Celebrate National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Forest Trust and Resources

Posted on 2013-02-04
2
Medium Priority
?
315 Views
Last Modified: 2013-02-11
We have a company that we have acquired and we are thinking of doing a Forest trust between our Domains.  
We have a root domain with several child domains and they are just one domain.
We have 2008 R2 and they have 2008 R2 and it is at functional level 2003.

If we did the forest trust with Forest wide authentication would we be able to give them laptops and desktops that are joined to one of our child domains and seat on there Network/Domain and still be able to access resources from our domain and there's?
0
Comment
Question by:hbpub
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 10

Accepted Solution

by:
Zenvenky earned 2000 total points
ID: 38853777
Yes, it is possible. Please check the following links for better awareness.

http://technet.microsoft.com/en-us/library/cc756852(v=ws.10).aspx

http://technet.microsoft.com/pt-pt/library/cc785875(v=ws.10).aspx

Note:- Refer following link for better understanding.

Accessing Resources across forest and achieve Single Sign ON
0
 

Author Closing Comment

by:hbpub
ID: 38876599
thanks for this info.
0

Featured Post

Are your AD admin tools letting you down?

Managing Active Directory can get complicated.  Often, the native tools for managing AD are just not up to the task.  The largest Active Directory installations in the world have relied on one tool to manage their day-to-day administration tasks: Hyena. Start your trial today.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
Group policies can be applied selectively to specific devices with the help of groups. Utilising this, it is possible to phase-in group policies, over a period of time, by randomly adding non-members user or computers at a set interval, to a group f…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question