Hello, Joe.  Good to hear from you.  Sorry I missed DEC this year.

1) !!RLBAdminTest                 04/19/2006-12:22:27 LOCKED   VIEW_ONLY
--------------------------------------------------------
2) C:\Temp>dsacls
CN=!!rlbadmintest,OU=AdministrativeAccounts,OU=Collins,DC=ccanet,DC=rockwell
collins,DC=com
Access list:
{This object is protected from inheriting permissions from the parent}
Effective Permissions on this object are:
Allow BUILTIN\Administrators                      SPECIAL ACCESS
                                                  DELETE
                                                  READ PERMISSONS
                                                  WRITE PERMISSIONS
                                                  CHANGE OWNERSHIP
                                                  CREATE CHILD
                                                  DELETE CHILD
                                                  LIST CONTENTS
                                                  WRITE SELF
                                                  WRITE PROPERTY
                                                  READ PROPERTY
                                                  LIST OBJECT
                                                  CONTROL ACCESS
Allow NT AUTHORITY\Authenticated Users            SPECIAL ACCESS
                                                  READ PERMISSONS
                                                  LIST CONTENTS
                                                  READ PROPERTY
                                                  LIST OBJECT
Allow CCANET\Domain Admins                        SPECIAL ACCESS
                                                  READ PERMISSONS
                                                  WRITE PERMISSIONS
                                                  CHANGE OWNERSHIP
                                                  CREATE CHILD
                                                  DELETE CHILD
                                                  LIST CONTENTS
                                                  WRITE SELF
                                                  WRITE PROPERTY
                                                  READ PROPERTY
                                                  LIST OBJECT
                                                  CONTROL ACCESS
Allow INTRANET\Enterprise Admins                  SPECIAL ACCESS
                                                  READ PERMISSONS
                                                  WRITE PERMISSIONS
                                                  CHANGE OWNERSHIP
                                                  CREATE CHILD
                                                  DELETE CHILD
                                                  LIST CONTENTS
                                                  WRITE SELF
                                                  WRITE PROPERTY
                                                  READ PROPERTY
                                                  LIST OBJECT
                                                  CONTROL ACCESS
Allow CCANET\Exchange Enterprise Servers          SPECIAL ACCESS
                                                  LIST CONTENTS
Allow CCANET\Exchange Enterprise Servers          SPECIAL ACCESS
                                                  READ PERMISSONS
                                                  CREATE CHILD
                                                  DELETE CHILD
                                                  LIST CONTENTS
                                                  WRITE SELF
                                                  WRITE PROPERTY
                                                  READ PROPERTY
Allow BUILTIN\Pre-Windows 2000 Compatible Access  SPECIAL ACCESS
                                                  READ PERMISSONS
                                                  LIST CONTENTS
                                                  READ PROPERTY
                                                  LIST OBJECT
Allow NT AUTHORITY\SYSTEM                         FULL CONTROL
Allow INTRANET\TempCcanetDomainAdminsPool         SPECIAL ACCESS
                                                  READ PERMISSONS
                                                  CREATE CHILD
                                                  DELETE CHILD
                                                  LIST CONTENTS
                                                  WRITE SELF
                                                  WRITE PROPERTY
                                                  READ PROPERTY
Allow CCANET\Cert Publishers                      SPECIAL ACCESS for
userCertificate
                                                  WRITE PROPERTY
                                                  READ PROPERTY
Allow CCANET\Exchange Enterprise Servers          SPECIAL ACCESS for
displayName
                                                  WRITE PROPERTY
Allow CCANET\Exchange Enterprise Servers          SPECIAL ACCESS for
groupType
                                                  WRITE PROPERTY
Allow CCANET\Exchange Enterprise Servers          SPECIAL ACCESS for
Personal Information
                                                  WRITE PROPERTY
Allow CCANET\Exchange Enterprise Servers          SPECIAL ACCESS for Public
Information
                                                  WRITE PROPERTY
Allow BUILTIN\Windows Authorization Access Group  SPECIAL ACCESS for
tokenGroupsGlobalAndUniversal
                                                  READ PROPERTY
Allow Everyone                                    Change Password
Allow NT AUTHORITY\SELF                           Change Password

Permissions inherited to subobjects are:
Inherited to all subobjects
Allow CCANET\Exchange Enterprise Servers          SPECIAL ACCESS
                                                  LIST CONTENTS
Allow CCANET\Exchange Enterprise Servers          SPECIAL ACCESS for
displayName
                                                  WRITE PROPERTY
Allow CCANET\Exchange Enterprise Servers          SPECIAL ACCESS for
groupType
                                                  WRITE PROPERTY
Allow CCANET\Exchange Enterprise Servers          SPECIAL ACCESS for
Personal Information
                                                  WRITE PROPERTY
Allow CCANET\Exchange Enterprise Servers          SPECIAL ACCESS for Public
Information
                                                  WRITE PROPERTY

Inherited to group
Allow BUILTIN\Terminal Server License Servers     SPECIAL ACCESS for
Add/Remove self as member
                                                  WRITE PROPERTY
                                                  READ PROPERTY
Allow INTRANET\TempCcanetDomainAdminsPool         SPECIAL ACCESS for
Add/Remove self as member
                                                  WRITE SELF
Allow INTRANET\TempCcanetDomainAdminsPool         SPECIAL ACCESS
                                                  READ PERMISSONS
                                                  LIST CONTENTS
                                                  READ PROPERTY
Inherited to user
Allow CCANET\HelpDeskStaff-global                 SPECIAL ACCESS for
lockoutTime
                                                  WRITE PROPERTY
                                                  READ PROPERTY
Allow CCANET\Exchange Enterprise Servers          SPECIAL ACCESS
                                                  READ PERMISSONS
                                                  LIST CONTENTS
                                                  READ PROPERTY
                                                  LIST OBJECT
Inherited to group
Allow CCANET\Exchange Enterprise Servers          SPECIAL ACCESS
                                                  READ PERMISSONS
                                                  LIST CONTENTS
                                                  READ PROPERTY
                                                  LIST OBJECT
Inherited to user
Allow BUILTIN\Account Operators                   SPECIAL ACCESS for
lockoutTime
                                                  WRITE PROPERTY
                                                  READ PROPERTY
The command completed successfully
--------
net user !rlbtestadmin

User name                    !RLBTestAdmin
Global Group memberships     *SMS20HPD             *PrintServerAdmins    
                             *HelpDeskStaff-global *Domain Users         
The command completed successfully.
--------
c:\>whoami
CCANET\!RLBTestAdmin

C:\unlock . !!rlbadmintest

Unlock V02.01.00cpp Joe Richards ([EMAIL PROTECTED]) August 2004

Processed at crntdc04.ccanet.rockwellcollins.com
Default Naming Context: DC=ccanet,DC=rockwellcollins,DC=com

1: !!RLBAdminTest                 04/19/2006-12:22:27 LOCKED   UNLOCK_FAILED
(Insufficient Rights)
--------------------------------------------------------

I think that may leave 3)



Rick Bowersox

Principle Software Systems Engineer
Identity/Directory Services
EBusiness Security
Rockwell Collins
400 Collins Road, NE  MS 120-120
Cedar Rapids, IA  52498-0001
319.295.5095

 
"If life was fair, Elvis would be alive and all the impersonators would be
dead." 
________________________________________

Johnny Carson

 
 

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of joe
Sent: Thursday, April 20, 2006 7:47 AM
To: [email protected]
Subject: RE: [ActiveDir] Anomoly in application of Permissions by
adminSDHolder

The issue is one of three

1. The account isn't locked
2. The delegation really isn't applied properly
3. ADUC bug

Grab unlock.exe from my website (www.joeware.net) and it can help work out
if you the account is really locked and whether or not you delegation is
correct. Use the -view switch to verify an account is locked. Several
versions of ADUC showed this incorrectly (possibly it still does, it isn't
something I doublecheck as I don't really use ADUC to manage anything).  

If an account is definitely locked is the checkbox still greyed out? If so,
then can you unlock with unlock.exe? If not, dump the ACL with dsacls and
post the results.


--
O'Reilly Active Directory Third Edition -
http://www.joeware.net/win/ad3e.htm 
 

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Rick Bowersox
Sent: Thursday, April 20, 2006 7:54 AM
To: [email protected]
Subject: RE: [ActiveDir] Anomoly in application of Permissions by
adminSDHolder

Ulf:

My original post must not have been clear enough.  I HAVE delegated this on
the adminSDHolder container and it does get applied to the protected
accounts.  Unfortunately, even though the security setting on the account
then shows that the HELPDESK group has READ/WRITE ability on the lockoutTime
attribute, that option is grayed out in ADUC for them. 


Rick Bowersox

Principle Software Systems Engineer
Identity/Directory Services
EBusiness Security
Rockwell Collins
400 Collins Road, NE  MS 120-120
Cedar Rapids, IA  52498-0001
319.295.5095

 

"If life was fair, Elvis would be alive and all the impersonators would be
dead." 

_________________________________________


Johnny Carson
 
 
 

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Ulf B.
Simon-Weidner
Sent: Wednesday, April 19, 2006 4:33 PM
To: [email protected]
Subject: RE: [ActiveDir] Anomoly in application of Permissions by
adminSDHolder

Hi Richard,

You can change the settings by delegating write access to lockoutTime on the
adminSDHolder-Object in the system container. After doing that your helpdesk
will be able to unlock any administrative account anywhere in the domain.

For more information query my blog for adminSdHolder or use google, which
will bring it up as well.

Gruesse - Sincerely, 

Ulf B. Simon-Weidner 

  MVP-Book "Windows XP - Die Expertentipps": http://tinyurl.com/44zcz
  Weblog: http://msmvps.org/UlfBSimonWeidner
  Website: http://www.windowsserverfaq.org
  Profile:
http://mvp.support.microsoft.com/profile=35E388DE-4885-4308-B489-F2F1214C811
D   

 

|-----Original Message-----
|From: [EMAIL PROTECTED]
|[mailto:[EMAIL PROTECTED] On Behalf Of Richard 
|Bowersox
|Sent: Wednesday, April 19, 2006 10:09 PM
|To: [email protected]
|Subject: [ActiveDir] Anomoly in application of Permissions by 
|adminSDHolder
|
|I have noticed what appears to be an anomoly in the way that 
|adminSDHolder is applying object permissions and was wondering if 
|anybody else has seen something similar or has a workaround.
|
|We want our internal helpdesk staff to be able to unlock any users 
|account, even privliged accounts that are protected by adminSDHolder 
|'inheritance'.
|The HELPDESK group has been give Read/Write permissions on the 
|lockoutTime attribute for User Objects protected by adminSDHolder.  
|However, when members of HELPDESK go to unlock a locked account of this 
|type, the choice is grayed out.  (The same permissions given to the 
|same group for accounts not protected by adminSDHolder allow the 
|HELPDESK to unlock those accounts without any problem.)
|
|When I look at the permissions applied to the specific user object it 
|shows that the HELPDESK group has Read/Write on the lockoutTime 
|attribute as expected. The only way that members of the HELPDESK group 
|can gain access to the account lockout box is to set the security on a 
|specific account for the lockoutTime READ/WRITE permission to apply to 
|'This Object'
|rather than the "User Objects' choice.
|
|Unfortunately, when setting the security on the adminSDHolder 
|container, I cannot use the "This object and all child objects" choice 
|because when that is selected, the lockoutTime attribute is not an 
|available option.
|
|
|
|Rick Bowersox
|Rockwell Collins
|
|"If you cannot convince them, confuse them."
|------------------------------------------
|Harry S Truman
|
|
|List info   : http://www.activedir.org/List.aspx
|List FAQ    : http://www.activedir.org/ListFAQ.aspx
|List archive: 
|http://www.mail-archive.com/activedir%40mail.activedir.org/

List info   : http://www.activedir.org/List.aspx
List FAQ    : http://www.activedir.org/ListFAQ.aspx
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/

List info   : http://www.activedir.org/List.aspx
List FAQ    : http://www.activedir.org/ListFAQ.aspx
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/

List info   : http://www.activedir.org/List.aspx
List FAQ    : http://www.activedir.org/ListFAQ.aspx
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/

List info   : http://www.activedir.org/List.aspx
List FAQ    : http://www.activedir.org/ListFAQ.aspx
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/

Reply via email to