Previous section   Next section

ADMINISTRATIVE SECURITY AND TRUST RELATIONSHIPS

Domains are fundamental security boundaries, which by default restrict users in one domain from gaining access to objects in another domain. However, "trust" relationships can be created between domains to allow object accessibility across these secure borders.

Since administration can be delegated to domains and OUs, Windows Server 2003 establishes certain administrative defaults. The Domain Administrator group can control activities only in that domain, which means that administrative privileges do not automatically flow down to other domains. Thus, a system administrator for the root domain must be explicitly allowed rights to its child domains.

Administrative rights on another domain can be either limited or full. To be granted full rights in another domain, the user must be specifically added to that domain's Administrator group. For more limited rights, that administrator must grant permissions to certain objects or organizational units.

Remember that domains are organized into trees that share a namespace and are composed of a single domain or a root domain with child domains. All domains in the tree share Active Directory. Active Directory objects are contained on domain controllers in each individual domain.

Users gain access across domains within the tree through trust relationships. The hierarchical structure of the domain tree (extending internally to the organizational units) permits the flow of permissions to an OU. With appropriate group and OU permissions, a user in one domain can use resources or gain access to objects in another domain.

In trust relationships, user logons are honored between trusted domains. When two trees are trusted at the root domain, users in one tree can log on to domains in the other tree. However, specific access to objects is based on specific permissions associated with that user and the object's ACL. The Active Directory supports two trust relationship models:


  Previous section   Next section
Top