Solved

DLAP query from Root domain to child domain

Posted on 2010-08-26
2
898 Views
Last Modified: 2013-12-24
Can an LDAP authentication system query a child domain from the Root domain for objects?

The LDAP auth system is connected to the Root domain and it queries/finds objects from root domain without any problems, the trouble starts when we try to query users from the child domain.

Two way trusts are established. Windows 2003 R2

Any ideas?
0
Comment
Question by:mechanicus01
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 57

Accepted Solution

by:
Mike Kline earned 400 total points
ID: 33535980
You will have to point the query to use a GC if you want to search for users outside of the domain.  A tool like adfind lets you specify the GC.  

In ADUC you can search the entire directory.

thanks

Mike
0
 
LVL 71

Assisted Solution

by:Chris Dent
Chris Dent earned 100 total points
ID: 33539967

Most LDAP authentication systems will let you select the GC simply by changing the port from 389 to 3268.

Chris
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
When it comes to protecting Oracle Database servers and systems, there are a ton of myths out there. Here are the most common.
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

732 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question