MS-LSAD and MS-ADTS discuss trusted domains, but no-where is there a
good protocol overview, showing the actions and impacts from the top
down.  

I had thought I would just work on the details, and look at network
traces for the high level, but in retorpsect this was a poor approach.
Could you please provide an overview of this area?

Thanks,

Andrew Bartlett
-- 
Andrew Bartlett
http://samba.org/~abartlet/
Authentication Developer, Samba Team           http://samba.org
Samba Developer, Red Hat Inc.

Attachment: signature.asc
Description: This is a digitally signed message part

_______________________________________________
cifs-protocol mailing list
[email protected]
https://lists.samba.org/mailman/listinfo/cifs-protocol

Reply via email to