共用方式為


Appendix B: How the Authentication Process Works with RODCs

Applies To: Windows Server 2008

The information in this topic has been updated and republished as part of Planning and Deploying Read-Only Domain Controllers (https://go.microsoft.com/fwlink/?LinkID=120840). For the most up-to-date information about how the authentication process works on a read-only domain controller (RODC), see How the authentication process works on an RODC.