What is Active Directory?

Active Directory (AD) is a Microsoft service used for central authentication, authorisation and management of users, computers and network resources within a Windows domain. It forms the backbone of identity management in many IT environments — and increasingly in OT networks too.

Active Directory enables organisations to manage user permissions, group memberships, passwords and access rights centrally.


🧠 How does Active Directory work?

  1. Domain controllers maintain the AD database, which holds objects such as users, devices and policies
  2. Users sign in with a domain user account and are authenticated through the Kerberos or NTLM protocol
  3. Group Policy objects (GPOs) can enforce settings on devices (such as password policies or software installations)
  4. AD works alongside protocols such as LDAP, DNS and RADIUS to control access to networks and applications
  5. AD can be integrated with 802.1X, SIEM, RBAC and Firewall systems

Domain hierarchy: Forest > Domain > Organizational Unit (OU) > Objects


🏭 Use of Active Directory in OT networks

  • Authentication of maintenance and engineering accounts on Engineering Stations
  • Access management for HMIs, SCADA, Historian and Remote Access using AD users
  • Centralised logging and auditing through SIEM
  • 802.1X + RADIUS authentication with AD accounts for switch access
  • Group policies for structured management of Windows-based OT systems

Active Directory extends identity and access management from the IT layer into the OT layer — provided it is implemented carefully.


🔍 Active Directory vs. LDAP

Aspect Active Directory LDAP (Lightweight Directory Access Protocol)
Role Full directory platform Protocol for accessing directories
Developer Microsoft Open standard
Functionality User, policy and authentication management Querying and updating directory data only
Used for Domains, GPOs, integration with Windows services Network access to directory structures

🔐 Security considerations

  • Use multi-factor authentication (MFA) for AD administrators and external access
  • Implement RBAC with separated OT and IT roles
  • Restrict domain access from OT using Firewall, VLAN and network segmentation
  • Use SIEM to monitor sign-in attempts and privilege escalations
  • Harden domain controllers with Least Privilege principles and regular updates

A compromised AD account can grant access to a large portion of the network — segmentation is essential.


📌 In summary

Active Directory provides centralised control over user identity and access management in hybrid IT/OT networks. With careful segmentation and security, it is a powerful tool for managing industrial environments safely.