MS-LSAD and MS-ADTS discuss trusted domains, but no-where is there a good protocol overview, showing the actions and impacts from the top down.
I had thought I would just work on the details, and look at network traces for the high level, but in retorpsect this was a poor approach. Could you please provide an overview of this area? Thanks, Andrew Bartlett -- Andrew Bartlett http://samba.org/~abartlet/ Authentication Developer, Samba Team http://samba.org Samba Developer, Red Hat Inc.
signature.asc
Description: This is a digitally signed message part
_______________________________________________ cifs-protocol mailing list [email protected] https://lists.samba.org/mailman/listinfo/cifs-protocol
