[Last Call] Learn how to a build a cloud-first strategyRegister Now


How are permissions to resources affected when user loses connection to authenticating domain controller

Posted on 2011-04-22
Medium Priority
Last Modified: 2012-08-14
How is access to resources affected when a computer/user loses access to a domain controller.

ExampleIf the user authenticates successfully to a remote domain controller  but then later loses WAN connectivity.  Can they still access shares and printers on their local LAN?
Question by:chris3174
  • 2
LVL 17

Accepted Solution

Tony Massa earned 2000 total points
ID: 35450304
Yes, when a user logs on to a windows computer, they are issued a token which includes their domain user token, group token, etc.  If a user is logged on to the domain, and the DC goes down, the users will still be able to access network resources they had access to previously.

This may not work for a SAMBA share, but I've never attempted this personally.  Windows server shared folders/printers would continue to function.
LVL 17

Expert Comment

by:Tony Massa
ID: 35450319

Featured Post

Visualize your virtual and backup environments

Create well-organized and polished visualizations of your virtual and backup environments when planning VMware vSphere, Microsoft Hyper-V or Veeam deployments. It helps you to gain better visibility and valuable business insights.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Had a business requirement to store the mobile number in an environmental variable. This is just a quick article on how this was done.
Active Directory can easily get cluttered with unused service, user and computer accounts. In this article, I will show you the way I like to implement ADCleanup..
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

829 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question