Solved

IASidentity

Posted on 2010-11-16
2
2,875 Views
Last Modified: 2012-05-10
We've decommissioned an old dhcp server and would like to remove it from AD. however, i've noticed that while trying to delete it. AD is complaining that there is an object underneath this server
called IASidentity? Is it okay if i delete it? Has anyone had this happen to them.
0
Comment
Question by:FREDARCE
2 Comments
 
LVL 16

Accepted Solution

by:
Richard Olutola earned 500 total points
ID: 34153761
IASIdentity is created by Microsoft Internet Authentication Service.

Internet Authentication Service (IAS) is the Microsoft implementation of a Remote Authentication Dial-in User Service (RADIUS) server and proxy in Windows Server 2003. As a RADIUS server, IAS performs centralized connection authentication, authorization, and accounting for many types of network access, including wireless and virtual private network (VPN) connections. As a RADIUS proxy, IAS forwards authentication and accounting messages to other RADIUS servers.

If you no longer use this, then you can delete it.

R.
0
 

Author Closing Comment

by:FREDARCE
ID: 34158897
Thank you very much!
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

How to Unravel a Tricky Query Introduction If you browse through the Oracle zones or any of the other database-related zones you'll come across some complicated solutions and sometimes you'll just have to wonder how anyone came up with them.  …
There are times where you would like to have access to information that is only available from a different network. This network could be down the hall, or across country. If each of the network sites have access to the internet, you can create a ne…
This video shows how to copy a database user from one database to another user DBMS_METADATA.  It also shows how to copy a user's permissions and discusses password hash differences between Oracle 10g and 11g.
Via a live example, show how to restore a database from backup after a simulated disk failure using RMAN.

778 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question