Authenticated Users Vs Domain Users

Posted on 2013-05-19
Medium Priority
Last Modified: 2013-05-19
Any expert out there to clear up the confusion between Domain and Authenticated users ?
To my understanding, both are authenticated by the domain..

Thank you.
Question by:jskfan
  • 2
LVL 15

Assisted Solution

by:Rob Stone
Rob Stone earned 1000 total points
ID: 39178545
Authenticated Users can be used when you have multi-domain forests.

If you had a single domain forest then you shouldn't notice any difference from either group.
LVL 70

Accepted Solution

KCTS earned 1000 total points
ID: 39178616
Yes - to clarify - a domain user will have been authenticated in your domain, an authenticated user may have been authenticated by a trusted sever in your forest. If you have a single domain then the two are identical.

Author Comment

ID: 39179402
Thank you for the clarification

Author Closing Comment

ID: 39179404
Thank you

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Microsoft Office 365 is a subscriptions based service which includes services like Exchange Online and Skype for business Online. These services integrate with Microsoft's online version of Active Directory called Azure Active Directory.
The Windows Firewall provides an important layer of protection and a rich interface to configure it. Unfortunately, it lacks item level filtering. This article details my process of implementing firewall-as-code to reduce GPO bloat.
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

621 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question