Users requesting directory data from AD LDS instances must be authenticated before they can receive access. In general, these users run a directory-enabled application that makes an LDAP request to AD LDS. AD LDS must successfully authenticate users to the directory, which is a process also known as _____________
a. Attaching
b. Binding
c. Controlling
d. None of the above.
B. Users can bind to the AD LDS instance through a user account that resides directly in AD LDS (an AD LDS security principal), through a local or domain user account, or through an AD LDS proxy object.
You might also like to view...
When Excel is installed, the default chart type for a PowerPoint slide is a(n) ____ chart.
A. 3-D Exploded Pie B. Clustered Bar C. X-Y Scatter D. Clustered Column
Can you think of techniques other than chaining to handle bucket overflow in external hashing?
What will be an ideal response?
How does DHCP integrate with DNS?
What will be an ideal response?
In a relational database model, the range of allowable values for a data attribute is called its _____.
Fill in the blank(s) with the appropriate word(s).