Although it is not allowed (why?) there are two possibilities here as I can
see...
(1) On the UNIX zone MYCO.US.PARENT.COM delegate the underscore domains
beneath to the AD/DNS servers as seperate zones. You'll need to do the same
for the AD/DNS servers. This is needed so that the UNIX servers as the
AD/DNS servers can find the underscore DNS domains. (not that beautifull but
it works) You could also remove the MYCO.US.PARENT.COM zone on the AD/DNS
servers and leave the underscore DNS domains as zones. Caveat here (of the
latter issue) is you must also change the IP address of DNS servers on all
servers/clients that should be queried to the IP address of the UNIX
servers. Not recommended because these are overseas
(2) On the UNIX servers remove the zone MYCO.US.PARENT.COM and delegate it
to the AD/DNS servers (I would prefer this one)

Hope this helps for you
Cheers,
Jorge

-----Original Message-----
From: [EMAIL PROTECTED]
To: [email protected]
Cc: [EMAIL PROTECTED]
Sent: 3/6/2005 6:52 PM
Subject: [ActiveDir] Traveling Users Unable to Authenticate to AD

Statement of Problem:
 
Laptop users from MYCO (on Active Directory) traveling to OTHERCO (on
Novell NDS but not AD) are unable to authenticate to MYCO.US.PARENT.COM
Active Directory.
 
Required Result:
 
To enable laptop users from MYCO traveling to OTHERCO to authenticate to
MYCO.US.PARENT.COM Active Directory, get their mapped drives, access to
file shares, etc. over the WAN.
 
Background Information:
 
Overseas parent company does not allow delegation/forwarding from/to
their UNIX BIND 9.2 DNS servers to W2k3 Active Directory DNS;
 
Parent company (not on Active Directory) is authoritative for DNS root
zone: PARENT.COM. Neither name server records nor SOA records are
allowed to be populated in any of the parent company-hosted DNS zones;
 
Parent company is also authoritative 1st level DNS zone: US.PARENT.COM
(this zone is hosted overseas);
 
Our company's dual-authoritative AD-integrated and UNIX DNS zone:
MYCO.US.PARENT.COM (from parent company perspective the UNIX servers are
authoritative, from our company's internal client/server systems W2k3
DNS is authoritative);
 
The W2k3 Active Directory DNS servers conditionally forward queries for
PARENT.COM and all child domains of PARENT.COM other than
MYCO.US.PARENT.COM to MYCO's UNIX BIND DNS servers. This has worked
fine.
 
Affiliated, WAN-connected US company with Novell DNS zone
OTHERCO.US.PARENT.COM (unable to conditionally forward and not in budget
to perform necessary upgrade to OS to enable this feature);
 
Within a year, both the parent company and otherco will be migrated to a
globally-unified Active Directory implementation in a completely
different namespace so that this will cease to be a problem. But we
cannot let the problem persist for a year.
 
Discussion:
 
I believe the reason that laptop users from MYCO traveling to OTHERCO
are unable to authenticate to MYCO.US.PARENT.COM Active Directory is
that the OTHERCO DNS server sends packets to the US.PARENT.COM zone
which looks to the UNIX BIND servers of MYCO.US.PARENT.COM for
resolution�the UNIX BIND servers have the "A" records for the W2k3 DC
DNS servers don't have the SRV and LDAP records necessary to enable
authentication to the MYCO DC's running DNS.
 
Without spending a lot of $$ and without having to deploy an additional
MYCO DC/DNS server at otherco, we need a temporary workaround so that
the traveling users can authenticate.
 


This e-mail and any attachment is for authorised use by the intended 
recipient(s) only. It may contain proprietary material, confidential 
information and/or be subject to legal privilege. It should not be copied, 
disclosed to, retained or used by, any other party. If you are not an intended 
recipient then please promptly delete this e-mail and any attachment and all 
copies and inform the sender. Thank you.
List info   : http://www.activedir.org/List.aspx
List FAQ    : http://www.activedir.org/ListFAQ.aspx
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/

Reply via email to