ALL >> Computers >> View Article
Managing Trust Relationships
This lesson introduces you to trust relationships and the tasks involved in the management 70-297 practice test of trusts. In Chapter 1, you learned that a trust relationship is a link between two domains in which the trusting domain honors the logon authentication of the trusted domain. Trust relationships can be created automatically (implicitly) or manually (explicitly). Trust relationships created implicitly do not need management. In this lesson you learn how to plan, create, and administer explicit trust relationships.
Trust Relationships
A trust relationship is a logical relationship established between domains to allow pass-through authentication, in which a trusting domain honors the logon authentications of a trusted domain. There are two domains in a trust relationship—the trusting and the trusted domain.
In Windows NT, trusts are one-way and nontransitive, and can require a great deal of administrator maintenance. Trusts were limited to the two domains involved in the trust and the trust relationship was one-way. In Windows Server 2003, trusts have ...
... three characteristics.
Trusts can be created manually (explicitly) or automatically (implicitly).
Taists can be either transitive (not bound by the domains in the trust relationship) or nontransitive (bound by the domains in the trust relationship).
Trusts can be one-way or two-way.
Windows Server 2003 authenticates users and applications using MCSE required exams either the Kerberos version 5 or NTLM protocol. The Kerberos version 5 protocol is the default protocol for computers running Windows Server 2003. If any computer involved in a transaction does not support Kerberos version 5, the NTLM protocol is used.
When using the Kerberos version 5 protocol, the client requests a ticket from a domain controller in its account domain for presentation to the server in the trusting domain. This ticket is issued by an intermediary trusted by the client and the server. The client presents this trusted ticket to the server in the trusting domain for authentication.
When a client tries to access resources on a server in another domain using NTLM authentication, the server containing the resource must contact a domain controller in the client's account domain to verify the account credentials. A trust relationship can also be created with any MIT version 5 Kerberos realm.
When a user is authenticated by a domain controller, the presence of a trust does not guarantee access to resources in that domain. Access to resources is determined solely by the rights and permissions granted to the user account by the domain administrator for the trusting domain. For information about providing access to resources free Microsoft exam papers, refer to Chapter 9, "Administering Active Directory Objects."
Add Comment
Computers Articles
1. Few Good Insights To Follow With Pc Gaming In Australia!Author: Jack Williams
2. Transform Your Online Store With Australia's Leading Ecommerce Developers
Author: themerchantbuddy
3. How To Choose The Right Technology For Your mobile App?
Author: goodcoders
4. The Rise Of User Centered Web Design
Author: goodcoders
5. Reasons Why Laravel Perfect For Web Development?
Author: goodcoders
6. Ssd Vs Sas Vs Sata Drives: Which Is Better For Your Dedicated Server Hardware?
Author: The CyberTech
7. Raid Servers And Data Protection: Common Myths About Raid Servers
Author: The CyberTech
8. Top 8 Do's And Don’ts When Dealing With A Corrupted Sd Card
Author: The CyberTech
9. Nvme Vs Ssd: What To Choose For Your Storage Solutions?
Author: The CyberTech
10. 8 Common Data Recovery Myths Exposed!
Author: The CyberTech
11. Understanding Ssd Lifespan: Signs, Durability, Data Recovery, And Factors Affecting The Life Of An Ssd
Author: The CyberTech
12. Server Data Recovery Solutions: When Your Raid Server Is Crashed!
Author: The CyberTech
13. Data Recovery Solutions For Undetected Ssd On Bios
Author: The CyberTech
14. Problems Faced By Mobile Phone Users: Green Line Issue, Motherboard Failure, Phone Stuck On Logo And Mobile Data Recovery Possibilities
Author: The CyberTech
15. Ssd Vs Hdd: Weaknesses, Data Recovery Factors And Failure Rates
Author: The CyberTech