Setup:
There is a central AD domain (CENTRAL) and several separate forests, each of which has its own domain (BRANCH1, BRANCH2, BRANCH3)
There are two ways of trusting between CENTRAL and all other domains.
The application I'm working on runs in the CENTRAL domain and searches for LDAP in all domains using the CENTRAL \ ldapreader credentials.
This works fine for CENTRAL and BRANCH1, but BRANCH2 and BRANCH3 fail to connect with an invalid credential error. If instead the search uses an account in these domains (BRANCH2 \ ldapreader, etc.), the search works fine.
What permission level is required to read AD as an LDAP server? All I found indicates that it is allowed for AUTENTICATED USERS, which should work fine with CENTRAL \ ldapreader due to two-way trust, but this is not the behavior that we get.
active-directory ldap
Drstalker
source share