IT tutorials
 
Technology
 

Active Directory 2008 : Managing Multiple Domains (part 2) - Managing Trusts

10/6/2013 7:51:29 PM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

5. Managing Trusts

Trust relationships make it easier to share security information and network resources between domains. As was already mentioned, standard transitive two-way trusts are automatically created between the domains in a tree and between each of the trees in a forest. Figure 1 shows an example of the default trust relationships in an Active Directory forest.

Figure 1. Default trusts in an Active Directory forest

When configuring trusts, here are two main characteristics you need to consider:


Transitive trusts

By default, Active Directory trusts are transitive trusts. The simplest way to understand transitive relationships is through an example like the following: If Domain A trusts Domain B and Domain B trusts Domain C, then Domain A implicitly trusts Domain C. If you need to apply a tighter level of security, trusts can be configured as intransitive.


One-way vs. two-way

Trusts can be configured as one-way or two-way relationships. The default operation is to create two-way trusts or bidirectional trusts. This makes it easier to manage trust relationships by reducing the trusts you must create. In some cases, however, you might decide against two-way trusts. In one-way relationships, the trusting domain allows resources to be shared with the trusted domain, but not the other way around.

When domains are added together to form trees and forests, an automatic transitive two-way trust is created between them. Although the default trust relationships work well for most organizations, there are some reasons why you might want to manage trusts manually:

  • You may want to remove trusts between domains if you are absolutely sure that you do not want resources to be shared between domains.

  • Because of security concerns, you may need to keep resources isolated.

In addition to the default trust types, you can also configure the following types of special trusts:


External trusts

You use external trusts to provide access to resources on a Windows NT 4 domain or forest that cannot use a forest trust. Windows NT 4 domains cannot benefit from the other trust types that are used in Windows Server 2008, so in some cases, external trusts could be your only option. External trusts are always nontransitive, but they can be established in a one-way or two-way configuration.


Default SID filtering on external trusts

When you set up an external trust, remember that it is possible for hackers to compromise a domain controller in a trusted domain. If this trust is compromised, a hacker can use the security identifier (SID) history attribute to associate SIDs with new user accounts, granting themselves unauthorized rights (this is called an elevation-of-privileges attack). To help prevent this type of attack, Windows Server 2008 automatically enables SID filter quarantining on all external trusts. SID filtering allows the domain controllers in the trusting domain (the domain with the resources) to remove all SID history attributes that are not members of the trusted domain.


Realm trusts

Realm trusts are similar to external trusts. You use them to connect to a non-Windows domain that uses Kerberos authentication. Realm trusts can be transitive or non-transitive, one-way or two-way.


Cross-forest trusts

Cross-forest trusts are used to share resources between forests. They have been used since Windows Server 2000 domains and cannot be intransitive, but you can establish them in a one-way or a two-way configuration. Authentication requests in either forest can reach the other forest in a two-way cross-forest trust.


Selective authentication vs. forest-wide authentication

Forest-wide authentication on a forest trust means that users of the trusted forest can access all the resources of the trusting forest. Selective authentication means that users cannot authenticate to a domain controller or resource server in the trusting forest unless they are explicitly allowed to do so. Exercise 2 will show you the steps to change forest-wide authentication to selective authentication.


Shortcut trusts

In some cases, you may actually want to create direct trusts between two domains that implicitly trust each other. Such a trust is sometimes referred to as a shortcut trust and can improve the speed at which resources are accessed across many different domains.

Perhaps the most important aspect to remember regarding trusts is that creating them only allows you to share resources between domains. The trust does not grant any permissions between domains by itself. Once a trust has been established, however, systems administrators can easily assign the necessary permissions.


Exercise 2 walks you through the steps you need to take to manage trusts. In this exercise, you will see how to assign trust relationships between domains. In order to complete the steps in this exercise, you must have domain administrator access permissions.

Exercise 2: Managing Trust Relationships

  1. Open the Active Directory Domains And Trusts administrative tool by clicking Start => Administrative Tools => Active Directory Domains And Trusts.

  2. Right-click the name of a domain and select Properties.

  3. Select the Trusts tab. You will see a list of the trusts that are currently configured. To modify the trust properties for an existing trust, highlight that trust and click Properties.



  4. The Properties window for the trust displays information about the trust's direction, transitivity, and type, along with the names of the domains involved in the relationship. Click Cancel to exit without making any changes.



  5. To create a new trust relationship, click the New Trust button on the Trusts tab. The New Trust Wizard appears. Click Next to proceed with the wizard.

  6. On the Trust Name page, you are prompted for the name of the domain with which the trust should be created. Enter the name of the domain and click Next.



  7. On the Trust Type page, you would normally choose the Trust With A Windows Domain option if you know that the other domain uses a Windows domain controller. In order to continue with this exercise (without requiring access to another domain), it is important to choose the Realm Trust option. This selection allows you to walk through the process of creating a trust relationship without needing an untrusted domain in the Active Directory environment. Click Next when you are done.



  8. On the Transitivity Of Trust page, you choose whether the trust is transitive or intransitive. Choose the Nontransitive option and click Next to continue.



  9. On the Direction Of Trust page, you select the direction of the trust. If you want both domains to trust each other, you select the two-way option. Otherwise you select either One-Way: Incoming or One-Way: Outgoing, depending on where the affected users are located. For the sake of this exercise, choose One-Way: Incoming and then click Next.



  10. On the Trust Password page, you need to specify a password that should be used to administer the trust. Type P@ssw0rd and confirm it. Note that if there is an existing trust relationship between the domains, the passwords must match. Click Next to continue.



  11. Now you see the Trust Selections Complete page that recaps the selections you have made. Because this is an exercise, you don't actually want to establish this trust. Click Cancel to cancel the wizard without saving the changes.



  12. Exit the trust properties for the domain by clicking Cancel.

To Enable Selective Authentication

  1. In the console tree, right-click the name of a domain and select Properties.

  2. Select the Trusts tab. Under either Domains Trusted By This Domain (Outgoing Trusts) or Domains That Trust This Domain (Incoming Trusts), click the forest trust that you want to administer, and then click Properties.

  3. On the Authentication tab, click Selective Authentication, and then click OK.

 
Others
 
- Active Directory 2008 : Managing Multiple Domains (part 1) - Assigning Single-Master Roles
- Active Directory 2008 : Installing and Managing Trees and Forests - Demoting a Domain Controller
- Windows 7 : Using a Windows Network - Managing Your Network
- Windows 7 : Using a Windows Network - Sharing Printers
- Windows Server 2008 : Tabbing Through PowerShell Commands, Understanding the Different Types of PowerShell Commands
- Windows Server 2008 : Understanding PowerShell Verbs and Nouns
- Windows Server 2008 : Installing and Launching PowerShell
- Sharepoint 2013 : Working with PowerShell (part 3) - PowerShell and SharePoint - Web Applications, Site Collections, Memory and Disposal
- Sharepoint 2013 : Working with PowerShell (part 2) - PowerShell and SharePoint - Administration Permissions, Content Databases
- Sharepoint 2013 : Working with PowerShell (part 1) - PowerShell Basics
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us