this post was submitted on 08 Aug 2025
72 points (86.7% liked)
Linux
8908 readers
346 users here now
A community for everything relating to the GNU/Linux operating system (except the memes!)
Also, check out:
Original icon base courtesy of lewing@isc.tamu.edu and The GIMP
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I've played with LDAP and it is nothing vs. AD. Ever administered an AD domain? Crazy what all you can manage. It's not only a user auth tool, it's so much more.
only as part of a curriculum and in an apprenticeship; so nothing serious.
yeah sure you can manage the heck out of it. But what does one really need? Restricting/Enabling access to resources, and managing authentications right? And that's feasible with Kerberos and OpenLDAP, no?
I'm too far gone from my last AD admin job (7 years), but I mainly remember how tightly integrated everything was. I could play that infrastructure like a fiddle!
The greatest thing about AD is that it's a "single pane of glass", all there in one tool. One example, I used RADIUS auth with Network Policy Server (NPS) to manage wireless access. Put users in the appropriate group, never had to think about it again.
One of the best parts was how easy it was to manage with PowerShell. I had on on/offboarding script that would handle a dozen pain points at a button press.