Solved

Forest Trust and Resources

Posted on 2013-02-04
2
309 Views
Last Modified: 2013-02-11
We have a company that we have acquired and we are thinking of doing a Forest trust between our Domains.  
We have a root domain with several child domains and they are just one domain.
We have 2008 R2 and they have 2008 R2 and it is at functional level 2003.

If we did the forest trust with Forest wide authentication would we be able to give them laptops and desktops that are joined to one of our child domains and seat on there Network/Domain and still be able to access resources from our domain and there's?
0
Comment
Question by:hbpub
2 Comments
 
LVL 9

Accepted Solution

by:
Zenvenky earned 500 total points
ID: 38853777
Yes, it is possible. Please check the following links for better awareness.

http://technet.microsoft.com/en-us/library/cc756852(v=ws.10).aspx

http://technet.microsoft.com/pt-pt/library/cc785875(v=ws.10).aspx

Note:- Refer following link for better understanding.

Accessing Resources across forest and achieve Single Sign ON
0
 

Author Closing Comment

by:hbpub
ID: 38876599
thanks for this info.
0

Featured Post

VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Last week, our Skyport webinar on “How to secure your Active Directory” (https://www.experts-exchange.com/videos/5810/Webinar-Is-Your-Active-Directory-as-Secure-as-You-Think.html?cid=Gene_Skyport) provided 218 attendees with a step-by-step guide for…
This article explains the steps required to use the default Photos screensaver to display branding/corporate images
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question