|
Use a logon script. Nothing you do can prevent all mechanisms that could be used to use the ID (i.e. runas or look-a-likes, net use /user, etc) and the fact that you are targeting one single ID says to me logon script for that one ID. Have it look for something on the machine or the machine name itself and if it doesn't find it, it immediately logs back off. I actually wrote a Quick Logoff tool back in like 2001 (called qlogoff) that is specifically for getting people logged off of a machine quickly if they shouldn't be there. I used it for logon scripts used by domain admin IDs, anytime they tried to log onto workstations interactively they got booted right back off. Obviously it could be overridden since they were DAs but it served as a gentle reminder of proper use of the ID. I wanted to expand it to trying to interactively log onto any machine that wasn't a DC. If I ran an environment in the future with the RODCs and had delegated the ability to administrate one of the RODCs to a local admin I certainly would make sure domain admins couldn't log into those machines interactively. I would prevent the attempt even but no way to do that without dorking with the GINA and if someone really wants to mess you up, they have already replaced the GINA. So anyway, the tool determines the OS type, if it is NT based it will gracefully exit with a EQX_LOGOFF|EQX_FORCE so there is no monkeying around and if it is Win9x it will be less nice and find the main explorer instance and kill it hanging the workstation. If there is interest in that, I could be convinced to post it up on the website.
joe From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of David Aragon Sent: Thursday, November 03, 2005 6:10 PM To: [email protected] Subject: RE: [ActiveDir] Limiting User Logon to Specific Machines Thank you for the suggestions.
We had originally considered a GPO (and ultimately may
have to go back that direction) but had dismissed the idea due (in large part)
to the socio-political structure we have (who would have believed a university
could be so political, I know I didn't). Each OU represents a separate
college or major organization which enjoys a kind of autonomy. They
manage the GPO's and computer activities within their OU, users are
centrally managed. In order to implement a GPO that might affect an OU, we
end up needing to get their permission (odd, I know, but it was a compromise
worked out over several years worth of negotiations (which, by the
way, are still on going) with the different colleges, unions, and
organizations involved in an effort to unify services and provide platform
independent IdM (Identity Management) and single sign-on for the staff,
faculty, and students across the campus). I was hoping for something less
invasive, which is why I had tried the "Log On To" method.
Come to think of it, I need to check when they (and who
"they" are that) added politician to my job description, but that's a different
issue for another time.
Thank you again for the suggestions, they are
appreciated.
David Aragon
|
- RE: [ActiveDir] Limiting User Logon to Specific Machines joe
- RE: [ActiveDir] Limiting User Logon to Specific Machin... David Aragon
- RE: [ActiveDir] Limiting User Logon to Specific Machin... Steve Rochford
- RE: [ActiveDir] Limiting User Logon to Specific Machin... Steve Rochford
