Udostępnij za pośrednictwem


Create a Two-Way, Forest Trust for One Side of the Trust

Applies To: Windows Server 2008, Windows Server 2008 R2

You can use this procedure to create one side of a two-way, forest trust. Although one side of a trust will be created successfully, the new trust will not function until the administrator for the reciprocal forest uses his or her credentials to create the incoming side of the trust. If you have administrative credentials for both forests that are involved in the trust, you can use the procedure Create a Two-Way, Forest Trust for Both Sides of the Trust to create both sides of the trust in one simultaneous operation.

A two-way, forest trust allows users in your forest (the forest that you are logged on to at the time that you run the New Trust Wizard) and users in the reciprocal forest to access resources in any of the domains in either of the two forests.

You can create this forest trust by using the New Trust Wizard in the Active Directory Domains and Trusts snap-in.

Membership in Domain Admins in the forest root domain or Enterprise Admins in Active Directory Domain Services (AD DS), or equivalent, is the minimum required to complete this procedure. Review details about using the appropriate accounts and group memberships at Local and Domain Default Groups (https://go.microsoft.com/fwlink/?LinkId=83477). If you are a member of the Incoming Forest Trust Builders group, you can create one-way, incoming, forest trusts to your forest. For more information about the Incoming Forest Trust Builders group, see How Domain and Forest Trusts Work (https://go.microsoft.com/fwlink/?LinkID=111481).

To create a two-way, forest trust for one side of the trust

  1. Open Active Directory Domains and Trusts.

  2. In the console tree, right-click the forest root domain of the forest for which you want to establish a two-way forest trust, and then click Properties.

  3. On the Trusts tab, click New Trust, and then click Next.

  4. On the Trust Name page, type the Domain Name System (DNS) name of the domain, and then click Next.

  5. On the Trust Type page, click Forest trust, and then click Next.

  6. On the Direction of Trust page, click Two-way, and then click Next.

    For more information about the selections that are available on the Direction of Trust page, see "Direction of Trust" in Appendix: New Trust Wizard Pages.

  7. On the Sides of Trust page, click This domain only, and then click Next.

    For more information about the selections that are available on the Sides of Trust page, see "Sides of Trust" in Appendix: New Trust Wizard Pages.

  8. On the Outgoing Trust Authentication Level page, do one of the following, and then click Next:

    • Click Forest-wide authentication.

    • Click Selective authentication.

  9. On the Trust Password page, type the trust password twice, and then click Next.

  10. On the Trust Selections Complete page, review the results, and then click Next.

  11. On the Trust Creation Complete page, review the results, and then click Next.

  12. On the Confirm Outgoing Trust page, do one of the following:

    • If you do not want to confirm this trust, click No, do not confirm the outgoing trust. Note that if you do not confirm the trust at this stage, the secure channel will not be established until the first time the trust is used by users.

    • If you want to confirm this trust, click Yes, confirm the outgoing trust, and then supply the appropriate administrative credentials from the specified domain.

  13. On the Confirm Incoming Trust page, do one of the following:

    • If you do not want to confirm this trust, click No, do not confirm the incoming trust.

    • If you want to confirm this trust, click Yes, confirm the incoming trust, and then supply the appropriate administrative credentials from the specified domain.

  14. On the Completing the New Trust Wizard page, click Finish.

Note

For this trust to function, the forest administrator in the specified forest must follow this same procedure, using his or her administrative credentials and the exact same trust password that was used during this procedure.