Примеры использования Trusted domain на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Trusted domain objects.
Computer on trusted domain.
Administer Server for NFS only from computers in a trusted domain.
Remove: Click to remove the selected trusted domain name from the list of trusted domains. .
This account may belong to the current or trusted domain.
This includes accounts in untrusted domains, one-way trusted domains, and other forests.
Automatically approve clients from trusted domains.
Trusted domain objects(TDOs) are objects that represent each trust relationship within a particular domain. .
Automatically approve computers in trusted domains(recommended).
All domain trust relationships have only two domains in the relationship:the trusting domain and the trusted domain.
You can also set up and manage the virtual machines on hosts in trusted domains, workgroups, or perimeter networks.
This method can be used for any computers running the Kerberos V5 authentication protocol that are members of the same or trusted domains.
SID filtering helps neutralize the threat of malicious users in the trusted domain using the SIDHistory attribute to gain elevated privileges.
You can use the Add Forest function to add externally trusted domains.
SID history data that contains SIDs from any domain other than the trusted domain is removed from authentication requests that are made from the trusted domain.
Add telephony clients to this domain or a trusted domain.
Automatically approving computers in trusted domains automatically authorizes client computers joined to domains trusted by the site server's domain. .
If there are multiple domains, create the account in a trusted domain.
A target server, which must be in the current or trusted domain/realm, is given a valid general purpose Kerberos Ticket Granting Ticket(TGT), which can be used to fully impersonate the authenticated user or service.
Specifies that the DNS domain name that follows is the trusted domain.
Therefore, before you assign access to resources in the trusting domain for users in the trusted domain, confirm that the universal group that contains the trusted domain users was created in the trusted domain.
Specifies the user account that is used to make the connection with the trusted domain.
When SID filtering is not enabled on outgoing external trusts, a malicious user with administrative credentials in the trusted domain may be able to"sniff" network authentication requests from the trusting domain to obtain the SID information of a user, such as a domain administrator, who has full access to resources in the trusting domain. .
It must also be in the same domain as the server or in a fully trusted domain.
To ensure that Server for NFS configuration changes are properly replicated,always use a computer that belongs to a trusted domain when you administer Server for NFS running on a cluster.
Because universal groups must adhere to the same SID filtering guidelines as other security principal objects(that is, the universal group object SID must also contain the domain SID),verify that any universal groups that are assigned to shared resources in the trusting domain were created in the trusted domain.
After obtaining the domain administrator's SID from the trusting domain, a malicious user with administrative credentials can add that SID to a user account's SIDHistory attribute in the trusted domain and attempt to gain full access to the trusting domain and the resources in that domain. .
Attempting to mount with the net use command results in the error message: 1788:The trust relationship between the primary domain and the trusted domain failed.
Attempting to mount with the net use command results in the error message: 1788:The trust relationship between the primary domain and the trusted domain failed.
To determine this, the security system computes the trust path between a domain controller in the trusting domain anda domain controller in the trusted domain.