473,418 Members | 2,344 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,418 software developers and data experts.

Help Adding Trusted Domain user to Trusting Domain Group

We gave created a web application that uses AD for authorization and
authentication. The application can be used by domain users as well as the
general public. What we currently have is 2 domains - Domain A is the
corporate domain and Domain B is the application domain. Domain B trusts
Domain A.

What we want to do for general public users is to create users in Domain B
(the application) and add them to a group in Domain B. For the corporate
users, we want to add the user account from Domain A (corporate) to the
appropriate Group in Domain B (application). We know that the servers are
setup correctly because we can add users from Domain A (corporate) to a group
in Domain B (application) through the AD management tools.

We are using VB.Net and I know that I need to use DirectoryServices but I
don't really know where to start (As you can probably guess I am not all that
familiar with Active Directory).

What I envision is the following
1. Search for the user object in Domain A
2. Add the found user object from Domain A to the group on Domain B

Any help would be greatly appreciated.

Thanks.
Nov 22 '05 #1
0 1920

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

1
by: Vicky | last post by:
I am trying to connect to a sql server database from enterprise manager. I am using sql server authentication and have set the SQL Server up to accept mixed mode authentication. I am still get the...
0
by: RobinB | last post by:
We gave created a web application that uses AD for authorization and authentication. The application can be used by domain users as well as the general public. What we currently have is 2 domains...
1
by: poi | last post by:
I have a Win2K and Win2K web servers with Local Groups that contain domain users and domain groups from a foreign trusted domain. In the web config for the application, the web.config has this: ...
7
by: Ray Valenti | last post by:
I am able to preview this data in the development environment, but when I run the application the error below shows up. How do I set up a Trusted Connection? -Ray Server Error in...
2
by: Paul M | last post by:
Hi folks, Just want to make sure I've got this right. I've got an application I want to authenticate to the domain i.e. an intranet app. I've set this up (all the web.config items are in...
7
by: Reza | last post by:
Hello The project was working, where I had a domain user registered in the database as a user, and I used that user to connect the datebase. Everything was fine and it was working, then when I...
5
by: Rocky | last post by:
Hi, I have a webform, with 2 textboxs and a submit button. In the text box1, i enter a username and in textbox2 I enter the computer name. Both the username and computer name is in active...
2
by: Kam | last post by:
I am using SQL Server 2000 Analysis services and Office Web Components to display the information. when the user first time access the web site, he/she did to add it into the trusted site list,...
3
by: sunbeam | last post by:
Short Description of the Project: we developed a e-learning system for our students. each student has a unique username/password to view the modules he/she should view and nothing more. since we...
3
by: Kevinp | last post by:
I'm trying to get my program to connect to a SQL Server 2005 database over the internet. The remote computer is on another network and it's connected to our network through Windows VPN. I'm running...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.