Solved

Set RDP server to authenticate with RODC

Posted on 2013-01-09
2
772 Views
Last Modified: 2013-04-03
I have 2 forests, A and B, connected with a 2 way trust over a VPN tunnel.
In Forest A, I have an RDP Server.
Users in Forest B can login to the RDP Server using their own domain credentials, but logon is slow as it authenticates back with the domain controllers in Forest B.

I have installed a Read Only Domain Controller (Forest B) in Forest A, hoping to speed up the authentication. However, when users that logon to the RDP server is still authenticating back to the old DC in Forest B, rather than the RODC in Forest A.

How can I make them authenticate to the RODC?

I have granted the users membership to "Allowed RODC Password Replication Group", as well as verified that their accounts are visible in the "Accounts whose passwords are stored in this Read-only Domain Controller".
I have also the domain controllers assigned correctly to the 2 Sites with correct subnets in Active Directory sites and services.
0
Comment
Question by:frukeus
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 37

Accepted Solution

by:
Jian An Lim earned 500 total points
ID: 38761451
i have a think about that.
the behaviour mainly driven by the 2 way trust setup
if you have setup your 2 way trust to go over the VPN, it will fly over the VPN.

so i think you need to change your 2 way trust to trust the RODC.

but i am guessing there must be something prohibited not to trust a rodc
0
 
LVL 1

Author Closing Comment

by:frukeus
ID: 39043474
I read somewhere that the 2 way trust will always check with the DC first instead of RODC.
0

Featured Post

On Demand Webinar: Networking for the Cloud Era

Did you know SD-WANs can improve network connectivity? Check out this webinar to learn how an SD-WAN simplified, one-click tool can help you migrate and manage data in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
Let's recap what we learned from yesterday's Skyport Systems webinar.
In this Micro Tutorial viewers will learn how they can get their files copied out from their unbootable system without need to use recovery services. As an example non-bootable Windows 2012R2 installation is used which has boot problems.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

628 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question