Celebrate National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17


Looking for answers on  Two Way Trust Vulnerabilities

Posted on 2009-07-02
Medium Priority
Last Modified: 2012-05-07
I'm trying to put together a point paper explaining the benefits and the vulnerabilities of establishing a two way trust between two domains.  I've got plenty of information on the benefits but honestly I can't find anything "negative" towards establishing one.  Can anyone explain some of the inherent vulnerabilities of establishing a trust?  Users from domain A cannot access resources from domain B unless the permissions allow the specific user, authenticated users or everyone to access that resource.  Administrators from domain A should not be able to do any administration in domain B.  
The next question, what are some of the things I should do security wise to "protect" my network more once I establish a two way trust?
Question by:tej071
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
LVL 19

Expert Comment

ID: 24763784
The name "Trust" says it all.

The admin of Domain B will have to trust the domain admins of domain A. In practice, permissions aren't assigned to specific users but to groups. If a domain admin A adds member "criminal" to a group which has full rights in "financial data" on domain B that is not visible.

Author Comment

ID: 24765070
Are you sure about the admins from one domain having rights on the other domain?  I ask this because an administrator in a child domain does not have rights to make changes to a parent domain and that is a transitive trust.  I understand users will have access to resources on the other domain but only if that is specifically set, they just dont' get access to resources just because a trust was established.
LVL 19

Expert Comment

ID: 24770438
No, that was not wat i said.

If Domain admin B gives folder permissions to  a group from Domain A, he cannot see who is in the Domain A Group. The Domain admin from domain A however can put anyone from Domain A in that group.

Domain admin B cannot see that Domain admin A has added someone to the group, to him it's just the same group.

Author Comment

ID: 24771185
Correct, I misread your original statement and the same is true WITHIN Domain A when I assign users to a resource with full rights from Domain A to resources in Domain A I trust that they won't cause trouble there as well.  
I guess my question was more geared toward Administrators from one domain being able to influence things in another domain once the trust is established.  Without assigning them any special rights they have no more abilities to make changes in my domain than a user on my domain has rights (i.e. adding user accounts, changing FSMO roles, changing SMTP connectors, etc), correct?

LVL 19

Accepted Solution

deroode earned 1000 total points
ID: 24771291
Yes, that is correct.

I cannot help you with your second (security) question, sorry..

Featured Post

New benefit for Premium Members - Upgrade now!

Ready to get started with anonymous questions today? It's easy! Learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, I had the need to build a standalone system to run a point-of-sale system. I’m running this on a low-voltage Atom processor, so I wanted a light-weight operating system, but still needed Windows. I chose to use Microsoft Windows Server 200…
Restoring deleted objects in Active Directory has been a standard feature in Active Directory for many years, yet some admins may not know what is available.
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question