Partager via


ADSI Evaluation Criteria

Topic Last Modified: 2008-09-03

This topic provides information about using Active Directory Services Interfaces (ADSI) to develop messaging applications.

Active Directory Services Interfaces is a set of open interfaces that abstract the capabilities of directory services from different network providers to present a single view for accessing and managing network resources. Administrators and developers can use ADSI services to enumerate and manage resources in a directory service, regardless of which network environment contains the resource. This can be an LDAP-based, NDS-based, or NTDS-based directory. It does not matter so long as a service provider is available for that directory service.

Caveats

Functional Criteria

Criteria Active Directory Services Interfaces (ADSI)

Application Domain

When using ADSI to access Active Directory, many different application types are common. Active Directory stores information about resources and resource users in one or more organizations.

Major Objects

ADSI objects abstract computers, users, user groups, printers, sessions, services, other network resources, as well as Active Directory schema.

Data access model

This information is not yet available here.

Threading Models

This information is not yet available here.

Application Architectures

This information is not yet available here.

Remote Usage

Yes.

Transactions

Yes.

Management Capabilities

ADSI and Active Directory are instrumented and managed through standard Windows technologies.

Availability

This information is not yet available here.

Development Criteria

Criteria Active Directory Services Interfaces (ADSI)

Languages and Tools

ADSI can be used with any COM/Automation-compatible languages, as well as with non-COM languages such as C/C++.

Managed Implementation

Yes. (System Directory Services).

Scriptable

Yes.

Test/Debug Tools

All standard test and debugging tools, as well as other Microsoft and third-party test and debugging tools.

Expert Availability

ADSI is a reasonably well-known technology, with abundant Microsoft and Third-Party information available.

Available Information

Numerous third-party Web sites and books exist, and Microsoft provides ADSI and Active Directory information on the MSDN Web site.

Developer/Deployment Licensing

No special licensing is required for development by using ADSI. The libraries and COM objects are installed with Windows.

Security Criteria

Criteria Active Directory Services Interfaces (ADSI)

Design-Time Permissions

The account under which the application under development runs must have proper permissions to access the intended information. This varies greatly based on the type of operations the application is performing. Granting Schema Administrator rights to developers or service account should be avoided.

Setup Permissions

No special permissions are needed to install applications that use ADSI, beyond those needed when installing applications of similar architecture. If the setup application must make schema changes to Active Directory, then the user running Setup must be a schema administrator in the domain. If the Setup application must change data inside Active Directory, the user running Setup must have appropriate permissions to make those changes.

Run-Time Permissions

Applications that use ADSI should be deployed only on those systems and for users who have sufficient permissions to access the information needed by the application.

Built-in Security Features

ADSI and Active Directory fully support the entire Windows authentication and authorization features, including item-level permissions within Active Directory.

Security Monitoring Features

This information is not yet available here.

Deployment Criteria

Criteria Active Directory Services Interfaces (ADSI)

Server Platform Requirements

No special requirements.

Client Platform Requirements

No special requirements to access Active Directory information within the user's domain. Cross-domain, or cross-forest, access may be limited by Active Directory security policies.

Deployment Methods

No special deployment methods are required.

Deployment Notes

None.