodaux, 2005). Directory Services vary in their approach to backing system...

...

The use of Active Directory Services for managing re-connection to network resources through X.500 protocols is now commonplace and often completed using Web Services to initiate and maintain connections over time (O'Mahony, Weldon, 1995). Finally, certain vendors' Directory Services includes security and authentication role-based access so that only those with security clearances can gain access to data.

Sources Used in Documents:

References

Bernstein, Philip a. (1996). Middleware: A model for distributed system services. Association for Computing Machinery. Communications of the ACM, 39(2), 86.

Ruey-Shun Chen, CC Chen, & Shine-Ching Maa. (2002). An integration of directory services in enterprise. International Journal of Computer Applications in Technology, 15(1-3), 51-59.

O Mahony, Donal, & Weldon, Neil. (1995). X.500 directory services support for electronic data interchange (EDI). Computer Networks & ISDN Systems, 27(5), 691.

Keith Pleas. (1999, December). Communicating with Active Directory. PC Magazine, 18(21), 265-267.


Cite this Document:

"Active Directory Services Directory Services" (2010, November 15) Retrieved April 20, 2024, from
https://www.paperdue.com/essay/active-directory-services-directory-services-6756

"Active Directory Services Directory Services" 15 November 2010. Web.20 April. 2024. <
https://www.paperdue.com/essay/active-directory-services-directory-services-6756>

"Active Directory Services Directory Services", 15 November 2010, Accessed.20 April. 2024,
https://www.paperdue.com/essay/active-directory-services-directory-services-6756

Related Documents

The AD MMC even permits multi-selection and editing of user objects, which is a potential reclaimed from the NT user Manager days. Among the greatest changes in the MMC is the Saved Queries. Saved Queries permit the user to build XML-based queries into your AD users & Computers MMC and refresh them periodically to achieve the updated results. This gives the capability to really build custom views and reports

These certificates are issued by the certification authorities (CAs) and they contain the name, expiration dates as well as serial numbers of the certificates. OS Hardening Operating system hardening is the process of addressing the various security issues and vulnerabilities in a given operating system via the implementation of the latest Operating system patches, updates, hotfixes as well procedures and policies that are necessary for reducing the number of attacks as well

In addition to these two Director-level positions, the roles of the users of the databases and data mining applications also need to be taken into account. The sales, marketing, product management, product marketing, and services departments all need to have access to the databases and data mining applications. In addition, branch offices that access the company's applications over the shared T1 line will also need to have specific security

Window Security Implementation Scenario NextGard Technologies specializes in the network consulting services for small, medium and large organizations inside and outside the United States. Currently, NextGard has approximately 250,000 employees in 5 countries and the company corporate headquarter is located at Phoenix, AZ. However, the company decides to secure and upgrade its current network to enhance organization efficiencies. Currently, the company has 5 district offices at the following locations: New York City, New

After server authorization four domains for giving and registration of addresses of clients are created. "If a physical LAN has more than one logical subnet, how can different groups of clients be allocated addresses on different subnets? One way to do this is to preconfigure each client with information about what group it belongs to. A DHCP feature designed for this is the user class option. To do this, the

This software is used to perform common tasks like storage, data back up and data transfers. Small and medium businesses have embraced this technology because it involves no start up costs (like servers, hard disks, technicians etc.) therefore making it cost effective. Basically payment is based on the storage space taken by the user, again, this makes it user friendly. It may also be referred to as hosted storage. The flying