次の方法で共有


1.6 Applicability Statement

This protocol is applicable to the following two high-level scenarios:

  1. Remote management of trusted domains, account objects or secret objects, or other miscellaneous machine and domain policy settings controlled by the protocol.

  2. Retrieval of policy settings by clients.

To achieve the first scenario, this entire specification has to be implemented.

To achieve the second scenario, only RPC methods LsarOpenPolicy2 (section 3.1.4.4.1) or LsarOpenPolicy3, LsarOpenPolicy (section 3.1.4.4.2), LsarQueryInformationPolicy2 (section 3.1.4.4.3), LsarQueryInformationPolicy (section 3.1.4.4.4), and LsarClose (section 3.1.4.9.4) (and associated data structures specified in these method definitions) have to be implemented by a listener of this protocol.

Although significant protocol functionality is not dependent on server configuration, some functionality might depend on server configuration. Certain aspects of this protocol might depend on the server being a DC, including PDCs, BDCs, GC servers, and RODCs, or on being a non–DC, and also on the server reaching a certain forest functional level. These requirements are explained in their respective message processing sections.