
Type the username and password of a user with at least read rights for the Microsoft Active Directory database.Check Map user accounts and groups from a directory service and select Microsoft Active Directory.If you are successfully connected to the domain, you can see a green icon with the name of your domain on the Directory Services tab. In the Join Domain dialog, type the domain name and credentials with rights to join the computer to the Active Directory domain.

If the firewall is not a member of the domain, click Join Domain.

To configure Kerio Control directory-service mapping to AD, certain conditions must be met.įor more information on the connection usages, please see Connection Advantages of Directory Services. Microsoft Active Directory, so-called AD, is a directory service for Windows domain networks. Apple Open Directory (OD) is used for Apple-based networks and Mac devices. The Microsoft Active Directory and Apple Open Directory are supported by Kerio Control. In Unix-based environments, one machine serves as the master domain controller and others serve as replica domain controllers, periodically replicating database information from the main domain controller and storing it in a read-only format.This article explains different ways of connecting Kerio Control to Directory Services. In a Windows environment, one domain controller serves as the Primary Domain Controller (PDC) and all other servers promoted to domain controller status in the domain server as a Backup Domain Controller (BDC).

Other components, such as a public key infrastructure (Active Directory Certificate Services, DogTag, OpenSSL) service and Domain Name System (Windows DNS or BIND) may also be included on the same server or on another domain-joined server.ĭomain controllers are typically deployed as a cluster to ensure high-availability and maximize reliability.

This includes the operating system (usually Windows Server or Linux), an LDAP service ( Red Hat Directory Server, etc.), a network time service ( ntpd, chrony, etc.), and a computer network authentication protocol (usually Kerberos). The software and operating system used to run a domain controller usually consists of several key components shared across platforms.
