?
Solved

DLAP query from Root domain to child domain

Posted on 2010-08-26
2
Medium Priority
?
910 Views
Last Modified: 2013-12-24
Can an LDAP authentication system query a child domain from the Root domain for objects?

The LDAP auth system is connected to the Root domain and it queries/finds objects from root domain without any problems, the trouble starts when we try to query users from the child domain.

Two way trusts are established. Windows 2003 R2

Any ideas?
0
Comment
Question by:mechanicus01
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 57

Accepted Solution

by:
Mike Kline earned 1600 total points
ID: 33535980
You will have to point the query to use a GC if you want to search for users outside of the domain.  A tool like adfind lets you specify the GC.  

In ADUC you can search the entire directory.

thanks

Mike
0
 
LVL 71

Assisted Solution

by:Chris Dent
Chris Dent earned 400 total points
ID: 33539967

Most LDAP authentication systems will let you select the GC simply by changing the port from 389 to 3268.

Chris
0

Featured Post

Get MySQL database support online, now!

At Percona’s web store you can order your MySQL database support needs in minutes. No hassles, no fuss, just pick and click. Pay online with a credit card.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In the absence of a fully-fledged GPO Management product like AGPM, the script in this article will provide you with a simple way to watch the domain (or a select OU) for GPOs changes and automatically take backups when policies are added, removed o…
In today's business world, data is more important than ever for informing marketing campaigns. Accessing and using data, however, may not come naturally to some creative marketing professionals. Here are four tips for adapting to wield data for insi…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…
Suggested Courses

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question