Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Accessing resources on another network and authentication

Posted on 2013-02-05
1
Medium Priority
?
170 Views
Last Modified: 2013-02-19
I have a query about authenticating across domains for resources. I have a one way trust in place with another company. If a user authenticates on the remote network and tries to access a resource on my network do they authenticate off any of my domain controllers or are they simply handed a token when they logon to their network and seamlessly pass through onto my network and obviously when they try to access a shared resource their token is checked for permissions.
Thanks
0
Comment
Question by:Sid_F
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 57

Accepted Solution

by:
Mike Kline earned 2000 total points
ID: 38854671
They don't authenticate to your domain controllers, that happens on their domain controllers.  They will get a TGT and service tickets for your file server/resources

Good page here

http://technet.microsoft.com/en-us/library/cc773178(v=ws.10).aspx

The Kerberos Authentication process over domain trusts is a good overview.

Thanks

Mike
0

Featured Post

New feature and membership benefit!

New feature! Upgrade and increase expert visibility of your issues with Priority Questions.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Had a business requirement to store the mobile number in an environmental variable. This is just a quick article on how this was done.
In the absence of a fully-fledged GPO Management product like AGPM, the script in this article will provide you with a simple way to watch the domain (or a select OU) for GPOs changes and automatically take backups when policies are added, removed o…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
This video shows how to use Hyena, from SystemTools Software, to update 100 user accounts from an external text file. View in 1080p for best video quality.

722 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question