Directory service, created by Microsoft for Windows domain networks
This article is about Microsoft's on-premises directory service. For their cloud-based system formerly known as Azure Active Directory, see Microsoft Entra ID.
A domain controller is a server running the Active Directory Domain Service (AD DS) role. It authenticates and authorizes all users and computers in a Windows domain-type network, assigning and enforcing security policies for all computers and installing or updating software. For example, when a user logs into a computer which is part of a Windows domain, Active Directory checks the submitted username and password and determines whether the user is a system administrator or a non-admin user.[4] Furthermore, it allows the management and storage of information, provides authentication and authorization mechanisms, and establishes a framework to deploy other related services: Certificate Services, Active Directory Federation Services, Lightweight Directory Services, and Rights Management Services.[5]
Robert R. King defined it in the following way:[8]
"A domain represents a database. That database holds records about network services-things like computers, users, groups and other things that use, support, or exist on a network. The domain database is, in effect, Active Directory."
History
Like many information-technology efforts, Active Directory originated out of a democratization of design using Requests for Comments (RFCs). The Internet Engineering Task Force (IETF) oversees the RFC process and has accepted numerous RFCs initiated by widespread participants. For example, LDAP underpins Active Directory. Also, X.500 directories and the Organizational Unit preceded the Active Directory concept that uses those methods. The LDAP concept began to emerge even before the founding of Microsoft in April 1975, with RFCs as early as 1971. RFCs contributing to LDAP include RFC 1823 (on the LDAP API, August 1995),[9] RFC 2307, RFC 3062, and RFC 4533.[10][11][12]
Microsoft previewed Active Directory in 1999, released it first with Windows 2000 Server edition, and revised it to extend functionality and improve administration in Windows Server 2003. Active Directory support was also added to Windows 95, Windows 98, and Windows NT 4.0 via patch, with some unsupported features.[13][14] Additional improvements came with subsequent versions of Windows Server. In Windows Server 2008, Microsoft added further services to Active Directory, such as Active Directory Federation Services.[15] The part of the directory in charge of managing domains, which was a core part of the operating system,[15] was renamed Active Directory Domain Services (ADDS) and became a server role like others.[3] "Active Directory" became the umbrella title of a broader range of directory-based services.[16] According to Byron Hynes, everything related to identity was brought under Active Directory's banner.[3]
Active Directory Services
Active Directory Services consist of multiple directory services. The best known is Active Directory Domain Services, commonly abbreviated as AD DS or simply AD.
Domain Services
Active Directory Domain Services (AD DS) is the foundation of every Windows domain network. It stores information about domain members, including devices and users, verifies their credentials, and defines their access rights. The server running this service is called a domain controller. A domain controller is contacted when a user logs into a device, accesses another device across the network, or runs a line-of-business Metro-style appsideloaded into a machine.
The self-managed Active Directory DS must be distinct from managed Azure AD DS, a cloud product.[17]
Lightweight Directory Services
Active Directory Lightweight Directory Services (AD LDS), previously called Active Directory Application Mode (ADAM),[18] implements the LDAP protocol for AD DS.[19] It runs as a service on Windows Server and offers the same functionality as AD DS, including an equal API. However, AD LDS does not require the creation of domains or domain controllers. It provides a Data Store for storing directory data and a Directory Service with an LDAP Directory Service Interface. Unlike AD DS, multiple AD LDS instances can operate on the same server.
Active Directory Federation Services (AD FS) is a single sign-on service. With an AD FS infrastructure in place, users may use several web-based services (e.g. internet forum, blog, online shopping, webmail) or network resources using only one set of credentials stored at a central location, as opposed to having to be granted a dedicated set of credentials for each service. AD FS uses many popular open standards to pass token credentials such as SAML, OAuth or OpenID Connect.[22] AD FS supports encryption and signing of SAML assertions.[23] AD FS's purpose is an extension of that of AD DS: The latter enables users to authenticate with and use the devices that are part of the same network, using one set of credentials. The former enables them to use the same set of credentials in a different network.
As the name suggests, AD FS works based on the concept of federated identity.
AD FS requires an AD DS infrastructure, although its federation partner may not.[24]
Active Directory Rights Management Services (AD RMS), previously known as Rights Management Services or RMS before Windows Server 2008, is server software that allows for information rights management, included with Windows Server. It uses encryption and selective denial to restrict access to various documents, such as corporate e-mails, Microsoft Word documents, and web pages. It also limits the operations authorized users can perform on them, such as viewing, editing, copying, saving, or printing. IT administrators can create pre-set templates for end users for convenience, but end users can still define who can access the content and what actions they can take.[25]
Logical structure
Active Directory is a service comprising a database and executable code. It is responsible for managing requests and maintaining the database. The Directory System Agent is the executable part, a set of Windows services and processes that run on Windows 2000 and later.[1] Accessing the objects in Active Directory databases is possible through various interfaces such as LDAP, ADSI, messaging API, and Security Accounts Manager services.[2]
Objects used
A simplified example of a publishing company's internal network. The company has four groups with varying permissions to the three shared folders on the network.
Active Directory structures consist of information about objects classified into two categories: resources (such as printers) and security principals (which include user or computer accounts and groups). Each security principal is assigned a unique security identifier (SID). An object represents a single entity, such as a user, computer, printer, or group, along with its attributes. Some objects may even contain other objects within them. Each object has a unique name, and its definition is a set of characteristics and information by a schema, which determines the storage in the Active Directory.
Administrators can extend or modify the schema using the schema object when needed. However, because each schema object is integral to the definition of Active Directory objects, deactivating or changing them can fundamentally alter or disrupt a deployment. Modifying the schema affects the entire system automatically, and new objects cannot be deleted, only deactivated. Changing the schema usually requires planning.[26]
Forests, trees, and domains
In an Active Directory network, the framework that holds objects has different levels: the forest, tree, and domain. Domains within a deployment contain objects stored in a single replicable database, and the DNS name structure identifies their domains, the namespace. A domain is a logical group of network objects such as computers, users, and devices that share the same Active Directory database.
On the other hand, a tree is a collection of domains and domain trees in a contiguous namespace linked in a transitive trust hierarchy. The forest is at the top of the structure, a collection of trees with a standard global catalog, directory schema, logical structure, and directory configuration. The forest is a secure boundary that limits access to users, computers, groups, and other objects.
Domain-Boston
Domain-New York
Domain-Philly
Tree-Southern
Domain-Atlanta
Domain-Dallas
Domain-Dallas
OU-Marketing
Hewitt
Aon
Steve
OU-Sales
Bill
Ralph
Example of the geographical organizing of zones of interest within trees and domains
Organizational units
The objects held within a domain can be grouped into organizational units (OUs).[27] OUs can provide hierarchy to a domain, ease its administration, and can resemble the organization's structure in managerial or geographical terms. OUs can contain other OUs—domains are containers in this sense. Microsoft recommends using OUs rather than domains for structure and simplifying the implementation of policies and administration. The OU is the recommended level at which to apply group policies, which are Active Directory objects formally named group policy objects (GPOs), although policies can also be applied to domains or sites (see below). The OU is the level at which administrative powers are commonly delegated, but delegation can be performed on individual objects or attributes as well.
Organizational units do not each have a separate namespace. As a consequence, for compatibility with Legacy NetBios implementations, user accounts with an identical sAMAccountName are not allowed within the same domain even if the accounts objects are in separate OUs. This is because sAMAccountName, a user object attribute, must be unique within the domain.[28] However, two users in different OUs can have the same common name (CN), the name under which they are stored in the directory itself such as "fred.staff-ou.domain" and "fred.student-ou.domain", where "staff-ou" and "student-ou" are the OUs.
In general, the reason for this lack of allowance for duplicate names through hierarchical directory placement is that Microsoft primarily relies on the principles of NetBIOS, which is a flat-namespace method of network object management that, for Microsoft software, goes all the way back to Windows NT 3.1 and MS-DOSLAN Manager. Allowing for duplication of object names in the directory, or completely removing the use of NetBIOS names, would prevent backward compatibility with legacy software and equipment. However, disallowing duplicate object names in this way is a violation of the LDAP RFCs on which Active Directory is supposedly based.
As the number of users in a domain increases, conventions such as "first initial, middle initial, last name" (Western order) or the reverse (Eastern order) fail for common family names like Li (李), Smith or Garcia. Workarounds include adding a digit to the end of the username. Alternatives include creating a separate ID system of unique employee/student ID numbers to use as account names in place of actual users' names and allowing users to nominate their preferred word sequence within an acceptable use policy.
Because duplicate usernames cannot exist within a domain, account name generation poses a significant challenge for large organizations that cannot be easily subdivided into separate domains, such as students in a public school system or university who must be able to use any computer across the network.
Shadow groups
In Active Directory, organizational units (OUs) cannot be assigned as owners or trustees. Only groups are selectable, and members of OUs cannot be collectively assigned rights to directory objects.
In Microsoft's Active Directory, OUs do not confer access permissions, and objects placed within OUs are not automatically assigned access privileges based on their containing OU. It represents a design limitation specific to Active Directory, and other competing directories, such as Novell NDS, can set access privileges through object placement within an OU.
Active Directory requires a separate step for an administrator to assign an object in an OU as a group member also within that OU. Using only the OU location to determine access permissions is unreliable since the entity might not have been assigned to the group object for that OU yet.
A common workaround for an Active Directory administrator is to write a custom PowerShell or Visual Basic script to automatically create and maintain a user group for each OU in their Directory. The scripts run periodically to update the group to match the OU's account membership. However, they cannot instantly update the security groups anytime the directory changes, as occurs in competing directories, as security is directly implemented into the Directory. Such groups are known as shadow groups. Once created, these shadow groups are selectable in place of the OU in the administrative tools. Microsoft's Server 2008 reference documentation mentions shadow groups but does not provide instructions on creating them. Additionally, there are no available server methods or console snap-ins for managing these groups.[29]
An organization must determine the structure of its information infrastructure by dividing it into one or more domains and top-level OUs. This decision is critical and can base on various models such as business units, geographical locations, IT service, object type, or a combination of these models. The immediate purpose of organizing OUs is to simplify administrative delegation and, secondarily, to apply group policies. While OUs serve as an administrative boundary, the forest itself is the only security boundary. All other domains must trust any administrator in the forest to maintain security.[30]
Partitions
The Active Directory database is organized in partitions, each holding specific object types and following a particular replication pattern. Microsoft often refers to these partitions as 'naming contexts.[31] The 'Schema' partition defines object classes and attributes within the forest. The 'Configuration' partition contains information on the physical structure and configuration of the forest (such as the site topology). Both replicate all domains in the forest. The 'Domain' partition holds all objects created in that domain and replicates only within it.
Physical structure
Sites are physical (rather than logical) groupings defined by one or more IP subnets.[32] AD also defines connections, distinguishing low-speed (e.g., WAN, VPN) from high-speed (e.g., LAN) links. Site definitions are independent of the domain and OU structure and are shared across the forest. Sites play a crucial role in managing network traffic created by replication and directing clients to their nearest domain controllers (DCs). Microsoft Exchange Server 2007 uses the site topology for mail routing. Administrators can also define policies at the site level.
The Active Directory information is physically held on one or more peer domain controllers, replacing the NTPDC/BDC model. Each DC has a copy of the Active Directory. Member servers joined to Active Directory that are not domain controllers are called Member Servers.[33] In the domain partition, a group of objects acts as copies of domain controllers set up as global catalogs. These global catalog servers offer a comprehensive list of all objects located in the forest.[34][35]
Global Catalog servers replicate all objects from all domains to themselves, providing an international listing of entities in the forest. However, to minimize replication traffic and keep the GC's database small, only selected attributes of each object are replicated, called the partial attribute set (PAS). The PAS can be modified by modifying the schema and marking features for replication to the GC.[36] Earlier versions of Windows used NetBIOS to communicate. Active Directory is fully integrated with DNS and requires TCP/IP—DNS. To fully operate, the DNS server must support SRV resource records, also known as service records.
Replication
Active Directory uses multi-master replication to synchronize changes,[37] meaning replicas pull changes from the server where the change occurred rather than being pushed to them.[38] The Knowledge Consistency Checker (KCC) uses defined sites to manage traffic and create a replication topology of site links. Intra-site replication occurs frequently and automatically due to change notifications, which prompt peers to begin a pull replication cycle. Replication intervals between different sites are usually less consistent and don't usually use change notifications. However, it's possible to set it up to be the same as replication between locations on the same network if needed.
Each DS3, T1, and ISDN link can have a cost, and the KCC alters the site link topology accordingly. Replication may occur transitively through several site links on same-protocol site link bridges if the price is low. However, KCC automatically costs a direct site-to-site link lower than transitive connections. A bridgehead server in each zone can send updates to other DCs in the exact location to replicate changes between sites. To configure replication for Active Directory zones, activate DNS in the domain based on the site.
To replicate Active Directory, Remote Procedure Calls (RPC) over IP (RPC/IP) are used. SMTP is used to replicate between sites but only for modifications in the Schema, Configuration, or Partial Attribute Set (Global Catalog) GCs. It's not suitable for reproducing the default Domain partition.[39]
Implementation
Generally, a network utilizing Active Directory has more than one licensed Windows server computer. Backup and restore of Active Directory are possible for a network with a single domain controller.[40] However, Microsoft recommends more than one domain controller to provide automatic failover protection of the directory.[41] Domain controllers are ideally single-purpose for directory operations only and should not run any other software or role.[42]
Since certain Microsoft products, like SQL Server[43][44] and Exchange,[45] can interfere with the operation of a domain controller, isolation of these products on additional Windows servers is advised. Combining them can complicate the configuration and troubleshooting of the domain controller or the other installed software more complex.[46] If planning to implement Active Directory, a business should purchase multiple Windows server licenses to have at least two separate domain controllers. Administrators should consider additional domain controllers for performance or redundancy and individual servers for tasks like file storage, Exchange, and SQL Server[47] since this will guarantee that all server roles are adequately supported.
One way to lower the physical hardware costs is by using virtualization. However, for proper failover protection, Microsoft recommends not running multiple virtualized domain controllers on the same physical hardware.[48]
Database
The Active-Directory database, the directory store, in Windows 2000 Server uses the JET Blue-based Extensible Storage Engine (ESE98). Each domain controller's database is limited to 16 terabytes and 2 billion objects (but only 1 billion security principals). Microsoft has created NTDS databases with more than 2 billion objects.[49] NT4's Security Account Manager could support up to 40,000 objects. It has two main tables: the data table and the link table. Windows Server 2003 added a third main table for security descriptor single instancing.[49]
Programs may access the features of Active Directory[50] via the COM interfaces provided by Active Directory Service Interfaces.[51]
Trusting
To allow users in one domain to access resources in another, Active Directory uses trusts.[52]
Trusts inside a forest are automatically created when domains are created. The forest sets the default boundaries of trust, and implicit, transitive trust is automatic for all domains within a forest.
Terminology
One-way trust
One domain allows access to users on another domain, but the other domain does not allow access to users on the first domain.
Two-way trust
Two domains allow access to users on both domains.
Trusted domain
The domain that is trusted; whose users have access to the trusting domain.
Transitive trust
A trust that can extend beyond two domains to other trusted domains in the forest.
Intransitive trust
A one way trust that does not extend beyond two domains.
Explicit trust
A trust that an admin creates. It is not transitive and is one way only.
Cross-link trust
An explicit trust between domains in different trees or the same tree when a descendant/ancestor (child/parent) relationship does not exist between the two domains.
Shortcut
Joins two domains in different trees, transitive, one- or two-way.
Forest trust
Applies to the entire forest. Transitive, one- or two-way.
Realm
Can be transitive or nontransitive (intransitive), one- or two-way.
External
Connect to other forests or non-Active Directory domains. Nontransitive, one- or two-way.[53]
PAM trust
A one-way trust used by Microsoft Identity Manager from a (possibly low-level) production forest to a (Windows Server 2016 functionality level) 'bastion' forest, which issues time-limited group memberships.[54][55]
Management tools
Microsoft Active Directory management tools include:
Active Directory Administrative Center (Introduced with Windows Server 2012 and above),
These management tools may not provide enough functionality for efficient workflow in large environments. Some third-party tools extend the administration and management capabilities. They provide essential features for a more convenient administration process, such as automation, reports, integration with other services, etc.
Unix integration
Varying levels of interoperability with Active Directory can be achieved on most Unix-like operating systems (including Unix, Linux, Mac OS X or Java and Unix-based programs) through standards-compliant LDAP clients, but these systems usually do not interpret many attributes associated with Windows components, such as Group Policy and support for one-way trusts.
Third parties offer Active Directory integration for Unix-like platforms, including:
PowerBroker Identity Services, formerly Likewise (BeyondTrust, formerly Likewise Software) – Allows a non-Windows client to join Active Directory[56]
The schema additions shipped with Windows Server 2003 R2 include attributes that map closely enough to RFC 2307 to be generally usable. The reference implementation of RFC 2307, nss_ldap and pam_ldap provided by PADL.com, support these attributes directly. The default schema for group membership complies with RFC 2307bis (proposed).[59] Windows Server 2003 R2 includes a Microsoft Management Console snap-in that creates and edits the attributes.
An alternative option is to use another directory service as non-Windows clients authenticate to this while Windows Clients authenticate to Active Directory. Non-Windows clients include 389 Directory Server (formerly Fedora Directory Server, FDS), ViewDS v7.2 XML Enabled Directory, and Sun Microsystems Sun Java System Directory Server. The latter two are both able to perform two-way synchronization with Active Directory and thus provide a "deflected" integration.
Another option is to use OpenLDAP with its translucent overlay, which can extend entries in any remote LDAP server with additional attributes stored in a local database. Clients pointed at the local database see entries containing both the remote and local attributes, while the remote database remains completely untouched.[citation needed]
Administration (querying, modifying, and monitoring) of Active Directory can be achieved via many scripting languages, including PowerShell, VBScript, JScript/JavaScript, Perl, Python, and Ruby.[60][61][62][63] Free and non-free Active Directory administration tools can help to simplify and possibly automate Active Directory management tasks.
Since October 2017 Amazon AWS offers integration with Microsoft Active Directory.[64]
^King, Robert (2003). Mastering Active directory for Windows server 2003 (3rd ed.). Alameda, Calif.: Sybex. p. 159. ISBN978-0-7821-5201-2. OCLC62876800.
^ abThomas, Guy (29 November 2000). "Windows Server 2008 - New Features". ComputerPerformance.co.uk. Computer Performance Ltd. Archived from the original on 2 September 2019. Retrieved 30 April 2020.
^Windows Server 2003: Active Directory Infrastructure. Microsoft Press. 2003. pp. 1–8–1–9.
^"Organizational Units". Distributed Systems Resource Kit (TechNet). Microsoft. 2011. An organizational unit in Active Directory is analogous to a directory in the file system
^"Specifying Security and Administrative Boundaries". Microsoft Corporation. 23 January 2005. However, service administrators have abilities that cross domain boundaries. For this reason, the forest is the ultimate security boundary, not the domain.
^Andreas Luther (9 December 2009). "Active Directory Replication Traffic". Microsoft Corporation. Retrieved 26 May 2010. The Active Directory is made up of one or more naming contexts or partitions.
^"Sites overview". Microsoft Corporation. 21 January 2005. A site is a set of well-connected subnets.
^"What Is the Global Catalog?". Microsoft Corporation. 10 December 2009. [...] a domain controller can locate only the objects in its domain. [...] The global catalog provides the ability to locate objects from any domain [...]
^"Attributes Included in the Global Catalog". Microsoft Corporation. 26 August 2010. The isMemberOfPartialAttributeSet attribute of an attributeSchema object is set to TRUE if the attribute is replicated to the global catalog. [...] When deciding whether or not to place an attribute in the global catalog remember that you are trading increased replication and increased disk storage on global catalog servers for, potentially, faster query performance.
^"Directory data store". Microsoft Corporation. 21 January 2005. Active Directory uses four distinct directory partition types to store [...] data. Directory partitions contain domain, configuration, schema, and application data.
^Degremont, Michel (30 June 2011). "Can I install SQL Server on a domain controller?". Microsoft SQL Server blog. Retrieved 5 February 2014. For security and performance reasons, we recommend that you do not install a standalone SQL Server on a domain controller.
^"Security Considerations for a SQL Server Installation". TechNet. Microsoft. Retrieved 5 February 2014. After SQL Server is installed on a computer, you cannot change the computer from a domain controller to a domain member. You must uninstall SQL Server before you change the host computer to a domain member.
^"Exchange Server Analyzer". TechNet. Microsoft. Retrieved 5 February 2014. Running SQL Server on the same computer as a production Exchange mailbox server is not recommended.
^"Running Domain Controllers in Hyper-V". TechNet. Microsoft. Planning to Virtualize Domain Controllers. Retrieved 5 February 2014. You should attempt to avoid creating potential single points of failure when you plan your virtual domain controller deployment.frank
^"Domain and Forest Trusts Work". Microsoft Corporation. 11 December 2012. Retrieved 29 January 2013. Defines several kinds of trusts. (automatic, shortcut, forest, realm, external)
Keuskupan Agung Albi-Castres-LavaurArchidioecesis Albiensis-Castrensis-VauriensisArchidiocèse d'Albi-Castres-LavaurKatolik Katedral AlbiLokasiProvinsi gerejawiToulouseStatistikLuas5.780 km2 (2.230 sq mi)Populasi- Total- Katolik(per 2015)393.877287,923 (73.1%)Paroki509Imam131 (diosesan)42 (Ordo Relijius)InformasiDenominasiKatolik RomaGereja sui iurisGereja LatinRitusRitus RomaPendirians. abad ke-53 Oktober 1678 (Keuskupan Agung Albi)17 Februari 1922 (Keuskupan …
Sampul Ghost Reveries adalah album kedelapan band progressive death metal Opeth, yang pertama di bawah label rekaman Roadrunner Records. Album ini juga yang pertama bersama Per Wiberg sebagai anggota tetap, walaupun Wiberg telah bermain keyboard untuk konser sejak album Deliverance. Ghost Reveries direkam di Fascination Street Studios, Örebro, Swedia. Sampulnya dirancang oleh Travis Smith, diterbitkan di Eropa pada 29 Agustus 2005 dan di Amerika Utara pada 30 Agustus 2005, mencapai peringkat 64…
Azizah HanumLahirAzizah Hanum Husin22 Oktober 1989 (umur 34)Jakarta, IndonesiaAlmamaterInstitut Ilmu Sosial dan Ilmu Politik JakartaPekerjaanPresentermusisiaktrisTahun aktif2012—sekarang Azizah Hanum Husin (lahir 22 Oktober 1989) merupakan presenter, musisi, dan aktris berkebangsaan Indonesia.[1] Pendidikan SMA Negeri 35 Jakarta (2005–2007) Jurusan Jurnalistik, Fakultas Komunikasi - Institut Ilmu Sosial dan Ilmu Politik Jakarta (2008–2012)[2] Maastricht School of …
Seeta Aur GeetaPoster filmSutradaraRamesh SippyProduserG. P. SippyDitulis olehSalim-JavedPemeranHema MaliniSanjeev KumarDharmendraAbhi BhattacharyaManoramaPenata musikR. D. BurmanSinematograferK. VaikunthPenyuntingM. S. ShindeTanggal rilis17 November 1972Durasi166 menitNegaraIndiaBahasaHindi[1]Pendapatankotor₹19,53 crore (US$22,82 juta) Seeta aur Geeta (Hindi: सीता और गीता; terjemahan: Seeta dan Geeta) adalah film India Bollywood bergenre drama k…
Australian filmThe OasisDirected byIan Darling, Sascha Ettinger EpsteinProduced byIan DarlingRunning time88 minutesCountryAustraliaLanguageEnglish The Oasis is a 2008 Australian documentary produced by Shark Island Productions and directed by Ian Darling and Sascha Ettinger Epstein. The film explores the lives of homeless youth living in the Salvos Oasis youth refuge in Sydney. A 'ten years later' film was published in 2019 - Life After The Oasis. Subject Every night, Oasis accommodates 55 homel…
يفتقر محتوى هذه المقالة إلى الاستشهاد بمصادر. فضلاً، ساهم في تطوير هذه المقالة من خلال إضافة مصادر موثوق بها. أي معلومات غير موثقة يمكن التشكيك بها وإزالتها. (نوفمبر 2019) الدوري الفرنسي 1998–99 تفاصيل الموسم الدوري الفرنسي النسخة 62 البلد فرنسا التاريخ بداية:7 أغسطس 1998…
South Korean archer (born 1983) For the South Korean golfer, see Park Sung-hyun (golfer). In this Korean name, the family name is Park. Park Sung-hyunPersonal informationNationalitySouth KoreanBorn (1983-01-01) 1 January 1983 (age 41)Incheon, Gyeonggi ProvinceHeight172 cm (5 ft 8 in)[1]SportSportArcheryEventRecurve archery Medal record Representing South Korea Women's archery Olympic Games 2004 Athens Individual 2004 Athens Team 2008 Beijing Team 2008 Beijing In…
This article is part of a series:Historical lists of Privy Counsellors England 1679–1714 1714–1820 1820–1837 1837–1901 1901–1910 1910–1936 1936–1952 1952–2022 2022–present Ireland Ireland (1660–1922) Northern Ireland (1922–1971) List of current members of the Privy Council This is a List of Privy Counsellors of the United Kingdom appointed during the reign of King George V, from 1910 to 1936. The first woman to serve on the council, Margaret Bondfield, was appointed during …
British TV series or programme Summer's LeaseGenreDramaBased onSummer's Leaseby John MortimerDirected byMartyn FriendStarringJohn Gielgud Susan Fleetwood Rosemary LeachComposerNigel HessCountry of originUnited KingdomOriginal languageEnglishNo. of series1No. of episodes4ProductionProducerColin RogersRunning time55 minutesProduction companyBBCOriginal releaseNetworkBBC TwoRelease1 November (1989-11-01) –22 November 1989 (1989-11-22) Summer's Lease is a British television drama se…
Canadian ice hockey player (born 1973) This article is about the French-Canadian ice-hockey player. For the similarly named Irish news reporter and radio personality, see Philip Boucher-Hayes. Ice hockey player Philippe Boucher Born (1973-03-24) March 24, 1973 (age 51)Saint-Apollinaire, Quebec, CanadaHeight 6 ft 3 in (191 cm)Weight 212 lb (96 kg; 15 st 2 lb)Position DefenceShot RightPlayed for Buffalo SabresLos Angeles KingsDallas StarsPittsburgh PenguinsN…
العلاقات الأرمينية التشيكية أرمينيا التشيك أرمينيا التشيك تعديل مصدري - تعديل العلاقات الأرمينية التشيكية هي العلاقات الثنائية التي تجمع بين أرمينيا والتشيك.[1][2][3][4][5] مقارنة بين البلدين هذه مقارنة عامة ومرجعية للدولتين: وجه المقارنة …
Tertiary religious order This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages) This article may need to be rewritten to comply with Wikipedia's quality standards. You can help. The talk page may contain suggestions. (May 2023) This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and …
Annual music festival in the Netherlands For other uses, see Mystery Land (disambiguation). This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Mysteryland – news · newspapers · books · scholar · JSTOR (November 2019) (Learn how and when to remove this template message) MysterylandGenreTechnoHouseTranceDanceHardsty…
American author, and newspaper columnist (1958–2012) Jeffrey ZaslowZaslow in 2012BornJeffrey Lloyd Zaslow(1958-10-06)October 6, 1958Broomall, Pennsylvania, U.S.DiedFebruary 10, 2012(2012-02-10) (aged 53)Warner Township, Michigan, U.S.Alma materCarnegie Mellon UniversityOccupationJournalistSpouseSherry MargolisWebsiteOfficial website Jeffrey Lloyd Zaslow (October 6, 1958 – February 10, 2012) was an American author and journalist, and a columnist for The Wall Street Journal. Zaslow w…
Scottish Division One 1963-1964 Competizione Scottish Division One Sport Calcio Edizione 67ª Organizzatore SFL Date dal 21 agosto 1963al 21 aprile 1964 Luogo Scozia Partecipanti 18 Formula Girone all'italiana A/R Risultati Vincitore Rangers(34º titolo) Retrocessioni Queen of the SouthEast Stirlingshire Statistiche Miglior marcatore Alan Gilzean (32) Incontri disputati 306 Gol segnati 1 094 (3,58 per incontro) Cronologia della competizione 1962-63 1964-65 Manuale La…
автономная областьЧеченская автономная область 43°19′00″ с. ш. 45°41′00″ в. д.HGЯO Страна СССР Входила в РСФСР Адм. центр город Грозный История и география Дата образования 1922 Дата упразднения 1934 Площадь 11 371 км² Население Население 309 860[1] чел. (1926) Чечен…