SlideShare una empresa de Scribd logo
1 de 14
 Trust relationships are logical connections that
  combine two or more domains into one
  administrative unit. Trust relationships allow
  permissions to be associated and passed from
  one domain to another.
 With Active Directory Domains andTrusts, an

  administrator can establish relationships between
  domains that will allow users in one
 domain to access the resources in another



                                        07/11/2008    1
   A domain trust is a relationship established between
    domains that enables users in one domain to be
    authenticated by a domain controller in the other
    domain. The authentication requests follow a trust path.
   Trust path
      Before a user can access a resource in another
    domain, Windows  security must determine whether the
    trusting domain (the domain containing the resource
    the user is trying to access) has a trust relationship with
    the trusted domain (the user's logon domain).
   To determine this, the Windows  security system
    computes the trust path between a domain controller in
    the trusting domain and a domain controller in the
    trusted domain.
   All domain trust relationships have only two domains in
    the relationship: the trusting domain and the trusted
    domain. A domain trust relationship is characterized by
    whether it is:
   Two-way
   One-way
   Transitive
   Nontransitive
   One-way trust
     A one-way trust is a single trust relationship, where
    Domain A trusts Domain B. All one-way relationships are
    nontransitive and all nontransitive trusts are one-way.
     Authentication requests can only be passed from the
    trusting domain to the trusted domain. This means that if
    Domain A has a one-way trust with Domain B and
    Domain B has a one-way trust with Domain C, Domain A
    does not have a trust relationship with Domain C.
   Two-way trust
     All domain trusts in a Windows  forest are two-way
    transitive trusts.
    When a new child domain is created, a two-way
    transitive trust is automatically created between the new
    child domain and the parent domain. In a two-way trust,
    Domain A trusts Domain B and Domain B trusts
    Domain A. This means that authentication requests can
    be passed between the two domains in both directions.
   To create a nontransitive two-way trust, you must create
    two one-way trusts between the domains involved.
Transitive trust
    All domain trusts in a Windows  forest are transitive.
    Transitive trusts are always two-way: Both domains in
    the relationship trust each other.
   Transitive trust relationships flow upward through the
    domain tree as it is formed
   Transitive trust relationships flow through all domains in
    the forest. Authentication requests follow these trust
    paths, so accounts from any domain in the forest can be
    authenticated at any other domain in the forest. With a
    single logon process, those accounts having the proper
    permissions can potentially access resources on any
    domain in the forest.
Because Domain 1 has a transitive trust relationship with
Domain 2 and Domain 2 has a transitive trust relationship
with Domain 3, users in Domain 3 (when granted the
proper permissions) can access resources in Domain 1.
Because Domain 1 has a transitive trust relationship with
Domain A, and the other domains in Domain A's domain
tree have transitive trust relationships with Domain A, users
in Domain B (when granted the proper permissions) can
access resources in Domain 3.
Nontransitive trust
      A nontransitive trust is bounded by the two domains in
    the trust relationship and does not flow to any other
    domains in the forest.
   Nontransitive trusts are one-way by default
   Shortcut Trust
      Shortcut trusts are transitive in nature and can either
    be one-way or two-way . These trusts are used when
    user accounts in one domain need regular access to the
    resources in another domain.
   Established when the users in one domain need access
    to resources in the other domain, but those in the
    second domain do not need access to resources in the
    first domain.
 Realm       Trust
   Realm trusts are explicit trusts that are created to join a
    Windows Server 2003 domain to a non-Windows .This
    allows you the flexibility of creating a trust for your non-
    Windows networks to interoperate with the security
    services based on other Kerberos v5 implementations,
    such as with UNIX.
 External      Trust
      An external trust is used when you need to create a
    trust between domains outside of your forest.
   External trusts are always nontransitive, but they can be
    established in a one-way or two-way configuration.
   Forest Trust
    A forest trust can only be created between the root
    domains in two forests. Both forests must be Windows
    Server 2003 forests. These trusts can be one- or two-
    way trusts. They are considered transitive trusts
    because the child domains inside the forest can
    authenticate themselves across the forest to access
    resources in the other forest.
Forest 1              Tree/Root                 Forest                       Forest 2
                      Trust                     Trust
 Parent/Child
 Trust
                                                                    Forest
                                  Forest                            (root)
               Domain D           (root)




      Domain E        Domain A             Domain B      Domain P            Domain Q


            Shortcut Trust
                                               Realm           External
 Domain F                    Domain C          Trust           Trust


                               Kerberos Realm

Más contenido relacionado

La actualidad más candente

Meraki Cloud Networking Workshop
Meraki Cloud Networking WorkshopMeraki Cloud Networking Workshop
Meraki Cloud Networking WorkshopCisco Canada
 
Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directorythebigredhemi
 
AWS 201 - A Walk through the AWS Cloud: Introduction to Amazon CloudFront
AWS 201 - A Walk through the AWS Cloud: Introduction to Amazon CloudFrontAWS 201 - A Walk through the AWS Cloud: Introduction to Amazon CloudFront
AWS 201 - A Walk through the AWS Cloud: Introduction to Amazon CloudFrontAmazon Web Services
 
Amazon Virtual Private Cloud (VPC)
Amazon Virtual Private Cloud (VPC)Amazon Virtual Private Cloud (VPC)
Amazon Virtual Private Cloud (VPC)Tejoy Vachhrajani
 
AWS Connectivity, VPC Design and Security Pro Tips
AWS Connectivity, VPC Design and Security Pro TipsAWS Connectivity, VPC Design and Security Pro Tips
AWS Connectivity, VPC Design and Security Pro TipsShiva Narayanaswamy
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Sverige
 
VMware vSphere vsan EN.pptx
VMware vSphere vsan EN.pptxVMware vSphere vsan EN.pptx
VMware vSphere vsan EN.pptxCH431
 
02-Active Directory Domain Services.pptx
02-Active Directory Domain Services.pptx02-Active Directory Domain Services.pptx
02-Active Directory Domain Services.pptxAdiWidyanto2
 
SID201_IAM for Enterprises How Vanguard strikes the Balance Between Agility, ...
SID201_IAM for Enterprises How Vanguard strikes the Balance Between Agility, ...SID201_IAM for Enterprises How Vanguard strikes the Balance Between Agility, ...
SID201_IAM for Enterprises How Vanguard strikes the Balance Between Agility, ...Amazon Web Services
 
Cisco Meraki- Simplifying IT
Cisco Meraki- Simplifying ITCisco Meraki- Simplifying IT
Cisco Meraki- Simplifying ITCisco Canada
 
What is active directory
What is active directoryWhat is active directory
What is active directoryAdeel Khurram
 
Workgroup vs domain
Workgroup vs domainWorkgroup vs domain
Workgroup vs domaintameemyousaf
 
Using Virtual Private Cloud (vpc)
Using Virtual Private Cloud (vpc)Using Virtual Private Cloud (vpc)
Using Virtual Private Cloud (vpc)Amazon Web Services
 
Active directory and application
Active directory and applicationActive directory and application
Active directory and applicationaminpathan11
 
Azure active directory
Azure active directoryAzure active directory
Azure active directoryRaju Kumar
 
AWS Security Week: Cloud-Scale Authentication & Advanced Authorization with A...
AWS Security Week: Cloud-Scale Authentication & Advanced Authorization with A...AWS Security Week: Cloud-Scale Authentication & Advanced Authorization with A...
AWS Security Week: Cloud-Scale Authentication & Advanced Authorization with A...Amazon Web Services
 

La actualidad más candente (20)

Meraki Cloud Networking Workshop
Meraki Cloud Networking WorkshopMeraki Cloud Networking Workshop
Meraki Cloud Networking Workshop
 
Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directory
 
AWS 201 - A Walk through the AWS Cloud: Introduction to Amazon CloudFront
AWS 201 - A Walk through the AWS Cloud: Introduction to Amazon CloudFrontAWS 201 - A Walk through the AWS Cloud: Introduction to Amazon CloudFront
AWS 201 - A Walk through the AWS Cloud: Introduction to Amazon CloudFront
 
Amazon Virtual Private Cloud (VPC)
Amazon Virtual Private Cloud (VPC)Amazon Virtual Private Cloud (VPC)
Amazon Virtual Private Cloud (VPC)
 
AWS Connectivity, VPC Design and Security Pro Tips
AWS Connectivity, VPC Design and Security Pro TipsAWS Connectivity, VPC Design and Security Pro Tips
AWS Connectivity, VPC Design and Security Pro Tips
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access Manager
 
Introduction to CloudFront
Introduction to CloudFrontIntroduction to CloudFront
Introduction to CloudFront
 
VMware vSphere vsan EN.pptx
VMware vSphere vsan EN.pptxVMware vSphere vsan EN.pptx
VMware vSphere vsan EN.pptx
 
02-Active Directory Domain Services.pptx
02-Active Directory Domain Services.pptx02-Active Directory Domain Services.pptx
02-Active Directory Domain Services.pptx
 
SID201_IAM for Enterprises How Vanguard strikes the Balance Between Agility, ...
SID201_IAM for Enterprises How Vanguard strikes the Balance Between Agility, ...SID201_IAM for Enterprises How Vanguard strikes the Balance Between Agility, ...
SID201_IAM for Enterprises How Vanguard strikes the Balance Between Agility, ...
 
Cisco Meraki- Simplifying IT
Cisco Meraki- Simplifying ITCisco Meraki- Simplifying IT
Cisco Meraki- Simplifying IT
 
AWS VPC.pdf
AWS VPC.pdfAWS VPC.pdf
AWS VPC.pdf
 
What is active directory
What is active directoryWhat is active directory
What is active directory
 
Active directory slides
Active directory slidesActive directory slides
Active directory slides
 
Aws VPC
Aws VPCAws VPC
Aws VPC
 
Workgroup vs domain
Workgroup vs domainWorkgroup vs domain
Workgroup vs domain
 
Using Virtual Private Cloud (vpc)
Using Virtual Private Cloud (vpc)Using Virtual Private Cloud (vpc)
Using Virtual Private Cloud (vpc)
 
Active directory and application
Active directory and applicationActive directory and application
Active directory and application
 
Azure active directory
Azure active directoryAzure active directory
Azure active directory
 
AWS Security Week: Cloud-Scale Authentication & Advanced Authorization with A...
AWS Security Week: Cloud-Scale Authentication & Advanced Authorization with A...AWS Security Week: Cloud-Scale Authentication & Advanced Authorization with A...
AWS Security Week: Cloud-Scale Authentication & Advanced Authorization with A...
 

Destacado

Switch configuration
Switch configurationSwitch configuration
Switch configurationMuuluu
 
Лекц 13
Лекц 13Лекц 13
Лекц 13Muuluu
 
Лекц 12
Лекц 12Лекц 12
Лекц 12Muuluu
 
1.2 active directory
1.2 active directory1.2 active directory
1.2 active directoryMuuluu
 
Лекц 11
Лекц 11Лекц 11
Лекц 11Muuluu
 
Dns server
Dns serverDns server
Dns serverMuuluu
 
User account policy
User account policyUser account policy
User account policyMuuluu
 
Lecture 3
Lecture 3Lecture 3
Lecture 3Muuluu
 
2.1 user practical
2.1 user practical2.1 user practical
2.1 user practicalMuuluu
 
1.1 windows server 2003
1.1 windows server 20031.1 windows server 2003
1.1 windows server 2003Muuluu
 
Switch function
Switch functionSwitch function
Switch functionMuuluu
 
Lecture 5
Lecture 5Lecture 5
Lecture 5Muuluu
 
Lecture 2
Lecture 2Lecture 2
Lecture 2Muuluu
 
1.2 ad installation
1.2 ad installation1.2 ad installation
1.2 ad installationMuuluu
 
Лекц 10
Лекц 10Лекц 10
Лекц 10Muuluu
 
2.1 users & groups
2.1 users & groups2.1 users & groups
2.1 users & groupsMuuluu
 
Лекц 11
Лекц 11Лекц 11
Лекц 11Muuluu
 
Лекц 9
Лекц 9Лекц 9
Лекц 9Muuluu
 

Destacado (18)

Switch configuration
Switch configurationSwitch configuration
Switch configuration
 
Лекц 13
Лекц 13Лекц 13
Лекц 13
 
Лекц 12
Лекц 12Лекц 12
Лекц 12
 
1.2 active directory
1.2 active directory1.2 active directory
1.2 active directory
 
Лекц 11
Лекц 11Лекц 11
Лекц 11
 
Dns server
Dns serverDns server
Dns server
 
User account policy
User account policyUser account policy
User account policy
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
 
2.1 user practical
2.1 user practical2.1 user practical
2.1 user practical
 
1.1 windows server 2003
1.1 windows server 20031.1 windows server 2003
1.1 windows server 2003
 
Switch function
Switch functionSwitch function
Switch function
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
1.2 ad installation
1.2 ad installation1.2 ad installation
1.2 ad installation
 
Лекц 10
Лекц 10Лекц 10
Лекц 10
 
2.1 users & groups
2.1 users & groups2.1 users & groups
2.1 users & groups
 
Лекц 11
Лекц 11Лекц 11
Лекц 11
 
Лекц 9
Лекц 9Лекц 9
Лекц 9
 

Más de Muuluu

Өгөгдлийн бүтэц
Өгөгдлийн бүтэцӨгөгдлийн бүтэц
Өгөгдлийн бүтэцMuuluu
 
Basic software
Basic software Basic software
Basic software Muuluu
 
Wide area networks
Wide area networksWide area networks
Wide area networksMuuluu
 
NAT and PAT
NAT and PATNAT and PAT
NAT and PATMuuluu
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocolMuuluu
 
Firewall
FirewallFirewall
FirewallMuuluu
 
User practical
User practicalUser practical
User practicalMuuluu
 
Active directory
Active directoryActive directory
Active directoryMuuluu
 
Hardware
HardwareHardware
HardwareMuuluu
 
windows server 2003
 windows server 2003 windows server 2003
windows server 2003Muuluu
 
Процессорын архитектур
Процессорын архитектурПроцессорын архитектур
Процессорын архитектурMuuluu
 
6 network devices
6 network devices6 network devices
6 network devicesMuuluu
 
Бие даалт
Бие даалтБие даалт
Бие даалтMuuluu
 
Лекц 15
Лекц 15Лекц 15
Лекц 15Muuluu
 
Лекц 14
Лекц 14Лекц 14
Лекц 14Muuluu
 
Лекц 16
Лекц 16Лекц 16
Лекц 16Muuluu
 
Лекц 15
Лекц 15Лекц 15
Лекц 15Muuluu
 
Лекц 14
Лекц 14Лекц 14
Лекц 14Muuluu
 
Лекц 13
Лекц 13Лекц 13
Лекц 13Muuluu
 
Лекц 12
Лекц 12Лекц 12
Лекц 12Muuluu
 

Más de Muuluu (20)

Өгөгдлийн бүтэц
Өгөгдлийн бүтэцӨгөгдлийн бүтэц
Өгөгдлийн бүтэц
 
Basic software
Basic software Basic software
Basic software
 
Wide area networks
Wide area networksWide area networks
Wide area networks
 
NAT and PAT
NAT and PATNAT and PAT
NAT and PAT
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
 
Firewall
FirewallFirewall
Firewall
 
User practical
User practicalUser practical
User practical
 
Active directory
Active directoryActive directory
Active directory
 
Hardware
HardwareHardware
Hardware
 
windows server 2003
 windows server 2003 windows server 2003
windows server 2003
 
Процессорын архитектур
Процессорын архитектурПроцессорын архитектур
Процессорын архитектур
 
6 network devices
6 network devices6 network devices
6 network devices
 
Бие даалт
Бие даалтБие даалт
Бие даалт
 
Лекц 15
Лекц 15Лекц 15
Лекц 15
 
Лекц 14
Лекц 14Лекц 14
Лекц 14
 
Лекц 16
Лекц 16Лекц 16
Лекц 16
 
Лекц 15
Лекц 15Лекц 15
Лекц 15
 
Лекц 14
Лекц 14Лекц 14
Лекц 14
 
Лекц 13
Лекц 13Лекц 13
Лекц 13
 
Лекц 12
Лекц 12Лекц 12
Лекц 12
 

2.2 determining trust relationships

  • 1.  Trust relationships are logical connections that combine two or more domains into one administrative unit. Trust relationships allow permissions to be associated and passed from one domain to another.  With Active Directory Domains andTrusts, an administrator can establish relationships between domains that will allow users in one domain to access the resources in another 07/11/2008 1
  • 2. A domain trust is a relationship established between domains that enables users in one domain to be authenticated by a domain controller in the other domain. The authentication requests follow a trust path.  Trust path Before a user can access a resource in another domain, Windows  security must determine whether the trusting domain (the domain containing the resource the user is trying to access) has a trust relationship with the trusted domain (the user's logon domain).  To determine this, the Windows  security system computes the trust path between a domain controller in the trusting domain and a domain controller in the trusted domain.
  • 3.
  • 4. All domain trust relationships have only two domains in the relationship: the trusting domain and the trusted domain. A domain trust relationship is characterized by whether it is:  Two-way  One-way  Transitive  Nontransitive
  • 5. One-way trust A one-way trust is a single trust relationship, where Domain A trusts Domain B. All one-way relationships are nontransitive and all nontransitive trusts are one-way. Authentication requests can only be passed from the trusting domain to the trusted domain. This means that if Domain A has a one-way trust with Domain B and Domain B has a one-way trust with Domain C, Domain A does not have a trust relationship with Domain C.
  • 6. Two-way trust All domain trusts in a Windows  forest are two-way transitive trusts.  When a new child domain is created, a two-way transitive trust is automatically created between the new child domain and the parent domain. In a two-way trust, Domain A trusts Domain B and Domain B trusts Domain A. This means that authentication requests can be passed between the two domains in both directions.  To create a nontransitive two-way trust, you must create two one-way trusts between the domains involved.
  • 7. Transitive trust  All domain trusts in a Windows  forest are transitive. Transitive trusts are always two-way: Both domains in the relationship trust each other.  Transitive trust relationships flow upward through the domain tree as it is formed  Transitive trust relationships flow through all domains in the forest. Authentication requests follow these trust paths, so accounts from any domain in the forest can be authenticated at any other domain in the forest. With a single logon process, those accounts having the proper permissions can potentially access resources on any domain in the forest.
  • 8. Because Domain 1 has a transitive trust relationship with Domain 2 and Domain 2 has a transitive trust relationship with Domain 3, users in Domain 3 (when granted the proper permissions) can access resources in Domain 1. Because Domain 1 has a transitive trust relationship with Domain A, and the other domains in Domain A's domain tree have transitive trust relationships with Domain A, users in Domain B (when granted the proper permissions) can access resources in Domain 3.
  • 9. Nontransitive trust A nontransitive trust is bounded by the two domains in the trust relationship and does not flow to any other domains in the forest.  Nontransitive trusts are one-way by default
  • 10. Shortcut Trust  Shortcut trusts are transitive in nature and can either be one-way or two-way . These trusts are used when user accounts in one domain need regular access to the resources in another domain.  Established when the users in one domain need access to resources in the other domain, but those in the second domain do not need access to resources in the first domain.
  • 11.  Realm Trust  Realm trusts are explicit trusts that are created to join a Windows Server 2003 domain to a non-Windows .This allows you the flexibility of creating a trust for your non- Windows networks to interoperate with the security services based on other Kerberos v5 implementations, such as with UNIX.  External Trust  An external trust is used when you need to create a trust between domains outside of your forest.  External trusts are always nontransitive, but they can be established in a one-way or two-way configuration.
  • 12.
  • 13. Forest Trust A forest trust can only be created between the root domains in two forests. Both forests must be Windows Server 2003 forests. These trusts can be one- or two- way trusts. They are considered transitive trusts because the child domains inside the forest can authenticate themselves across the forest to access resources in the other forest.
  • 14. Forest 1 Tree/Root Forest Forest 2 Trust Trust Parent/Child Trust Forest Forest (root) Domain D (root) Domain E Domain A Domain B Domain P Domain Q Shortcut Trust Realm External Domain F Domain C Trust Trust Kerberos Realm