Skip to content
Tech Master Tech Master

OneStopTechnical Forum

  • Books
  • AI
  • Networking
  • Windows
  • Linux
  • Cloud
  • Mac
  • Active Directory
  • Azure
  • Cloud
  • Exchange
  • M365
  • Server 2025
  • Storage
  • Vsphere
  • Website
  • Database
  • Security
  • Knowledge Base
  • VPN
Tech Master
Tech Master

OneStopTechnical Forum

Active Directory (AD) Trusts are Relationships

blog.payperitem.com, April 29, 2025

1. Parent-Child Trust

  • Type: Transitive, Two-way, Automatic
  • When it is created: Automatically created when you add a child domain to a parent domain (e.g., creating a subdomain).
  • Behavior:
    • Users in the child domain can access resources in the parent domain and vice versa.
    • Trust is transitive: if Domain A trusts Domain B, and Domain B trusts Domain C, then Domain A trusts Domain C.

Example:
corp.com → child domain sales.corp.com


2. Tree-Root Trust

  • Type: Transitive, Two-way, Automatic
  • When it is created: Automatically created when you add a new tree to an existing forest.
  • Behavior:
    • Domains in different trees within the same forest trust each other automatically.
    • Helps in hierarchical and structured domain naming.

Example:
Tree 1: corp.com ↔ Tree 2: marketing.net (both in the same forest)


3. External Trust

  • Type: Non-transitive, One-way or Two-way, Manual
  • When it is created: Created manually when you need to trust a domain outside your forest (especially if that domain is from an older NT 4.0 domain or different forest without forest trust).
  • Behavior:
    • Non-transitive: Only the two domains trust each other; it doesn’t extend beyond them.
    • Useful for interoperability with legacy systems.

Example:
corp.com ↔ legacydomain.local (old Windows NT4 or standalone domain)


4. Forest Trust

  • Type: Transitive, One-way or Two-way, Manual
  • When it is created: Manually created between two forests (root domains).
  • Behavior:
    • Allows all domains in one forest to trust all domains in another forest.
    • Can be one-way (A trusts B) or two-way (both trust each other).
    • Requires both forests to be at Forest Functional Level 2003 or higher.

Example:
Forest A: corp.com ↔ Forest B: global.org


5. Realm Trust

  • Type: Transitive or Non-transitive, One-way or Two-way, Manual
  • When it is created: Created to establish a trust between an Active Directory domain and a non-Windows Kerberos realm (like a UNIX/Linux Kerberos v5 realm).
  • Behavior:
    • Can be either one-way or two-way.
    • Can be transitive or non-transitive depending on how it’s configured.
    • Helps integration between Windows and non-Windows environments.

Example:
AD Domain: corp.com ↔ Kerberos Realm: LINUX.REALM


6. Shortcut Trust

  • Type: Transitive, One-way or Two-way, Manual
  • When it is created: Manually created between domains in the same forest to speed up authentication.
  • Behavior:
    • Reduces authentication time when users in one domain need to access resources in another distant domain (in a deep or complex domain tree).
    • Helps avoid the default trust path and optimize performance.

Example:
Instead of: user.sales.corp.com → corp.com → accounting.corp.com,
you can create a shortcut directly between
sales.corp.com ↔ accounting.corp.com.


Quick Summary Table:

Trust TypeTransitiveDirectionCreated HowPurpose
Parent-ChildYesTwo-wayAutomaticChild domain trust
Tree-RootYesTwo-wayAutomaticTrust between trees in a forest
ExternalNoOne or Two-wayManualTrust external domains (legacy/single)
ForestYesOne or Two-wayManualTrust between different forests
RealmYes/NoOne or Two-wayManualTrust with non-Windows Kerberos systems
ShortcutYesOne or Two-wayManualOptimize trust paths inside a forest

Active Directory Server 2025

Post navigation

Previous post
Next post

Related Posts

Configure Radius Server

April 11, 2025April 11, 2025

Configuring a Windows RADIUS Server (typically via NPS – Network Policy Server) in a deep and secure way involves more than just installing the role and creating a basic policy. You’ll want to cover advanced aspects like: 🔧 1. NPS (RADIUS) Server Installation and Registration 🔐 2. Secure RADIUS with…

Read More

Implementing secure solutions using AWS Directory Services, Azure AD Connect, AWS SSO, and third-party integrations

April 16, 2025

✅ 1. AWS Directory Services Options: Best Practices: ✅ 2. Azure AD Connect (Hybrid Identity Sync) Purpose: Sync on-prem AD with Azure AD for SSO across Microsoft cloud services. Secure Implementation: Security Add-ons: ✅ 3. AWS SSO (IAM Identity Center) Purpose: Centralized user access to AWS accounts and third-party applications….

Read More

Docker containers in Server 2025: Windows vs. Hyper-V vs. WSL2

March 8, 2025

Windows Server 2025 offers several options for running Docker containers with Linux or Windows. Windows containers can be isolated in two ways, while Linux containers can optionally be run on WSL2. Server2025 also offers better backward compatibility than its predecessors. Conceptually, containers are a lightweight alternative to virtual machines because…

Read More

Recent Posts

  • List of AD Schema Versions
  • OldNewExplorer Free Download For Windows 11, 10, 8 and 7 [Latest Version]
  • How to Get the Classic (old) Context Menu on Windows 11
  • BitLocker Recovery Keys
  • Active Directory and Server hardening

Recent Comments

No comments to show.
June 2025
M T W T F S S
 1
2345678
9101112131415
16171819202122
23242526272829
30  
« May    
Log in
©2025 Tech Master | WordPress Theme by SuperbThemes
  • Login
  • Sign Up
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }