IT tutorials
 
Applications Server
 

Administering Active Directory Domain Services : Delegation and Security of Active Directory Objects (part 1)

12/3/2012 10:28:37 AM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
You learned how to create users, groups, computers, and OUs and how to access the properties of those objects. Your ability to perform those actions was dependent on your membership in the Administrators group of the domain. You would not want every user on your help desk team to be a member of the domain’s Administrators group just to reset user passwords and unlock user accounts. Instead, you should enable the help desk and each role in your organization to perform the tasks that are required of the role and no more. In this lesson, you learn how to delegate specific administrative tasks within Active Directory. This is achieved by changing the access control lists (ACLs) on Active Directory objects.

Understanding Delegation

In most organizations, there is more than one administrator, and as organizations grow, administrative tasks are often distributed to various administrators or support organizations. For example, in many organizations, the help desk can reset user passwords and unlock the accounts of users who are locked out. This capability of the help desk is a delegated administrative task.

The help desk cannot usually create new user accounts, but it can make specific changes to existing user accounts. The capability that is delegated is specific, or granular.

Continuing the example, in most organizations, the help desk’s ability to reset passwords would apply to normal user accounts, but not to accounts used for administration or to service accounts. The delegation is thus said to be scoped to standard user accounts.

All Active Directory objects, such as the users, computers, and groups that you created in the previous lesson, can be secured by using a list of permissions. So you could give your help desk permission to reset passwords on user objects. The permissions on an object are called access control entries (ACEs), and they are assigned to users, groups, or computers (called security principals). ACEs are saved in the object’s discretionary access control list (DACL). The DACL is a part of the object’s ACL, which also contains the system access control list (SACL) that includes auditing settings. This may sound familiar to you if you have studied the permissions on files and folders—the terms and concepts are identical.

The delegation of administrative control, also called the delegation of control, or just delegation, simply means assigning permissions that manage access to objects and properties in Active Directory. Just as you can give a group the ability to change files in a folder, you can give a group the ability to reset passwords on user objects.

Viewing the ACL of an Active Directory Object

At the lowest level is the ACL on an individual user object in Active Directory.

To view the ACL on an object:

  1. Open the Active Directory Users And Computers snap-in.

  2. On the View menu, select the Advanced Features option.

  3. Right-click an object and choose Properties.

  4. Click the Security tab.

    If Advanced Features is not enabled, you will not see the Security tab in an object’s Properties dialog box.

    The Security tab of the object’s Properties dialog box is shown in Figure 1.

    The Security tab of an Active Directory object’s Properties dialog box

    Figure 1. The Security tab of an Active Directory object’s Properties dialog box

  5. Click Advanced.

    The Security tab shows a very high-level overview of the security principals that have been given permissions to the object, but in the case of Active Directory ACLs, the Security tab is rarely detailed enough to provide the information you need to interpret or manage the ACL. You should always click Advanced to open the Advanced Security Settings dialog box.

    The Advanced Security Settings dialog box appears, shown in Figure 2.

    The Advanced Security Settings dialog box for an Active Directory object

    Figure 2. The Advanced Security Settings dialog box for an Active Directory object

    The Permissions page of the Advanced Security Settings dialog box shows the DACL of the object. You can see in Figure 2 that ACEs are summarized on a line of the Permission Entries list. In this dialog box, you are not seeing the granular ACEs of the DACL. For example, the permission entry that is selected in Figure 2 is actually comprised of two ACEs.

  6. To see the granular ACEs of a permission entry, select the entry and click Edit.

    The Permission Entry dialog box appears, detailing the specific ACEs that make up the entry, as shown in Figure 3.


The Permission Entry dialog box

Figure 3. The Permission Entry dialog box

Property Permissions, Control Access Rights, and Object Permissions

The DACL of an object allows you to assign permissions to specific properties of an object. As you saw in Figure 3, you can allow (or deny) permission to change phone and email options. This is, in fact, not just one property, but a property set that includes multiple specific properties. Property sets make it easier to manage permissions to commonly used collections of properties. But you could get even more granular and allow or deny permission to change just the mobile telephone number or just the home street address.

Permissions can also be assigned to manage control access rights, which are actions such as changing or resetting a password. The difference between those two control access rights is important to understand. If you have the right to change a password, you must know and enter the current password before making the change. If you have the right to reset a password, you are not required to know the previous password.

Finally, permissions can be assigned to objects. For example, the ability to change permissions on an object is controlled by the Allow::Modify Permissions ACE. Object permissions also control whether you are able to create child objects. For example, you might give your desktop support team permissions to create computer objects in the Client Computers OU. The Allow::Create Computer Objects ACE would be assigned to the desktop support team at the Client Computers OU.

The type and scope of permissions are managed using the Object tab and Properties tab, and the Apply To drop-down lists on each tab.

 
Others
 
- Microsoft Dynamics AX 2009 : Creating configuration documents using Word
- Microsoft Dynamics AX 2009 : Creating Word documents from templates
- SharePoint Applications Using Windows Azure : Create a Web Part That Uses the Windows Azure WCF Service
- SharePoint Applications Using Windows Azure : Create a WCF Service and Deploy It to Windows Azure
- Deploying Exchange Server 2010 : Integrating Exchange Server Roles with Active Directory
- Deploying Exchange Server 2010 : Exchange Server Messaging Roles
- SharePoint 2010: Performing Backups and Restores (part 3) - Example of Performing a SharePoint 2010 Farm Backup and Restore
- SharePoint 2010: Performing Backups and Restores (part 2) - Using STSADM
- SharePoint 2010: Performing Backups and Restores (part 1) - Using Windows PowerShell
- Microsoft Lync Server 2010 : Director Installation (part 2) - Install Server
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us