Was this page helpful?
Additional feedback?
1500 characters remaining
Export (0) Print
Expand All

Appendix B: How the Authentication Process Works with RODCs

Updated: May 1, 2009

Applies To: Windows Server 2008

The information in this topic has been updated and republished as part of Planning and Deploying Read-Only Domain Controllers (http://go.microsoft.com/fwlink/?LinkID=120840). For the most up-to-date information about how the authentication process works on a read-only domain controller (RODC), see How the authentication process works on an RODC.

Was this page helpful?
(1500 characters remaining)
Thank you for your feedback

Community Additions

© 2015 Microsoft