Forest TrustWhen an external trust is created between a Windows Server 2003 domain and another Windows Server 2003 domain in another forest, the trust relationship can be one-way or two-way, incoming or outgoing. Selective authentication can be used to limit the domains in the trusting forest that will participate in the trust. However, the trust relationship only exists between the two domains and is not a Kerberos-style trust. Authentication across the trust relationship will be NTLM. If you require trust between all domain controllers in each of two forests, you must create a forest trust. If you do so, the trust can be one-way or two-way and will be a Kerberos transitive trust. The following requirements must be met before the trust can be created:Both forests must be Windows Server 2003 forests.All DCs must be running Windows Server 2003.Both forests must be at Windows Server 2003 level functionality. (The trust is created between the root forest domains of each forest.)The DNS infrastructure must be configured correctly.Transitivity exists between forests in a forest trust but does not extend to other forest trust relationships. Transitivity between forests means that the trust relationship extends to every domain in both forests. That is, if Forest A is trusted by Forest B, and Forest B is trusted by Forest C, there is no trust relationship between Forest A and Forest C. Users in Forest A may be granted access to resources in Forest B, and users in Forest B may be granted resource access in Forest A, but users in Forest A cannot be given access to resources in Forest C.SID filtering is enabled automatically across a forest trust, thus helping to prevent elevation of privilege attacks. Incoming and Outgoing Forest TrustsTrust relationships between Windows Server 2003 forests are also defined using the incoming and outgoing convention. If a forest has an incoming forest trust, this indicates that the users in the internal or local forest can be granted access to resources and privileges in the external or specified forest. This is roughly equivalent to saying that the local forest is trusted and the specified forest is trusting. When a forest has an outgoing forest trust, it means that users in the specified forest can be granted access to resources and privileges in the local forest. This is roughly equivalent to saying that the local forest is trusting and the specified forest is trusted. Figure 8-32 displays these relationships. In the figure, the domain 1 forest has incoming and outgoing forest trusts with the domain B forest. John and Peter, who have accounts in domains 3 and 8, respectively, can be given permission to access resources in any domain in the domain A forest. Likewise, Francine, with an account in domain E, can be given access to any domain in the domain 1 forest. Figure 8-32. Incoming and outgoing forest trusts.![]() Cross-Forest Authentication and AuthorizationThe process of obtaining ticket granting tickets (TGTs) during authentication and service tickets to enable resource access in a single forest was described in Chapter 2, "Authentication: Proof of Identity." When a forest trust exists and requests that resource access lie outside the forest, a special additional action is necessary. Figure 8-33 illustrates the process. In the figure, Peter, whose workstation and user account is in domain 8, wants to access a resource in domain F on its server 1 across a forest trust between the domain 1 forest and the domain A forest. The following steps match the numbers in the figure. Figure 8-33. Obtaining tickets across a forest trust.![]() Creating a Forest TrustBy default, only a member of the Enterprise Admins group or a member of the forest root domain Domain Admins group can create a two-way forest trust. Members of the Incoming Forest Trust Builders group can create one-way incoming forest trusts. The right to create a forest trust can be delegated. To create the forest trust from one location, you must also have like credentials for the other forest.Forest trust creation consists of three steps:
Prepare the ForestTwo steps are necessary: providing name resolution via DNS and changing functional level to or verifying that functional level is Windows Server 2003. A third step, removing external trusts between the forests, may be necessary.If name resolution is not working, the trust relationship will fail. There are several alternatives for ensuring name resolution between forests. Only one of them needs to be done.Make one root DNS server authoritative for both forest DNS namespaces. (The root zone contains delegation for each of the DNS namespaces and updated root hints of all DNS servers with the root DNS server.) Zone delegation can be verified using nslookup.If both forest root DNS servers are running Server 2003, configure conditional forwarders in each namespace to route queries for names in the other namespace.Configure secondary zones in each DNS namespace to route queries for names in the other namespace.If both forests are not at Windows Server 2003 functional level, the trust will fail.If an external trust exists between domains in the two forests, the forest trust cannot be completed. Before starting the New Trust Wizard, remove any external trusts that may prevent it from completing. (External trusts with domains in forests other than the two forests between which a forest trust will be completed are okay.)Create the TrustTo create a forest trust follow these steps:
Grant Permissions to Resources in Trusting ForestsGranting access to resources across forests is similar to granting access across domains. The trust must be in place, and if selective authentication is chosen, the Allowed to Authenticate permission must be granted to the groups of users that should have this permission. If users are granted access to resources before the Allowed to Authenticate permission is granted to them, the users will still not be able to access the resources.To grant the Allowed to Authenticate permission, add the group to the security property page of the domain controller and then select the Allowed to Authentication permission, as shown in Figure 8-37. The property page of the domain controller can be accessed from the Domain Controller OU. To grant the permissions, use the Security tab of the resource and then the object picker to select the group. When you open the object picker, be sure to select the location. In the Locations box, the trusted forest will be shown at the same level as the entire local directory, as shown in Figure 8-38. You must select it and click OK to be able to search for groups to include. On computers that are not Windows XP SP2 or Windows Server 2003, you cannot browse user and group names to select and then assign access. Instead, you must enter User Principal Names (UPN, or user@domainname format) or Windows NT 4.0-style names (domainname\username). In addition, users wanting to use workstations in the trusting forest to log on to domains in the trusted forest (where their accounts are) must use the UPN or Windows NT 4.0 format. They will not be able to select the domain names from a drop-down list in the logon screen.Figure 8-37. Grant user groups permission to authenticate to domains in the trusting forest.![]() Figure 8-38. Selecting the location of groups across aforest trust.![]() Protecting Forests in a Cross-Forest Trust from an Elevation of Privileges AttackUnless selective authentication is chosen during trust creation, it is possible for users to authenticate to their home domain across forest boundaries, and it may be possible for them to access resources in the trusting forest without having an account in any domain in that forest and before resources have been explicitly configured to allow their access. This is because the group Everyone is assigned access to some resources and because anonymous access may be available on one or more computers in the trusting forest. In other words, the security boundary of a forest is pierced when a forest trust relationship is created and the possibility of successful elevation of privilege attacks is increased. Three mechanisms exist that can help mitigate this effect:Piercing Security BoundariesThe Ultimate Forest Design Issue" and in the document "Planning and Implementing Federated Forests in Windows Server 2003," available at http://www.microsoft.com/technet/treeview/default.asp?url=/technet/prodtechnol/windowsserver2003/maintain/security/fedffin2.asp. |