Users requesting directory data from AD LDS instances must be authenticated before they can receive access. In general, these users run a directory-enabled application that makes an LDAP request to AD LDS. AD LDS must successfully authenticate users to the directory, which is a process also known as _____________

a. Attaching
b. Binding
c. Controlling
d. None of the above.


B. Users can bind to the AD LDS instance through a user account that resides directly in AD LDS (an AD LDS security principal), through a local or domain user account, or through an AD LDS proxy object.

Computer Science & Information Technology

You might also like to view...

When Excel is installed, the default chart type for a PowerPoint slide is a(n) ____ chart.

A. 3-D Exploded Pie B. Clustered Bar C. X-Y Scatter D. Clustered Column

Computer Science & Information Technology

Can you think of techniques other than chaining to handle bucket overflow in external hashing?

What will be an ideal response?

Computer Science & Information Technology

How does DHCP integrate with DNS?

What will be an ideal response?

Computer Science & Information Technology

In a relational database model, the range of allowable values for a data attribute is called its _____.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology