Users requesting directory data from AD LDS instances must be authenticated before they can receive access. In general, these users run a directory-enabled application that makes an LDAP request to AD LDS. AD LDS must successfully authenticate users to the directory, which is a process also known as _____________
a. Attaching
b. Binding
c. Controlling
d. None of the above.
B. Users can bind to the AD LDS instance through a user account that resides directly in AD LDS (an AD LDS security principal), through a local or domain user account, or through an AD LDS proxy object.
Computer Science & Information Technology
You might also like to view...
You can move from one worksheet to another by clicking the
A) paste area. B) data bar. C) freeze panes. D) sheet tabs.
Computer Science & Information Technology
Use the Field Properties pane to create an index for ____.
A. a single field B. multiple fields C. a single query D. multiple data types
Computer Science & Information Technology