Solved

Active Directory Authentication response time

Posted on 2011-03-11
5
1,365 Views
Last Modified: 2012-05-11
I need a way to test how long AD takes to authenticate a user. How can I measure this?
0
Comment
Question by:jjmartineziii
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 3

Expert Comment

by:tearman
ID: 35112627
There are a few Kerberos tests out there, kinit on Linux works rather well, that can test its response time.  You can also use some LDAP querying tools to test it.
0
 
LVL 12

Author Comment

by:jjmartineziii
ID: 35112644
Can I get examples of tools that run in windows or a vm appliance with the tools installed already?

I don't want to capture packets with wireshark.
0
 
LVL 11

Accepted Solution

by:
RickSheikh earned 500 total points
ID: 35112813
Not aware of any tool other than looking on the wire with Netmon or Wireshark.
0
 
LVL 8

Expert Comment

by:ZombieAutopsy
ID: 35113028
You could try testing the LDAP connecting. There is actually an accepted answer here already.

http://www.experts-exchange.com/Software/Server_Software/File_Servers/Active_Directory/Q_23153507.html
0
 
LVL 12

Author Comment

by:jjmartineziii
ID: 35113257
Well, AD is working. I want to verify speeds. That program only lets me browse LDAP but not do any testing. I already have it.
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…

630 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question