Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Forest Trust and Resources

Posted on 2013-02-04
2
Medium Priority
?
321 Views
Last Modified: 2013-02-11
We have a company that we have acquired and we are thinking of doing a Forest trust between our Domains.  
We have a root domain with several child domains and they are just one domain.
We have 2008 R2 and they have 2008 R2 and it is at functional level 2003.

If we did the forest trust with Forest wide authentication would we be able to give them laptops and desktops that are joined to one of our child domains and seat on there Network/Domain and still be able to access resources from our domain and there's?
0
Comment
Question by:hbpub
2 Comments
 
LVL 10

Accepted Solution

by:
Zenvenky earned 2000 total points
ID: 38853777
Yes, it is possible. Please check the following links for better awareness.

http://technet.microsoft.com/en-us/library/cc756852(v=ws.10).aspx

http://technet.microsoft.com/pt-pt/library/cc785875(v=ws.10).aspx

Note:- Refer following link for better understanding.

Accessing Resources across forest and achieve Single Sign ON
0
 

Author Closing Comment

by:hbpub
ID: 38876599
thanks for this info.
0

Featured Post

How to Use the Help Bell

Need to boost the visibility of your question for solutions? Use the Experts Exchange Help Bell to confirm priority levels and contact subject-matter experts for question attention.  Check out this how-to article for more information.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
A bad practice commonly found during an account life cycle is to set its password to an initial, insecure password. The Password Reset Tool was developed to make the password reset process easier and more secure.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

876 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question