Nhập tên máy chủ và địa chỉ IPv6 như thể hiện trong hình 1-16. Đảm bảo rằng Tạo Associated Pointer (PTR) Ghi lại hộp kiểm tra là không được chọn. Lưu ý rằng bạn có thể tạo ra một bản ghi A AA cho máy chủ này mặc dù nó không hiện đang tồn tại trên mạng của bạn. | 152 Chapter 3 Planning Migrations Trusts and Interoperability Lesson 2 Planning for Interoperability As most people who have been in IT long enough to become enterprise administrators know few environments use products from a single vendor. Although products from a single vendor generally work well with each other it can be difficult to integrate information technology products from different companies. Part of an enterprise administrator s job is to make the user experience seamless. You need to ensure that a user who can access a set of shared files on one server when logged on to a computer running Windows Vista with his or her Active Directory user account can access exactly the same set of shared files when logged on to a UNIX-based computer with the same user account. In this lesson you will learn how you can use Windows Server 2008 to enable disparate technologies to interoperate. It is your job as enterprise administrator to plan things so that the workers in your environment need not be aware of the technical complexities of the solution only that they need to remember one username and password to access the resources they need irrespective of the method they use to access those resources. After this lesson you will be able to Determine the types of scenarios in which it is necessary to deploy AD FS. Understand the types of scenarios in which it is necessary to deploy Microsoft Identity Lifecycle Manager 2007 Feature Pack 1. Determine which interoperability technology to deploy for UNIX-based computers based on organizational needs. Estimated lesson time 40 minutes Planning AD FS AD FS enables a user from a partner organization to authenticate to multiple related Web applications from a single sign-on without requiring a forest trust. AD FS accomplishes this by securely sharing digital identity and entitlement rights across a set of preconfigured security boundaries. For example AD FS enables you to configure a Web application on your network to use a .