Here is my situation ...
I am writing a .Net / C # security system (authorization and authentication) for a large collection of web applications that require a single registration process. I use Active Directory as a data warehouse and have written a very good prototype that interacts with AD through LDAP. This component retrieves information about a registered user that I saved in AD, which I then use to set their security roles in .NET authentication.
1) All is well.
Not being a system administrator or network engineer, I was not familiar with the amount of system administration involved in setting up an AD instance. I did not know that for each domain I needed a separate server and domain controller. As it turned out, there are 9 different domains that my team needs to configure for all the different environments that we will access AD ...
- env1.dev.mycompany.com
- env1.qa.mycompany.com
- env1.stage.mycompany.com
- env2.dev.mycompany.com
- etc.
... So now I have put on some administrative headache because I will have to support all these machines (or virtual machines), which I'm not necessarily sure what I want to do.
2) Everything is bad.
The prototype is really strong, and AD creates a very good database for the solution, but now I am wondering if I should give up the code and write the SQL Server data provider instead (I know that .Net already provides one, but this does not fit my business -authorization requirements).
In any case, I am trying to think over this problem from a high level point of view. In general, I continue to argue that I would choose a really good solution just because of some server maintenance? I am wondering if someone here has experienced such a scenario and what exactly you decide to do.
It is not necessary to be specific to AD, it is just a situation where you had to evaluate a good software solution and limitations on server maintenance.
active-directory system-administration
matt_dev
source share