ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Active Directory Domain name

    IT Discussion
    domain name registration domain name active directory active directory domain
    14
    54
    5.6k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • siringoS
      siringo @Dashrender
      last edited by

      @dashrender said in Active Directory Domain name:

      @siringo said in Active Directory Domain name:

      so are you guys saying that the new thinking is now to give your inhouse, private AD domain name a subdomain name of your public domain name?

      I wouldn't call it new - it's been since at least 2016, and likely longer than that.

      is that primarily to avoid that macOS stuff Scott mentioned?

      I believe dumping .local was to avoid the mac issues, the subdomain use is because of DNS.

      I never did any 2000/AD training (3.51 for me) but I can clearly remember reading MS technotes that mentioned using .local. That's why I've used that since.

      I believe .local came into vogue around Server 2003 (maybe 2003R2) and was stopped around Server 2008 or 2012.

      Oh, OK. Thanks for that. I'd never heard of any of that before. Good to know.

      DashrenderD 1 Reply Last reply Reply Quote 0
      • DashrenderD
        Dashrender @siringo
        last edited by

        @siringo said in Active Directory Domain name:

        @dashrender said in Active Directory Domain name:

        @siringo said in Active Directory Domain name:

        so are you guys saying that the new thinking is now to give your inhouse, private AD domain name a subdomain name of your public domain name?

        I wouldn't call it new - it's been since at least 2016, and likely longer than that.

        is that primarily to avoid that macOS stuff Scott mentioned?

        I believe dumping .local was to avoid the mac issues, the subdomain use is because of DNS.

        I never did any 2000/AD training (3.51 for me) but I can clearly remember reading MS technotes that mentioned using .local. That's why I've used that since.

        I believe .local came into vogue around Server 2003 (maybe 2003R2) and was stopped around Server 2008 or 2012.

        Oh, OK. Thanks for that. I'd never heard of any of that before. Good to know.

        FYI - Local was also dumped because it's not a valid TLD (Top Level Domain) - i.e. can't be used on the internet. Certificate makers are now refusing to include domain.local in new certificates.

        siringoS scottalanmillerS 2 Replies Last reply Reply Quote 0
        • siringoS
          siringo @Dashrender
          last edited by

          @dashrender said in Active Directory Domain name:

          @siringo said in Active Directory Domain name:

          @dashrender said in Active Directory Domain name:

          @siringo said in Active Directory Domain name:

          so are you guys saying that the new thinking is now to give your inhouse, private AD domain name a subdomain name of your public domain name?

          I wouldn't call it new - it's been since at least 2016, and likely longer than that.

          is that primarily to avoid that macOS stuff Scott mentioned?

          I believe dumping .local was to avoid the mac issues, the subdomain use is because of DNS.

          I never did any 2000/AD training (3.51 for me) but I can clearly remember reading MS technotes that mentioned using .local. That's why I've used that since.

          I believe .local came into vogue around Server 2003 (maybe 2003R2) and was stopped around Server 2008 or 2012.

          Oh, OK. Thanks for that. I'd never heard of any of that before. Good to know.

          FYI - Local was also dumped because it's not a valid TLD (Top Level Domain) - i.e. can't be used on the internet. Certificate makers are now refusing to include domain.local in new certificates.

          Interesting. I believe that is why it was used in private AD environments in the first place, for that very reason.

          scottalanmillerS 1 Reply Last reply Reply Quote 0
          • black3dynamiteB
            black3dynamite @flaxking
            last edited by

            @flaxking said in Active Directory Domain name:

            One thing to note with ad.domainname.com is that in some places it will just display your domain as 'AD'
            Which could be a vanity problem in some cases

            Found one that uses 'AD' in production.

            e59e5b47-ea8a-4bdb-8360-a8c8266e16bb-image.png

            scottalanmillerS 1 Reply Last reply Reply Quote 0
            • scottalanmillerS
              scottalanmiller @black3dynamite
              last edited by

              @black3dynamite ha, I've seen it, but not often.

              1 Reply Last reply Reply Quote 0
              • scottalanmillerS
                scottalanmiller @siringo
                last edited by

                @siringo said in Active Directory Domain name:

                @dashrender said in Active Directory Domain name:

                @siringo said in Active Directory Domain name:

                @dashrender said in Active Directory Domain name:

                @siringo said in Active Directory Domain name:

                so are you guys saying that the new thinking is now to give your inhouse, private AD domain name a subdomain name of your public domain name?

                I wouldn't call it new - it's been since at least 2016, and likely longer than that.

                is that primarily to avoid that macOS stuff Scott mentioned?

                I believe dumping .local was to avoid the mac issues, the subdomain use is because of DNS.

                I never did any 2000/AD training (3.51 for me) but I can clearly remember reading MS technotes that mentioned using .local. That's why I've used that since.

                I believe .local came into vogue around Server 2003 (maybe 2003R2) and was stopped around Server 2008 or 2012.

                Oh, OK. Thanks for that. I'd never heard of any of that before. Good to know.

                FYI - Local was also dumped because it's not a valid TLD (Top Level Domain) - i.e. can't be used on the internet. Certificate makers are now refusing to include domain.local in new certificates.

                Interesting. I believe that is why it was used in private AD environments in the first place, for that very reason.

                That's right, that it had those limitations was the point. AD is fundamentally not built with the intention of being on the Internet!

                1 Reply Last reply Reply Quote 0
                • scottalanmillerS
                  scottalanmiller @Dashrender
                  last edited by

                  @dashrender said in Active Directory Domain name:

                  @siringo said in Active Directory Domain name:

                  @dashrender said in Active Directory Domain name:

                  @siringo said in Active Directory Domain name:

                  so are you guys saying that the new thinking is now to give your inhouse, private AD domain name a subdomain name of your public domain name?

                  I wouldn't call it new - it's been since at least 2016, and likely longer than that.

                  is that primarily to avoid that macOS stuff Scott mentioned?

                  I believe dumping .local was to avoid the mac issues, the subdomain use is because of DNS.

                  I never did any 2000/AD training (3.51 for me) but I can clearly remember reading MS technotes that mentioned using .local. That's why I've used that since.

                  I believe .local came into vogue around Server 2003 (maybe 2003R2) and was stopped around Server 2008 or 2012.

                  Oh, OK. Thanks for that. I'd never heard of any of that before. Good to know.

                  FYI - Local was also dumped because it's not a valid TLD (Top Level Domain) - i.e. can't be used on the internet. Certificate makers are now refusing to include domain.local in new certificates.

                  Not also, it was kept until there was competition over the private (can't be used) TLD. Apple and MS both chose it because it couldn't be used that way. No certificate maker should ever have included it (and I've never heard of that as it would always indicate a scam CA as you cannot own that domain by definition).

                  Any CA that issued that can't be trusted and is a huge security risk.

                  dbeatoD 1 Reply Last reply Reply Quote 1
                  • dbeatoD
                    dbeato @scottalanmiller
                    last edited by

                    @scottalanmiller said in Active Directory Domain name:

                    used that way. No certificate maker should ever have included it (and I've never heard of that as it would always indicate a scam CA as you cannot own that domain by definition).

                    The Majority if not all did add the .local, .lan and others, unless you think all CA are scams then I wouldn't say they are a scam.

                    DashrenderD stacksofplatesS 2 Replies Last reply Reply Quote 0
                    • DashrenderD
                      Dashrender @dbeato
                      last edited by

                      @dbeato said in Active Directory Domain name:

                      @scottalanmiller said in Active Directory Domain name:

                      used that way. No certificate maker should ever have included it (and I've never heard of that as it would always indicate a scam CA as you cannot own that domain by definition).

                      The Majority if not all did add the .local, .lan and others, unless you think all CA are scams then I wouldn't say they are a scam.

                      I was thinking the same thing. Sure they weren't the primary, these odd-balls where always secondary, but still most of them supported it as far as I understood.

                      I guess that makes most CA's scams.

                      scottalanmillerS 1 Reply Last reply Reply Quote 0
                      • stacksofplatesS
                        stacksofplates @dbeato
                        last edited by

                        @dbeato said in Active Directory Domain name:

                        @scottalanmiller said in Active Directory Domain name:

                        used that way. No certificate maker should ever have included it (and I've never heard of that as it would always indicate a scam CA as you cannot own that domain by definition).

                        The Majority if not all did add the .local, .lan and others, unless you think all CA are scams then I wouldn't say they are a scam.

                        Yeah from a quick search looks like at least GoDaddy and Digicert offered them.

                        Nov 2015 is when CA/Browser Forum set the standard to not allow internal domains. So looks like most if not all would have supported it before that.

                        https://cabforum.org/internal-names/

                        F scottalanmillerS 2 Replies Last reply Reply Quote 0
                        • F
                          flaxking @stacksofplates
                          last edited by

                          Wow, sounds like they didn't think that through.

                          1 Reply Last reply Reply Quote 0
                          • scottalanmillerS
                            scottalanmiller @stacksofplates
                            last edited by

                            @stacksofplates said in Active Directory Domain name:

                            @dbeato said in Active Directory Domain name:

                            @scottalanmiller said in Active Directory Domain name:

                            used that way. No certificate maker should ever have included it (and I've never heard of that as it would always indicate a scam CA as you cannot own that domain by definition).

                            The Majority if not all did add the .local, .lan and others, unless you think all CA are scams then I wouldn't say they are a scam.

                            Yeah from a quick search looks like at least GoDaddy and Digicert offered them.

                            Nov 2015 is when CA/Browser Forum set the standard to not allow internal domains. So looks like most if not all would have supported it before that.

                            https://cabforum.org/internal-names/

                            Damn, that's a major security hole! So I could go get a cert issued for a domain someone else used and there had to be zero verification since.... there was nothing to verify!

                            dbeatoD 1 Reply Last reply Reply Quote 1
                            • scottalanmillerS
                              scottalanmiller @Dashrender
                              last edited by

                              @dashrender said in Active Directory Domain name:

                              I guess that makes most CA's scams.

                              That's not what did it, but yes, yes they are.

                              DashrenderD 1 Reply Last reply Reply Quote 1
                              • DashrenderD
                                Dashrender @scottalanmiller
                                last edited by

                                @scottalanmiller said in Active Directory Domain name:

                                @dashrender said in Active Directory Domain name:

                                I guess that makes most CA's scams.

                                That's not what did it, but yes, yes they are.

                                I really think ICANN should have just kept CAs to themselves and not made any money off of it.

                                1 Reply Last reply Reply Quote 0
                                • M
                                  manny2375 @scottalanmiller
                                  last edited by manny2375

                                  @scottalanmiller Microsoft recommends the onpremise and Azure AD to be exactly the same for a Hybrid AD. I know it's completely different subject but it kind of relates.

                                  1 Reply Last reply Reply Quote 0
                                  • dbeatoD
                                    dbeato @scottalanmiller
                                    last edited by

                                    @scottalanmiller said in Active Directory Domain name:

                                    @stacksofplates said in Active Directory Domain name:

                                    @dbeato said in Active Directory Domain name:

                                    @scottalanmiller said in Active Directory Domain name:

                                    used that way. No certificate maker should ever have included it (and I've never heard of that as it would always indicate a scam CA as you cannot own that domain by definition).

                                    The Majority if not all did add the .local, .lan and others, unless you think all CA are scams then I wouldn't say they are a scam.

                                    Yeah from a quick search looks like at least GoDaddy and Digicert offered them.

                                    Nov 2015 is when CA/Browser Forum set the standard to not allow internal domains. So looks like most if not all would have supported it before that.

                                    https://cabforum.org/internal-names/

                                    Damn, that's a major security hole! So I could go get a cert issued for a domain someone else used and there had to be zero verification since.... there was nothing to verify!

                                    Yup.

                                    1 Reply Last reply Reply Quote 0
                                    • 1
                                    • 2
                                    • 3
                                    • 3 / 3
                                    • First post
                                      Last post