o in addition to the stagged delete process as described below, I'd like
to be able to force the full deletion of objects before the tombstone
lifetime has expired.

o better handling of cross-domain links during restore operations - goes
along with the stagged delete approach: allow linked attributes to
remain in tombstone and maybe just add more logic to change their
visibility (maybe similar to the ABSENT link, e.g. when a member is
truly removed from a group)

o a true role based security model for permissions in AD - get rid of
ACLs alltogether

o if ACLs remain (which I'm afraid they will for a while), take the time
to re-work the default permissions - they're defintely way too open. I
might need default rights for Auth. Users to read GPO objects, but they
shouldn't just have read on basically everything.  Definitely limit the
rights for SELF on any object => it should be an administrative decision
to grant any write permissions, I'm not sure why any really need to
exist by default (other than PW change)

o make it easier to hide data in AD (shouldn't first need to change the
dsheuristics property) - naturally this would be much easier, if the
default rights weren't so awful

o I second joe's gripe on property sets (and basically all other gripes
as well...) - add the capability to add attribs to multiple property
sets

o need ability to truly control replication, e.g. disabling inbound
replication should actually do what it says, and not allow to be
overruled by forcing replication

o capability to disable groups (and I don't mean to change them to
non-security DLs...) 

so much for now

/Guido

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of joe
Sent: Mittwoch, 3. August 2005 02:18
To: [email protected]
Subject: RE: [ActiveDir] Biggest AD Gripes

This topic is going well, I will add some more now

o Backlinks capability on ACLs in the directory, so you can ask a user
object, which objects do you have access rights on. I realize this a
monster
of a problem with group nesting, primary groups, etc.

o The fact that primary groups are not in the memberOf listing and that
member on a group doesn't show primary members. I know why this was
done,
but the reason is gone now...

o Change tracking is a bit more painful than it needs to be. Would like
a
simple change log capability that could be subscribed to (platform
agnostic)
but that has good detail (what specifically changed, maybe even who made
the
change). Admins can configure the delegation on this and only this (i.e.
it
isn't tied to something else too). 

o Simple mechanism to find all group memberships across the forest,
preferably LDAP based that any platform can use (i.e. not a special RPC
or
NET type function). Basically add a special constructed attribute on
user
object like forestGroupMemberships which returns everything, nested,
primary, cross domain, etc.

o A new group that is a cross between universal groups and domain local
groups - call them a universal domain local group. Anyone can be put in
them, they can be applied to a resource anywhere, but they aren't in the
global catalog. Membership is maintained on the user object somehow
through
a phantom like mechanism. If a user in domainB is added to group in
domainA,
a phantom is added to domainB for the group and that membership is
reflected
on the user and when the user authenticates, they get the SID in the
token.
Gets around the whole pita with GCs everywhere.

o Ability to turn off legacy support, like say sAMAccountNames. If I
don't
want it, it doesn't even create the attribute. We have stepped in that
direction with K3 making it so SAM Names aren't required but it does so
by
randomly generating a name.

o Staged delete process. This was discussed recently with some other AD
Gurus I work with, the idea was put forth and I really liked it and
added to
it. Basically when you delete an object, all attributes are maintained
for
x1 days. At the end of x1 days, some portion of the attributes are
stripped
and it is maintained that way for x2 days (probably the same stripping
that
occurs now). At the end of x2 days everything is stripped from the
object
except name, sam name (maybe), sid, and guid which are kept forever
unless
that is even configured to be purged out. This means with x1 days you
could
easily do a full recover, in the x2 days you could do a partial recovery
fairly easily, after x2 days you could still get the SID and GUID back.
This
actually could be implemented in a product outside of AD if you didn't
mind
really deleting objects but instead sticking them in a special hidden
OU. If
someone wanted to write a piece to insert into the LDAP API processing
code
and intercept deletes then even that limitation could be removed because
you
would change a delete to a move. I wouldn't recommend this mechanism as
it
would make MS very itchy but it is a mechanism that could probably be
made
to work. If someone builds this, I wouldn't mind royalties thanks...

o Ability to query an object to determine what constructed attributes
are
available to be requested for the object or at least which ones the user
querying has access to so as not to give away info insecurely.

o An end to the back end hardcoding that directly overrules schema rules
like description being single values on sam objects or samaccountname
lengths, etc. A tool should be able to read the schema and get the real
life
actual implemented rules so that it doesn't try to use them then hit a
special hard coded rule such that programmers have to write special code
around specific attributes.

o Better schema descriptions of attributes so that for instance a GUID
can
easily be ascertained from a normal binary attribute without taking a
guess
that a certain size binary value is *probably* a GUID.

o I mentioned this one last MVP summit but.... Ability to upgrade AD
outside
of OS. This is obviously dependent on whether or not AD is taking
advantage
of some new function of the OS such as special disk I/O calls or
something.
But I would love to say have all DCs on K3 but be able to rev AD from
Version 5.2 to Version 6.0. That way if I want to go to Longhorn AD
native
mode, I can actually shoot out the AD piece quickly to all DCs and get
there
and slowly come through upgrading the OS as possible.

o I dislike the schema default SD, would rather have everything be
initially
inherited ACEs which can more easily be overridden. Give us a lockdown
pack
that is supported by MS even if running Exchange or any other MS apps. 

o I would like it if AD started ignoring any addresses that are flooding
it
with bad authentication attempts. The thresholds would be configurable
by
admin.

o I would like global catalogs to register site AND domain specific
records.
I.E. A GC for domainA would register a GC record that is in domainA
zone.
This way if an app wants a GC that is a DC for domainA it can easily
find
it. Think Exchange though there are other apps that would use it.

o I seriously dislike userAccountControl and userParameters. Break the
function of these up into separate attribs that are simple clear unicode
text or boolean values.

o Wild card "exists" searches on linked attributes should use the
implicit
linked attribute indexes. They partially fixed this in K3 where now at
least
the index is used for normal searches, but how about for the EXISTS case
like member=*. That falls back to the DNT_index or whatever other index
could be used from the query.

o Index objectClass already.

o I would like a rootdse constructed attribute that I could query to get
which sites a DC covers. Again, think platform agnostic.

o Would like to be able to send a normal simple tcp LDAP query to get a
response back in a standard format like the info returned from a UDP
LDAP
ping. Hard to do a UDP LDAP Ping from a script. 

o I like the AD/AM tokenGroups rootdse attribute, would like that in AD.



There are more, I will let these sit out there for a while...

Keep the ideas coming everyone. 

   joe



-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of joe
Sent: Tuesday, August 02, 2005 12:25 PM
To: [email protected]
Subject: [ActiveDir] Biggest AD Gripes

So what are everyone's biggest AD Gripes? I am not talking about gripes
about things that use AD like GPOs[1] or Exchange or NFS or anything
else
like that. I mean actual AD really missed the boat because of this that
or
the other thing.

Like 

o I dislike that when you defunct an attribute it doesn't purge the
information in the directory for that attribute.

o The fact that AD Security policy is managed through a technology
dependent
on AD and replicates both within AD and the other technology.
 
o I dislike that there is no true schema delete.

o I dislike the fact that I can't specify which branches of the tree
replicate where.

o I dislike the fact that GUIDs are represented in multiple ways in the
directory.

o I dislike the implementation of property sets especially since they
could
be so incredible awesomely cool. Specifically I dislike that an
attribute
can only be in a single property set. 

o I dislike creator/owner on SDs.

o I dislike the lack of configurable business rules.

o I dislike the fact that I can't run multiple domains on a single
domain
controller. 



Etc etc. I have more but lets see what others say. Everyone pipe up.
Let's
pretend that MS will actually see this, let's further say let's pretend
MS
AD Developers will see this. What would you tell them if you were
sitting in
the room with them?



   joe





[1] I do not consider GPOs to be part of AD. They are a technology that
leverages AD.

List info   : http://www.activedir.org/List.aspx
List FAQ    : http://www.activedir.org/ListFAQ.aspx
List archive:
http://www.mail-archive.com/activedir%40mail.activedir.org/

List info   : http://www.activedir.org/List.aspx
List FAQ    : http://www.activedir.org/ListFAQ.aspx
List archive:
http://www.mail-archive.com/activedir%40mail.activedir.org/
List info   : http://www.activedir.org/List.aspx
List FAQ    : http://www.activedir.org/ListFAQ.aspx
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/

Reply via email to