123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> System-Network-Administration >> View Article

Selective Authentication

Profile Picture
By Author: Mike Jones
Total Articles: 256
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

In Chapter 4, "Installing and Managing Domains, Trees, and Forests," you learned that in get a+ certified online Windows Server 2003, you can determine the scope of authentication between two domains that are joined by an external trust or a forest trust. Recall that an external trust must be explicitly created by a systems administrator between Windows Server 2003 domains that are in different forests or between a Windows Server 2003 domain and a domain whose domain controller is running Windows NT 4 or earlier. The trust is non-transitive. A forest trust is explicitly created by a systems administrator between two forest root domains. The trust is transitive between two forests only. Both trusts can be one- or two-way.
You can set selective authentication differently for outgoing and incoming external and forest trusts. These selective trusts allow you to make flexible access control decisions between external domains and forest-wide.
If you use domain-wide authentication on the incoming external or forest trust, users in the second domain or outside forest would have ...
... the same level of access to resources in the local domain or forest as comptia users who belong to the local domain or forest. For example, if DomainA has an incoming external trust from DomainB and domain-wide authentication is used, any user from DomainB would be able to access any resource in DomainA (assuming that they have the required permissions). Similarly, if ForestA has an incoming forest trust from ForestB and forest-wide authentica?tion is used, any user from ForestB would be able to access any resource in ForestA (assuming they have the required permissions).
If you set selective authentication on an incoming external or forest trust, you need to manually assign permissions on each resource to 'which you want users in the second domain or forest to have access. To do this, set the Allowed To Authenticate permission on an object for that particular user or group from the external domain or forest.
The settings for the Apply Onto list and the Apply These Permissions To Objects And/ Or Containers Within This Container Only check box in the Permission Entry dialog box for an object are the same in both the free practice exam questions Object and Properties tabs, regardless of the tab in which they are set. Therefore, you don't need to make changes to both tabs.

Total Views: 431Word Count: 388See All articles From Author

Add Comment

System/Network Administration Articles

1. Roi Benefits Of Implementing The M-files Document Management System
Author: DocSmart Solutions

2. Mems Optical Switch: High-speed, Reliable Switching For Modern Fiber Optic Networks
Author: Ryan

3. Polarization Maintaining Fiber Cable: Ensuring Polarization Stability In Advanced Optical Systems
Author: Ryan

4. Optical Fiber Alignment System: The Foundation Of High-performance Fiber Optic Solutions
Author: Ryan

5. The Real Difference Between Ai Tools And Ai Systems
Author: Orson Amiri

6. Document Manager Software: Tools To Organize Business Files
Author: DocSmart Solutions

7. Best Online Cybersecurity Training Institute In India
Author: securium Academy

8. Mechanical Optical Switch: Reliable Light Routing For Optical Networks
Author: Ryan

9. Optical Switches: Enabling Fast And Flexible Optical Networks
Author: Ryan

10. Fiber Cable Stripping Machine: Precision And Efficiency In Fiber Optic Processing
Author: Ryan

11. 20% Off PmpĀ® Certification: Turn This Christmas Into A Career Milestone
Author: securium Academy

12. The Fiber Jumper Production Line: Streamlining The Manufacturing Of High-quality Fiber Optic Cables
Author: Ryan

13. The Fiber Coupler Production Line: Enabling Efficient Signal Distribution In Fiber Optic Networks
Author: Ryan

14. Top 10 Cyber Threats Of 2026 And How To Prepare For Them
Author: securium Academy

15. Cloud Technology Solutions For Businesses: Improve Efficiency & Growth
Author: Venttech

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: