Solved

Authenticated Users Vs Domain Users

Posted on 2013-05-19
4
392 Views
Last Modified: 2013-05-19
Any expert out there to clear up the confusion between Domain and Authenticated users ?
To my understanding, both are authenticated by the domain..

Thank you.
0
Comment
Question by:jskfan
  • 2
4 Comments
 
LVL 15

Assisted Solution

by:Rob Stone
Rob Stone earned 250 total points
ID: 39178545
Authenticated Users can be used when you have multi-domain forests.

If you had a single domain forest then you shouldn't notice any difference from either group.
0
 
LVL 70

Accepted Solution

by:
KCTS earned 250 total points
ID: 39178616
Yes - to clarify - a domain user will have been authenticated in your domain, an authenticated user may have been authenticated by a trusted sever in your forest. If you have a single domain then the two are identical.
0
 

Author Comment

by:jskfan
ID: 39179402
Thank you for the clarification
0
 

Author Closing Comment

by:jskfan
ID: 39179404
Thank you
0

Featured Post

NFR key for Veeam Backup for Microsoft Office 365

Veeam is happy to provide a free NFR license (for 1 year, up to 10 users). This license allows for the non‑production use of Veeam Backup for Microsoft Office 365 in your home lab without any feature limitations.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article shows the method of using the Resultant Set of Policy Tool to locate Group Policy that applies a particular setting.
This article demonstrates probably the easiest way to configure domain-wide tier isolation within Active Directory. If you do not know tier isolation read https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/s…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question