Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Contact
  • Reviews
  • Toggle search form
Home » Windows Server » How to create a two-way Active Directory Trust

How to create a two-way Active Directory Trust

Posted on 30/12/202530/12/2025 Link State By Link State No Comments on How to create a two-way Active Directory Trust
create a two-way Active Directory Trust

In this guide, we shall discuss how to create a two-way Active Directory Trust. A two-way trust will be created between these domains. This means that the two domains will be able to share their resources with each other. Please, see [AZURE] MSSQL Creating a new Azure SQL Database (PaaS), [AZURE] Restore MSSQL Server on Azure Virtual Machines Using Azure Backup, and MSSQL Server Error 833: A Synthesis of Real-World Case Studies.

Active Directory Trust Port Prerequisites

Network connectivity must be ensured between the domain controllers of all involved domains. In addition, servers and other resources in the Resource domain must be able to communicate with the domain controllers in the Accounts domain.

DNS name resolution must be configured so that domain controllers in each domain can resolve DNS records for the other domain’s Active Directory environment.

  • An account that is a member of the Domain Admins group is required in each domain to create and complete a two-way trust.
  • Alternatively, an account that is a member of Enterprise Admins (if the domains are in the same forest) has the necessary privileges across all domains in the forest.
  • If the domains belong to different forests, credentials with Domain Admin privileges are still required in both forests to create and confirm the trust on each side.
image003

Relevant operational notes:

  • A two-way trust requires the creation and confirmation of the trust on both domains.
  • Standard user accounts (Domain Users) are not sufficient.
  • Custom delegation is theoretically possible. But not recommended and is rarely used in production environments due to increased complexity and operational risk.

In conclusion, the minimum and recommended requirement is Domain Admin privileges on both domains (or Enterprise Admin where applicable).

image002
Contoso.localfabrikam.local
Nome server ADfab-dc01 – fab-dc02fab-dc01 – fab-dc02
Nome NetBIOS AD SERVERcontosofabrikam
IP Address10.0.0.1 – 10.0.0.210.223.10.14 – 10.223.10.15
O.S.Windows Server 2019Windows Server 2019
Server DNScont-dc01 – cont-dc02fab-dc01 – fab-dc02
IP DNS10.223.0.1 – 10.223.0.210.223.10.14 – 10.223.10.15

To begin, we should configure the DNS to allow each respective domain to resolve the other.

Please, see Pull and Push Commvault Images to Azure Container Registry, [AZURE] Security Service Edge (SSE) and Microsoft Entra ID, and how to Install SQL Server Always On & Configure Veeam Plug‑in for SQL.

Create DNS Conditional forwarders

To do this, we need to create a conditional forwarding server so that contoso.local can resolve dogcorp.local and vice versa. Now we will configure fabrikam.local.

Create DNS Conditional forwarder on contoso.local Domain

image005

Verify DNS connectivity

image007-min

Check dns resolution

image008-min

Perform the same configuration on the fabrikam.local domain by creating the DNS conditional forwarder for the contoso.local domain.

Please, see “The security database on the server does not have a computer account for this workstation trust relation [Part 1]“, Active Directory Forest – Trees and Domain and Sites, and “There was an error opening the Trusted Platform Module snap-in: You do not have permission to open the Trusted Platform Module Console“.

Two-Way trust creation

Please, follow the steps below to create a two way trust.

image010-min

Select “Forest trust”

image012-min

Please, select “Two-way”

image013-min

Here, select “Both this domain and the specified domain”

image014-min

Use a dedicated domain account for both forests

image016-min

Select “Forest-wide authentication”

image018-min

Trust selections complete

image022-min
image023-min
This domain: contoso.local 
Specified domain: fabikam.local
Direction:
Two-way: Users in the local domain can authenticate in the specified domain and users in the specified domain can authenticate in the local domain.
Trust type: Forest trust
Transitive: Yes
Outgoing trust authentication level: Forest-wide authentication in local and specified forests.
Sides of trust: Create the trust for both this domain and the specified domain.

If the trust wizard fails, the DNS conditional forwarder for the source domain (contosol.local) has probably not been created in the target domain (fabrikam.local)

image024-min

Once the wizard has been successfully completed, you can perform a check.

Validate Domains trusted by this domain (Outgoing trusts)

Click to validate

image028-min

Click Yes

image026-min

Validate Domains trusted by this domain (Incoming trusts)

image030-min

Validate

image032-min

Click on Yes to proceed

image034-min

Recap trust

image035-min

Please, see “Enter connection information for your on-premise directory or forests: Azure AD connect unable to connect directory, forest not available, and how to Specify user account name when adding a DC to an existing Forest“.

Trust verification via ADUC from both forests

Change domain

image037-min

Selecet contoso.local

image039-min

If you can access the forest browser, the trust is working correctly.

image041-min

I hope you found this guide on how to create a two-way Active Directory Trust very useful. Please, feel free to leave a comment below.

5/5 - (2 votes)

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
Windows Server Tags:Active Directory, Active Directory Domain Services, Active Directory Trust, Two-way Active Directory Trust

Post navigation

Previous Post: How to create a new Azure SQL Database [PaaS]
Next Post: Upgrade PowerShell Core Windows or Mac and Linux System

Related Posts

  • update
    Client Visibility Issues: Fix WSUS Clients appear then disappear in the console Windows Server
  • How to determine Active Directory Site Name
    How to determine Active Directory Site Name Network | Monitoring
  • VMware workstation networking issues
    Network cable Unplugged: Fix VMware “Warning – Multiple default gateways are intended to provide redundancy to a single network Virtualization
  • FileZilla
    Access FTP Server from your browser: How to create a shortcut and access Filezilla from Windows Explorer Windows Server
  • schedulepythontasksinWindows
    Run Python Script via Windows Task Scheduler Windows
  • appp
    How to automatically reopen Windows Apps and Folders upon Startup Windows

More Related Articles

update Client Visibility Issues: Fix WSUS Clients appear then disappear in the console Windows Server
How to determine Active Directory Site Name How to determine Active Directory Site Name Network | Monitoring
VMware workstation networking issues Network cable Unplugged: Fix VMware “Warning – Multiple default gateways are intended to provide redundancy to a single network Virtualization
FileZilla Access FTP Server from your browser: How to create a shortcut and access Filezilla from Windows Explorer Windows Server
schedulepythontasksinWindows Run Python Script via Windows Task Scheduler Windows
appp How to automatically reopen Windows Apps and Folders upon Startup Windows

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

Veeam Vanguard

  • integrate VHR with VBR
    How to deploy and integrate VHR with VBR Backup
  • TERRAFORM ON LINUX FEATURE IMAGE
    How to Install Terraform on Linux Linux
  • drivelock 1280x720 1
    Concept of DriveLock with a focus on Encryption Security | Vulnerability Scans and Assessment
  • Screenshot 2024 02 29 at 8.03.48 PM
    How to create an Elastic Beanstalk environment in AWS AWS/Azure/OpenShift
  • fhgj
    Resolve DISM unspecified error when removing preinstalled packages(Error code 15601) Windows Server
  • File Audit
    File Audit: How to install and configure PA File Sight Ultra and PA Endpoints Reviews
  • Configure AD LDAPs
    Generate a self-signed SSL certificate: Enable LDAP over SSL Windows Server
  • etcconf
    How to configure user resource limits and restrictions in Linux Linux

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,823 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.