|
Per
delegation I do the following
AD
<-----------Root Identifier
+Delegation <Description = Del-ID (5 Char
Max)> Give FC to the Directory Administrators, Enterprise Admins,
and System; Read to the Data Administrators & Authenticated
Users.
+OU or CN = Users <Description =
Del_IDUsers> Give R/C/M to Full Data Admins, Jr Data Admins, and R/M to
Helpdesk. (Contains all Mail-Enabled Users in Delegation)
+OU or CN = Groups <Description =
Del_ID-Groups> Give R/C/M to Full Data Admins, Jr Data Admins, and R/M to
Helpdesk. (Contains all Org Level Global Groups in
delegation)
+OU or CN = Computers <Description =
Del_ID-Computers> Give R/C/M to Full Data Admins, Jr Data Admins, and R/M to
Helpdesk. (Contains all Workstations in delegation)
+OU = OPS <Description
= Del-ID-OPS> Give R/C to the Full Data Administrators. FC to
the Create Owner (Contains Custom OU's for the delegation)
+ OU or CN = Accounts <Description =
Del_ID-Accounts> Give R/C/M to Full Data Admins, R/C to Jr Data Admins, and R
to Helpdesk. (Contains Alt-Admin credentials)
+ OU or CN = Services <Description =
Del_ID-Services> Give R/C/M to Full Data Admins, R to Jr Data Admins and
to Helpdesk. (Contains Service Accounts)
+ OU or CN = Resources <Description =
Del_ID-Resources> Give R/C/M to Full Data Admins, R/C to Jr Data Admins
and R to Helpdesk. (Contains DLG for Each Share Resource {Each type of
Access})
+ OU or CN = DL = <Description
=Del_ID-DL> Give R/C/M to Full Data Admins, R/C to Jr Data Admins and R
to Helpdesk. (Contains Mail Enabled UG for each level of org in
del)
+ OU or CN = Contacts <Description
=Del_ID-Contacts> Give R/C/M to Full Data Admins, R/C to Jr Data Admins
and R to Helpdesk. (Contains Contacts for the Del)
+ OU or CN = Servers <Description
=Del_ID-Servers> Give R/C/M to Full Data Admins, R/C to Jr Data Admins
and R to Helpdesk. (Contains Servers for the Delegation)
+ OU or CN = SecGroup <Description
=Del_ID-SecGroup> Give R/G/M to Full Data Admins, R/C Jr Data Admins and
R to Helpdesk. (Contains GPO Filter Security Groups, and Special Security
Groups)
The
main driver for this tight model is for easier scriptable
delegations.
Principles of the design
=================
All
OU/CN is identified with a small 1 word identifier to facilitate
searches.
Each
objects Description field is filled out with the delegation ID a "-" and the CN
name to facilitate with proper identification from searches.
OU's
allow for additional OU's within the OU. CN's don't I believe by
default do.
Data
Administration is delegated as Full, Jr, and Helpdesk.
Full
DA's can create mail enabled DL UG only.
GPO
linking can be done on the Users/Computers/Accounts/Services/Servers containers
for easy troubleshooting and modeling of changes.
Full
DA's are the only ones who can modify GPO's. FDA and Jr. DA can Link
GPO's. Use Security Groups for GPO filtering.
Dir
Admins create GPO's and delegate them to the Data Admins.
All
accounts in the Users container are Mail Enabled.
All
accounts in the Accounts and Services are not mail enabled. (ME Service
accounts are normally a Directory Admin, Exchange Admin function in my
mind)
Groups
contains only GG and uses nesting to create organizational
groups.
Computers contains all workstations. Use GPO Security Groups for
filtering.
DL
contains mail enabled Organizational UG. Use nesting like in the Groups
container.
Resources contains a DLG for Each resource with specific permissions,
R/C/Deny. On the Network Share add each DLG for each Access type to the
Share and assign permissions. Administer the DLG for
Dir.
As you
can see I like to control were object creation happens, and also limit the
creation of additional OU's if possible to a specific location under
OPS.
The
reason is for Scriptability. If the name space Path is consistent, it is
easier to create additional delegations through scripts and ACL
them.
With a
good third-party tool, you can also do form validation, hide OU's from the Data
Admins to make the provisioning or resources more focused, and automate certain
Administration operations. Like Account Creation validation, transfers,
enforcing only certain types of object creation (Like no LG or UG
creation), mailbox creation, etc.
What
do you all think?
What
are the Principles of AD delegation!
What
are the Rules for Native Access Control
Delegation
What
are the Rules for Proxy Access Control Delegation
What
are the Rules for Native and Proxy Access Control
Delegation.
Toddler
|
Title: Message
- RE: [ActiveDir] Groups and OU's Myrick, Todd (NIH/CIT)
- RE: [ActiveDir] Groups and OU's Ellis, Debbie
- RE: [ActiveDir] Groups and OU's Jimmy Andersson
- RE: [ActiveDir] Groups and OU's Cary, Mark
- RE: [ActiveDir] Groups and OU's Roger Seielstad
- RE: [ActiveDir] Groups and OU's Myrick, Todd (NIH/CIT)
- RE: [ActiveDir] Groups and OU's James_Day
- [ActiveDir] Groups and OU's Ellis, Debbie
- RE: [ActiveDir] Groups and OU's Jimmy Andersson
- RE: [ActiveDir] Groups and OU's Ellis, Debbie
