IT tutorials
 
Applications Server
 

Microsoft Exchange Server 2013 : Role assignment (part 1) - Using role assignment policy to limit access

3/21/2014 9:38:35 PM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

To summarize, you have defined scopes to say which objects a role can access and update, a role to say which cmdlets and parameters are made available to the holders of the role, and role groups to help manage who can do what. Role assignments provide what Microsoft refers to as the glue for RBAC in that they link roles and their scope to users or groups. To see the complete set of role assignments in the organization, type:

Get-ManagementRoleAssignment

Exchange 2013 includes some hundreds of role assignments ordered by assignee name. All the roles assigned to the Organization Management role group are found together, as are all the roles assigned to the other role groups such as Hygiene Management, Discovery Management, Move Mailboxes, and so on. Because it is the most powerful and functional role group, Organization Management has the most role assignments. Toward the bottom of the list, you’ll find the roles assigned to the default role assignment, which is what Exchange assigns automatically to every user when the user’s mailbox is created. These assignments include MyBaseOptions and MyContactInformation, which are the assignments necessary to enable a user to edit her own personal information through Outlook Web App options. Custom role assignments are found at the end of the list.

Role assignments are named using a convention of Role-Role Group, which results in names such as Message Tracking-Records Management and Transport Queues-Organization Management. Assume that the Help Desk Level 2 role group you created earlier includes seven roles, so you would then expect to see these represented by seven role assignments when you run Get-ManagementRoleAssignment, which is exactly what happens:

Get-ManagementRoleAssignment –RoleAssignee 'Help Desk Level 2'
Name                                               Role
------- ----
Distribution Groups-Help Desk Level 2 Distribution Groups
Mail Recipient Creation-Help Desk Level 2 Mail Recipient Creation
Mail Recipients-Help Desk Level 2 Mail Recipients
Message Tracking-Help Desk Level 2 Message Tracking
Move Mailboxes-Help Desk Level 2 Move Mailboxes
Recipient Policies-Help Desk Level 2 Recipient Policies
Mailbox Import Export-Help Desk Level 2 Mailbox Import Export

To examine a specific role assignment, pass the name of the assignment to the Get-ManagementRoleAssignment cmdlet:

Get-ManagementRoleAssignment –Identity 'Mail Recipient Creation-Help Desk Level 2' | Format-List

RBAC does not function in the same way as regular security permissions, by which the operating system normally applies the most restrictive permission to secure access to an object. Instead, RBAC operates on the principle that it provides users with the combination of all the roles that have been assigned to them. This enables them to accomplish any of the tasks covered by those roles. Consider when you make an account a domain administrator. Immediately, the account gains a great deal of power within the domain, and there is a huge difference between the capabilities of that account and those of another standard user account. Now consider what happens when you add an account to a role group. It gains the ability to run any of the cmdlets covered by the role. Gradually, as you add the account to other role groups, it gains access to more cmdlets until you arrive at the Organization Management level, which is an accumulation of nearly every role available to Exchange. You begin to realize how roles build on roles to create a highly customizable framework to enable all kinds of users to do their work. Unity through role accumulation delivers a more granular security assignment mechanism than any of the previous Exchange ACL-based authorization schemes, even if there is no explicit deny mechanism that positively blocks someone from doing something.

Inside Out Controlling role assignments

Each role assigned to a user provides cmdlets and parameters the user is authorized to run. The total set of roles a user holds creates the complete set of cmdlets and parameters the user can run. Because users gain the ability to run an increasing set of cmdlets through role assignment, you should assign only the precise roles to users that you want them to have. Otherwise, you run the risk of users gaining the ability to run a cmdlet or use a parameter because they are assigned a role that they don’t really need. You can tailor the roles by adding or removing cmdlets. You can also tailor a role group by removing or adding a role assignment to reduce or increase the functionality available to the members of the role group.

1. Using role assignment policy to limit access

Role assignments can limit access down to the parameter level for a cmdlet. Exchange uses this capability to restrict users to writing to specific data items within a larger set. For example, the default role assignment policy enables users to update their contact details but not their display name through the Options section of Outlook Web App. You can interrogate Exchange to discover the role assignments that underpin this capability by looking for the assignments that control users’ ability to use the Set-User cmdlet to update their mobile phone number (one of the data items permitted by the default role assignment policy) as follows:

Get-ManagementRole -Cmdlet Set-User –CmdletParameters MobilePhone| Get-ManagementRoleAssignment
-GetEffectiveUsers -Delegating $False | Where-Object {$_.Effectiveusername -ne "All Group Members"}
| Format-Table Role, RoleAssigneeName, EffectiveUserName

This code does the following:

  • Looks for all roles that permit access to the MobilePhone property through Set-User.

  • Pipes the roles to Get-ManagementRoleAssignment to return a list of users who have been delegated access through a role assignment. (If the –Delegating parameter is set to $True, you will see a list of users who can delegate access to others.)

  • Filters the list to remove All Group Members because you want to see only individual users.

  • Outputs the role, assignee name, and username.

Here is the output:

Role                   RoleAssigneeName                  EffectiveUserName
---- ---------------- -----------------
Mail Recipients Organization Management Administrator
Mail Recipients Organization Management Halstead, Dean
Mail Recipients Help Desk Level 2 Support Ruth, Andy
Mail Recipients EMEA Help Desk Pelton, David
Mail Recipients EMEA Help Desk Smith, John
Mail Recipients APJ Help Desk Akers, Kim
User Options Organization Management Administrator
User Options Organization Management Redmond, Tony
MyContactInformation Default Role Assignment Policy All Policy Assignees

Caution

RBAC currently allows restrictions to be placed on cmdlets that write data (cmdlets beginning with New- and Set-). It does not support restrictions on the Get- cmdlets that allow users to retrieve the properties of an object. This means that restricted users can read all the data for an object even though they might not be able to update some or even all the attributes.

Inside Out Controlling access to Remove-Mailbox

Some organizations do not like the fact that Exchange administrators can remove a mailbox and the underlying Active Directory account by using the Delete Mailbox option in EAC or by running the Remove-Mailbox cmdlet in EMS. The same argument can be advanced for the Remove-MailContact cmdlet, but most of the focus is on the ability to remove a user account from Active Directory. Exchange doesn’t allow you to remove role entries from its built-in roles, so you can’t remove the Remove-Mailbox entry to solve the problem. Instead, you have to make sure that no one except organization administrators has access to the Mail Recipient Creation role because it is the only role that includes access to Remove-Mailbox. (You can verify this fact by running the Get-ManagementRole –Cmdlet ‘Remove-Mailbox’ command.) You can use the following code to check who has received delegated access to the Mail Recipient Creation role and then remove it, but make sure that you absolutely want to take this course of action before running the command:

Get-ManagementRoleAssignment -Role "Mail Recipient Creation" –Delegating $False | Remove-ManagementRoleAssignment
 
Others
 
- Microsoft Exchange Server 2013 : Role group management
- Configuring Active Directory Server Roles : Administering Active Directory - Creating OUs
- Configuring Active Directory Server Roles : Administering Active Directory - Planning the OU Structure (part 2) - Delegating Administrative Control
- Configuring Active Directory Server Roles : Administering Active Directory - Planning the OU Structure (part 1) - Logical Grouping of Resources
- Configuring Active Directory Server Roles : Administering Active Directory - An Overview of OUs
- Configuring Active Directory Server Roles : Active Directory Rights Management Services
- Microsoft Lync Server 2013 : Mediation Server Troubleshooting (part 2) - Synthetic Transactions, Telnet
- Microsoft Lync Server 2013 : Mediation Server Troubleshooting (part 1)
- Microsoft Lync Server 2013 : Mediation Server Administration
- Microsoft Lync Server 2013 : Mediation Server Configuration
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us