Archived from groups: microsoft.public.win2000.active_directory (
More info?)
Magoo,
Maybe I am missing something here. But trusts simply afford us the
possibility of accessing objects ( resources ) in other domains. It is the
NTFS and Share permissions that control who can access what. Or am I
missing something?
If the problem is that you can not trust the Domain Admin(s) then this is
not a technical problem but an HR problem. I was a Domain Admin and an
Enterprise Admin where I used to work. I had access to
everything.....offers, negotiations for movie contracts, payroll and
everything. I never thought - not for a split second - about taking
advantage of this. And I am pretty sure that no one every suspected that I
might be sneaking around. If there are suspicions that the Admin is doing
this then this needs to be handled. But it is not a technical issue.
--
Cary W. Shultz
Roanoke, VA 24012
Microsoft Active Directory MVP
http://www.activedirectory-win2000.com
http://www.grouppolicy-win2000.com
"Magoo" <nospammagoo@hotmail.com> wrote in message
news:OD2jZvOVFHA.1200@TK2MSFTNGP14.phx.gbl...
> In my case, politics or separation of domain administration is not an
> issue. If I create a separate domain-forest for "students", the domain
> administrator for both domains would be the same individual. That means a
> separate domain-forest won't me help there.
> My case is really protecting payroll, accounting, financial, student
> database records against students since students don't need to access
> those resources in the first place. As we already know, if a student can
> put connect his laptop to the same subnets where staff is connected to,
> honestly I can't see how a separate logical boundary such as an additional
> domain would help. Correct if I am wrong, but this idea of separate
> forests-domains will make sense only the day that I can also provide
> separate subnets/networks to my student population. Otherwise it seems
> that the hassle of setting up a logical forest boundary doesn't make a lot
> of sense indeed.
>
>
> "Tomasz Onyszko [MVP]" <T.Onyszko_nospam_@microsfot.com> wrote in message
> news:%23Pqv5aOVFHA.4056@TK2MSFTNGP15.phx.gbl...
>> Magoo wrote:
>>> Imagine I setup an one way trust between two forests, where "Mystudent"
>>> trusts "Mystaff" forest. Then I manage to separate resources (file
>>> servers,
>>> printers) for both staff and students.
>>>
>>> How such one way trust and forest/domain separation could give me
>>> additional
>>> security ?
>>> Imagine a "student" logged on to the student domain attempts to query
>>> and
>>> brake accounts out of "mystaff" domain:
>>
>> This is not good example - If you will have a service which will be
>> avilable in internet, for example SMTP with authentication in domain, any
>> person in the world can try to query and break Your accounts security by
>> trying to guess the password.
>>
>> The only way to protect against it is set some rules like password policy
>> and account policy.
>>
>> Beside your situation with staff and students and talking about general
>> situation - when you have some resources in two separated divisions or
>> companies, and you have to share some resources between these divisions
>> it is better to built separated networks and then put some connection
>> between these organisation to share only specified resources then to put
>> both organisation on the same "wire" and then working on providing some
>> security in this environment.
>>
>> Remeber that when you have two domain You also have domain admins in both
>> domains - in one forest You cann't be sure thath domain admin from one
>> domain will not get rights in other domain.
>>
>> Using trusts you can separate administrators role - administrator from
>> forest A can be ordinary user in forest B and You can built one way trust
>> relationship, you can't do this in single forest with multiple domain.
>>
>>> I have an AD fellow here that tells me that such security provided by
>>> isolating the domain is very minimal and worthless.
>>
>> If You want to control access to resources in mystaff domain on the
>> trusts between forests You can take advantage of selective authentication
>> functionality, which lets You control accesss to the resources in very
>> strict manner:
>>
http://www.microsoft.com/technet/prodtechnol/windowsserver2003/library/Operations/9266b197-7fc9-4bd8-8864-4c119ceecc00.mspx
>>
>> These are few things which comes to my mind now - I will be glad to get
>> to know your friends arguments about this that forest doesn't provide
>> additional security in AD design.
>>
>> It's late here (in my time zone) and myabe my thought wasn't clear
>> --
>> Tomasz Onyszko [MVP]
>>
http://www.w2k.pl
>
>