Appendix B: How the Authentication Process Works with RODCs
Updated: May 1, 2009
Applies To: Windows Server 2008
The information in this topic has been updated and republished as part of Planning and Deploying Read-Only Domain Controllers (http://go.microsoft.com/fwlink/?LinkID=120840). For the most up-to-date information about how the authentication process works on a read-only domain controller (RODC), see How the authentication process works on an RODC.