Solved

DC Locator Setting in GP / Local Authentication

Posted on 2007-12-01
2
570 Views
Last Modified: 2008-05-30
I have noticed that my clients are authenticating against domain controllers that are not local to them.  I have checked the site and services, the settings are correct.  I have been doing some research and located the option to setup the DC Locator Server http://searchwinit.techtarget.com/tip/0,289483,sid1_gci1283750,00.html ) .  If this option is configured, will it force the computers to authenticate to the subnets that are on that network vs. ones that are not?  Also, if forced, if those controllers are down will it authenticate to the local computer or search for remotes listed in DNS?
0
Comment
Question by:securitythreat
2 Comments
 
LVL 70

Accepted Solution

by:
KCTS earned 500 total points
ID: 20390076
If you want clients to authenticate with particular domain controllers in preference to others then you need to configure Active Directory Sites properly.

You should start by defining your subnets in Active Directory Sites and services, then you need to create sites and associate one or more subnets with each site. Once that is done then clients will attempt to use a DC on their own site for authentication.

Of course is you want to minimise traffic across the subnets you should also place a DNS server in each site (easy to do if you use AD integrated DNS), and point clients to that DNS server as their preferred DNS server. Also the DC/DNS server should be made a global catalg server as well to provide GC lookups locally as well. If you are uding DHCP you could also look at localising that as well.

0
 
LVL 1

Author Comment

by:securitythreat
ID: 20390104
I have all this in place.  However, this is still an issue.
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article, we will see the basic design consideration while designing a Multi-tenant web application in a simple manner. Though, many frameworks are available in the market to develop a multi - tenant application, but do they provide data, cod…
Find out how to use Active Directory data for email signature management in Microsoft Exchange and Office 365.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question