Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

Windows Server 2008 : Overview of Forest and Domain Trust Models

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
5/22/2011 11:18:51 AM
1. Forest Trusts

With the release of Windows Server 2003, Microsoft made a previously unavailable function available to administrators. Forest trusts allow an administrator to connect two forests and establish a trust between them at the forest level. This is a big change from the previous iteration, which allowed this only on the domain level. Forest trusts can be either one-way, two-way, or transitive. In a two-way transitive forest, each forest trusts the other completely. Forest trusts offer several benefits, such as simplified resource access, improved authentication, improved security, and improved administrative overhead.

It's important to note that, unlike domain trusts (discussed next), forest trusts can be created only between two forests. They cannot be extended or joined to a third. This function is slightly limiting; however, this is utilized for security purposes and for administrative reasons. By accident, an administrator could easily end up making all components of a multitiered forest trust each other completely!

2. Domain Trusts

Just like at the forest level, administrators have the ability to create trusts between domains, albeit with a lot more flexibility and power than at the forest level.

In Windows Server 2008, three different trust types are available between domains in order to aid in the sharing of resources: realm trusts, external trusts, and shortcut trusts. Each of these types of trusts has various optional permissions and allowances. You will need to be familiar with them before you begin planning your infrastructure design.


External trusts

You can create an external trust to form a one-way or two-way, nontransitive trust with domains outside of your forest. External trusts are sometimes necessary when users need access to resources located in a Windows NT 4.0 domain that doesn't support Active Directory. Figure 1 illustrates this.

Figure 1. External trust

Shortcut trusts

Sometimes when you have a complex Active Directory forest, the "shortest path" between two servers is not as idyllic as you might desire. If, for instance, a particular domain is nested four tiers down in your tree and it wants to access resources in another domain that is four tiers down in another tree, it will have to go up four levels and then down four levels of authentication in order to access the resources it requires.

This is quite inefficient. There is another option. By using Kerberos, you can create a transitive trust between the two domains that allows one domain to directly access another, without having to traverse up and down their various trees. This is a shortcut trust. It's quite a useful trick, and it can save a lot of time. Keep in mind that once you create a shortcut trust, Windows Server 2008 will default to the shortest path it can to reach the desired server. This means there may come an occasion where a shortcut trust exists between a server and another server somewhere else in the network infrastructure. Undesired performance compromises can result if the server authenticates through its shortcut and then through another machine's trust. Because of this, it's best to use shortcut trusts in moderation. However, you can see a figurative example of a shortcut trust in Figure 2.

Figure 2. Shortcut trust

Realm trusts

Since the whole world doesn't use Windows servers, it's a pretty good thing that Windows Server 2008 has a way to accommodate this. That way is a realm trust. Realm trusts are designed to give Unix users the ability to authenticate and have a relationship with a Windows server. This means the users on another operating system can have access to your files and resources. However, Unix realm trusts are one-way trusts and are not transitive, as illustrated in Figure 3.

Figure 3. Realm trust
Other -----------------
- Exchange Server 2010 : Managing Records (part 2) - Administrating Managed Folders
- Exchange Server 2010 : Managing Records (part 1) - Using MRM & Configuring Retention Tags and Retention Policies
- Windows Server 2008 : Designing an Active Directory Domain Structure
- Windows Server 2008 : Designing a Forest Structure
- Using SharePoint 2010’s Catastrophic Restore Cmdlets
- Using SharePoint 2010’s Catastrophic Backup Cmdlets
- SharePoint 2010 Central Administration : Restoring Within Central Administration
- BizTalk 2010 Recipes : Administration and Operations - Resuming Inbound Message Processing
- BizTalk 2010 Recipes : Administration and Operations - Throttle Orchestration Memory Usage
- Exchange Server 2010 : Managing Logging (part 4) - Specifying Diagnostic Logging Levels & Managing Message Tracking
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server