Hi All,
I have an Active Directory question for you (let me know if there is a better Forum for this question). This may be somewhat long so bear with me. I am the director of IT in an originally small company (one root domain xxx.com, one office) with all servers (development, production, and corporate) under that root domain. We have grown substantially in the past 2 years. We now have 3 remote offices and our Production systems have been moved to a SaS 70 Co-location. I have in the past year created several child domains under our root domain for separation of services and environments (i.e. root = xxx.com, child1 = development.xxx.com, and child2 = production.xxx.com). All employees have corporate ID’s in the corporate root domain (xxx.com). Anyone needing to access to child domains need to have accounts in those child domains (except for admins, they can use their xxx.com ID’s to access anything they need to). We have primary and backup domain controllers in each remote office for each root and child domains.
Recently the CTO is on a “Single Sign on” kick. Meaning he would like employees to be able to access all domains with their corporate ID’s seemingly by passing the security boarders of the domains. I realize we can do this, but is it the right thing to do? He fails to see the security that the child domains create. What can I tell him? Does anyone know of, or have a similar setup or been in a similar situation?
Thanks for you input!
I have an Active Directory question for you (let me know if there is a better Forum for this question). This may be somewhat long so bear with me. I am the director of IT in an originally small company (one root domain xxx.com, one office) with all servers (development, production, and corporate) under that root domain. We have grown substantially in the past 2 years. We now have 3 remote offices and our Production systems have been moved to a SaS 70 Co-location. I have in the past year created several child domains under our root domain for separation of services and environments (i.e. root = xxx.com, child1 = development.xxx.com, and child2 = production.xxx.com). All employees have corporate ID’s in the corporate root domain (xxx.com). Anyone needing to access to child domains need to have accounts in those child domains (except for admins, they can use their xxx.com ID’s to access anything they need to). We have primary and backup domain controllers in each remote office for each root and child domains.
Recently the CTO is on a “Single Sign on” kick. Meaning he would like employees to be able to access all domains with their corporate ID’s seemingly by passing the security boarders of the domains. I realize we can do this, but is it the right thing to do? He fails to see the security that the child domains create. What can I tell him? Does anyone know of, or have a similar setup or been in a similar situation?
Thanks for you input!