?
Solved

Authenticated Users Vs Domain Users

Posted on 2013-05-19
4
Medium Priority
?
409 Views
Last Modified: 2013-05-19
Any expert out there to clear up the confusion between Domain and Authenticated users ?
To my understanding, both are authenticated by the domain..

Thank you.
0
Comment
Question by:jskfan
  • 2
4 Comments
 
LVL 15

Assisted Solution

by:Rob Stone
Rob Stone earned 1000 total points
ID: 39178545
Authenticated Users can be used when you have multi-domain forests.

If you had a single domain forest then you shouldn't notice any difference from either group.
0
 
LVL 70

Accepted Solution

by:
KCTS earned 1000 total points
ID: 39178616
Yes - to clarify - a domain user will have been authenticated in your domain, an authenticated user may have been authenticated by a trusted sever in your forest. If you have a single domain then the two are identical.
0
 

Author Comment

by:jskfan
ID: 39179402
Thank you for the clarification
0
 

Author Closing Comment

by:jskfan
ID: 39179404
Thank you
0

Featured Post

Creating Active Directory Users from a Text File

If your organization has a need to mass-create AD user accounts, watch this video to see how its done without the need for scripting or other unnecessary complexities.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Uncontrolled local administrators groups within any organization pose a huge security risk. Because these groups are locally managed it becomes difficult to audit and maintain them.
Transferring FSMO roles is done when an admin wants to split roles between certain Domain Controllers or the Domain Controller holding the Roles has been forcefully demoted using dcpromo / forceremoval
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question