The information in this article applies to:
SYMPTOMSThe following symptoms may occur:
CAUSE
It is possible that the group memberships have not been configured in a correct manner: RESOLUTIONTo Resolve Symptom 1After establishing a trust, the domain administrators for a trusted domain are not automatically added to the administrators group of a trusting domain. If the ability to administer the trusting domain by members of the the trusted domain is desired, these members must be manually added.To Resolve Symptom 2NTFS permissions and share permissions are separate entities. Users must have sufficient permissions at both levels to access a resource, because a process will be granted the most restrictive of the two permissions. Another possibility for this problem is because member servers and workstations in a domain have separate accounts databases from the domain controllers; for example, creating a local group on a domain controller does not create the same local group in the accounts databases of workstations and servers in the domain. That local group would only exist in the SAM for the domain controllers. Likewise, creating a local group on a workstation or member server only creates that local group in that one computer's SAM.Furthermore, local groups on a member server cannot include local groups from a domain controller. Interestingly enough, a common mistake is to try to add a local group from a domain controller to the access control list (ACL) on a workstation or member server. This can be done by clicking Search in the Add Users and Groups dialog box. Unfortunately, the result is essentially meaningless because a member of the local group on a domain controller will still not be able to access a shared resource through that type of group association. For a user in a trusted domain to access resources in a trusting domain, perform the following steps:
Additional query words:
Keywords : ntdomain ntsecurity |
Last Reviewed: March 27, 1999 © 2000 Microsoft Corporation. All rights reserved. Terms of Use. |