123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> System-Network-Administration >> View Article

Setting Selective Authentication

Profile Picture
By Author: iris
Total Articles: 286
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Recall from Chapter 4 that you can set CompTIA A+ Essentials selective authentication when you create an external or forest trust by using the New Trust Wizard. You can also set selective authentication for an existing external or forest trust by using the Active Directory Domains And Trusts console.
To set selective authentication for an external or forest trust, complete the following steps:
1.Click Start, point to Administrative Tools, and then click Active Directory Domains And Trusts.
2.In the console tree, right-click the domain node for the domain you want to administer, and then click Properties.
3.On the Trusts tab, under either Domains Trusted By This Domain (Outgoing Trusts) or Domains That Trust This Domain (Incoming Trusts), do one of the following:
Click the external trust that you want to administer, and then click Properties. On the Authentication tab, click Selective Authentication, and then click OK.
Click the forest trust that you want to practical application administer, and then click ...
... Properties. On the Authentication tab, click Selective Authentication, and then click OK.
4.In the Properties dialog box for the domain, click OK.
Manually enable permissions on each domain and resource in the local domain or forest to which you want users in the second domain or forest to have access.
Know how to set selective authentication for an external trust and a forest trust.
To perform this procedure for an external or forest trust, you must be a member of the Domain Admins group (in the forest root domain) or the Enterprise Admins group in Active Directory, or you must have been delegated the appropriate authority.
If you choose to prevent a specific object from inheriting permissions by clearing the Allow Inheritable Permissions From The Parent To Propagate To This Object And All Child Objects. Include These With Entries Explicitly Defined Here check box, you are shown a message box that allows you to
Copy previously inherited permissions to the object. The new explicit permissions for the object are a copy of the permissions that it previously inherited from its parent object. Then, according to your needs, you can make any necessary changes to the permissions.
Remove previously inherited permissions from the object. Windows Server 2003 removes any previously inherited permissions. No permissions exist for the object.Then, according to your needs, you can assign mcsa any permissions for the object.

Total Views: 395Word Count: 380See All articles From Author

Add Comment

System/Network Administration Articles

1. Fiber Optic Polishing Machines: Types, Applications, And When They Are Needed
Author: Ryan

2. Fiber Optic Pigtails: Types, Specifications, And Applications Explained
Author: Ryan

3. Fiber Curing Oven: Working Principles, Features, And Applications
Author: Ryan

4. From Struggling Pipelines To Sustainable Growth: The Real Benefits Of Outsourcing Lead Generation
Author: Sophia

5. Smart Print Automation: Transforming The Way Print Shops Work
Author: Printstore

6. Reasons To Try Aura Scanning For Inner Healing
Author: vidhi vidhanya

7. Fiber Polishing Machines: Precision Technology For High-performance Optical Networks
Author: Ryan

8. Mtp Cables Are Meant For High-performance Fibre Optic Communication
Author: Ryan

9. The Rising Importance Of Email Security In A Digital-first World
Author: Impaakt Magazine

10. Arbeitszeit Berechnen Mit Arbeitszeitrechner-24.de
Author: Steffen Stahl

11. Can Your Cloud Voip Provider Troubleshoot The Common Problems Associated With This Service?
Author: Julian Serle

12. An Optical Cable Production Line For Powering Global Connectivity
Author: Ryan

13. Why Does Your Business Need Optical Booster Amplifier?
Author: Ryan

14. The Latest In Cloud Technology And What It Means For Your Business
Author: TechFacto Global Services

15. Achieve Nis2 Compliance With Confidence
Author: Tushar Pansare

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: