RE: [ActiveDir] tokenGroups field

2006-05-27 Thread Dmitri Gavrilov
TokenGroups does talk to a GC, if the current DC is not a GC itself. Basically, that's the reason we disallow one-level and subtree searches hitting tokenGroups (so that we don't overload the DC -- it is an expensive call). You will get different results depending on which DC you are connected to,

RE: [ActiveDir] How To Determine What GC a Server is Using?

2006-05-27 Thread Dmitri Gavrilov
Title: How To Determine What GC a Server is Using? If you run nltest /server:targetServer /dsgetdc:forestDnsName /gc Then you get an answer which should be fairly precise. From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Blair, James Sent: Thursday, May 25, 2006 5:51

RE: [ActiveDir] How To Determine What GC a Server is Using?

2006-05-28 Thread Dmitri Gavrilov
Exchange for its list of GCs. From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Dmitri Gavrilov Sent: Saturday, May 27, 2006 10:24 AM To: ActiveDir@mail.activedir.org Subject: RE: [ActiveDir] How To Determine What GC a Server is Using? If you run nltest

RE: [ActiveDir] Deny permissions in AD

2006-06-26 Thread Dmitri Gavrilov
The cleanest way is not to deny permissions but to revoke permissions. In other words, you should remove ACEs that are granting access that you dont need. From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Joshua Coffman Sent: Monday, June 26, 2006 11:22 AM To:

RE: [ActiveDir] ldp in ADAM-SP1

2006-07-24 Thread Dmitri Gavrilov
Re Access System Security checkbox. We removed it from the latest versions of ldp.exe because it does not do what you want. Even if you grant this right to some principal, he will still be unable to read or tweak the SACLs. The only way to be able to do this is to grant SE_ACCESS_SYSTEM_SECURITY

RE: [ActiveDir] ldp in ADAM-SP1

2006-07-27 Thread Dmitri Gavrilov
Guido, which changes to you want to see in dsacls in B3? -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Grillenmeier, Guido Sent: Tuesday, July 25, 2006 6:22 AM To: ActiveDir@mail.activedir.org Subject: RE: [ActiveDir] ldp in ADAM-SP1 well, for Win2000

RE: [ActiveDir] Read-Only Domain Controller and Server Core

2006-07-28 Thread Dmitri Gavrilov
The set of passwords that *can* be sent down to the RODC is controlled by password replication policy. The passwords are sent down by RODCs request, but the hub also checks whether the user (whose pwd is being requested) actually attempted to authenticate at RODC (the hub can induce this

RE: [ActiveDir] ldp in ADAM-SP1

2006-07-28 Thread Dmitri Gavrilov
, it is incapable of doing so for well-known-security-principals such as Authenticated Users or built-in ones such as Administrators. Would be lovely to see these changes in B3 ;-) /Guido -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Dmitri Gavrilov Sent

RE: [ActiveDir] memberOf and member link breaking

2006-08-11 Thread Dmitri Gavrilov
Such links are removed by the phantom cleanup task, which is run by the infrastructure master in the domain where your group lives. Make sure IM is placed on a non-GC machine (it cant run otherwise). IM is set up to do a cleanup run once every 12 hours, iirc. You can trigger it manually

RE: [ActiveDir] [OT] mSDS-Approx-Immed-Subordinates - How does it work?

2006-09-26 Thread Dmitri Gavrilov
Brett, correct me please. Apparently, the estimate is performed by looking at the couple top levels of the B-tree representing one of the indexes that span all records. Ive been told by Jet guys that these estimates are correct within two orders of magnitude. On the bright side, they are

RE: [ActiveDir] ADAM with Domain

2006-09-29 Thread Dmitri Gavrilov
Something else that you can do to connect the two is to set up (perhaps mutual) external crossrefs. Then, they would appear as a contiguous LDAP space, and will issue referrals to each other as needed. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Joe

RE: [ActiveDir] ADAM on XP Pro

2006-10-04 Thread Dmitri Gavrilov
ADAM on XP is no different from ADAM on w2k3 security-wise. The big differences are that it is throttled somewhat perf-wise, and also there's no auditing. I do not see any serious security problems with this approach. Unless you are thinking that somebody steals the laptop, cracks the DIT open

RE: [ActiveDir] Using an LDIF to set ACLs

2006-10-06 Thread Dmitri Gavrilov
Yeah, Joes correct, dsacls or scripting is your best bet. SDDL+encoding is also possible, but it would replace the whole SD value, which is rarely what you really want. Usually you just need to add or remove an ACE, right? This would require reading the old value, which is not possible

RE: [ActiveDir] OT: A short and sweet KB

2006-10-10 Thread Dmitri Gavrilov
Do you mind writing a KB with the following content: Whatever you are trying to do is not supported. It would be a great KB to refer folks to. I really need it quite often. I would memorize the KB number. Hell, I would include it into my signature. From: [EMAIL PROTECTED]

RE: [ActiveDir] ADAM-ADSIEDIT and adam-user-based administration.. (ADAM SP1)

2006-10-24 Thread Dmitri Gavrilov
Until Longhorn, ADAM-ADSIEdit will not support simple binds, sorry. LDP is your only option. Second -- you cannot protect *anything* on a joined machine from an AD admin. If you don't trust them, leave the domain. That's the only way. For example, a builtin admin on the machine can bind to ADAM

RE: [ActiveDir] AD/AM replica instances and ADAM user-based admin..

2006-10-24 Thread Dmitri Gavrilov
You can only promote a replica using windows creds. There's no point it trying to lock ADAM out of windows users. See my other post. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of F. Javier Jarava Sent: Tuesday, October 24, 2006 11:30 AM To:

RE: [ActiveDir] ADAM silent install

2006-11-23 Thread Dmitri Gavrilov
Since the current user is not an ADAM admin, he is not able to import LDIF files (since ldifde is launched in current users context). To get around the problem, you must specify SourceUsername and SourcePassword parameters in the unattend file. Another option is to import the LDIFs manually or

RE: [ActiveDir] OT: Vista Stuck on Completing Upgrade

2006-12-01 Thread Dmitri Gavrilov
Something installed on your XP machine is confusing setup/upgrade. Get a hold of the logs, you can do this after reboot, or perhaps even during setup (IIRC Shift-F10 still works). Look for setupact.log and perhaps something called migration log. There are a couple of folders setup creates in the

RE: [ActiveDir] AD Schema - adding an attribute

2007-01-09 Thread Dmitri Gavrilov
Third, consider privacy. All data in AD is readable by default (unless you mark the attribute as confidential). Would you want everybody to know everybody else's age? -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Brian Desmond Sent: Tuesday, January

RE: [ActiveDir] Who Am I request

2007-01-22 Thread Dmitri Gavrilov
ADAM (starting from ADAM 1.0) and AD (starting from Longhorn) support WhoAmI extended operation per RFC. In addition, they support rootDSE/tokenGroups attribute, which is exactly what you need to check self group membership. If you have pre-LH AD, then what you can do is read tokenGroups off the