That's a good explanation. I don't see how you can lock them out
programmatically though. The mechanism just isn't designed to do that.
You'd have to force bad auth attempts on them constantly.
If you can't disable the AD account, what if you expired it? That would
prevent login too, right? You could just set the expiration date back to an
unexpired value when you need to.
Just a thought...
Joe K.
----- Original Message -----
From: David Aragon
To: [email protected]
Sent: Monday, August 21, 2006 3:14 PM
Subject: RE: [ActiveDir] UAC Question
I think I need to expand the picture here to provide more clarity. At the
top of our tree we have openLDAP which we refer to as the Enterprise and
which is the authoritative source for all credentials. That feeds several
sub-systems, including Active Directory, email, SMB, etc. We have
internally developed connectors to provide each sub-system the appropriate
user information including passwords (when required by that sub-system).
This has afforded us a working single-sign on for multiple platforms
(Windows, MAC, & Linux). Users can go to any computer, any platform, and
their credentials are valid (though there might be local restrictions).
Users go to a single point to change their password and that change is then
appropriately encrypted and transmitted to each sub-system in a form that is
best for that sub-system. This all works quite well, however, because of
this we can not change the user's password in AD without causing a break
between the Enterprise and AD user objects. Forcing a change in the
password of a user object at the Enterprise level would cut the user off
from their email, personal network shares, etc.
A couple of years ago the telephony group paid a LOT of money for this
software (let me repeat here that I was not involved until recently). A few
months after the purchase, the company was bought by a larger company who
apparently didn't bother keeping any of the original developers,
programmers, etc. though they continue to "support" the software. We have
been told on numerous occasions, however, that because we have an
unconventional setup, we are virtually on our own and no one wants to cough
up another big chunk of money to replace the software. The software
requires a voice mailbox be tied to an active Directory user account, but
once created, the only check that is made is if the AD user account is
enabled or disabled.
I recently complained that we were leaving a possible security hole by not
doing something with these accounts and, as typically happens, I was tasked
with coming up with an appropriate solution. At the time, it seemed the
easiest path to follow would be to set the account lockout which would
prevent the user from logging into the vast majority of systems, but still
allow them the ability to get their email (from off campus), vm (from off
campus or on campus), etc. This is still the path I'm pursuing.
David Aragon
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Grillenmeier, Guido
Sent: Monday, August 21, 2006 10:53 AM
To: [email protected]
Subject: RE: [ActiveDir] UAC Question
Adding a dummy workstation will hinder the user to logon interactively -
this could be all you want to achieve. But it won't hinder network logons -
this may be undesired.
Another thought - if the users aren't really using their AD account, couldn't
you just change the PW to some complex dummy pwd? This would ensure that the
user wouldn't be able to use the account for any AD authentication - until
they come back from their sabbatical and the helpdesk resets the pwd for
them.
Also, I'd check with the application vendor, if you can't configure it to
use an attribute other than the disabled flag to see if the account should
be voicemail enabled or not. This would give you much more granular control
over the matter - you could disable the AD account (which it seems is really
what you want to do) while still leaving the voicemail intact.
/Guido
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Al Mulnick
Sent: Monday, August 21, 2006 6:57 PM
To: [email protected]
Subject: Re: [ActiveDir] UAC Question
Why are the last two groups treated differently than the others?
You may want to consider a different approach, such as changing to the
workstations that they can logon to or expiring the account.
On 8/21/06, David Aragon <[EMAIL PROTECTED]> wrote:
Al,
Thank you for your response, I will try to elaborate, but first, let me
start by saying that I was not invited to participate in this application's
selection, testing, or acceptance. One day it just showed up.
That said ...
The software we use for VOIP uses its own db for storing messages. It was
supposed to be AD aware. It's not. It is (barely) LDAP aware. I've found
that when a user checks their voice mail (after they enter in their pass
code) the program only checks to see if their AD account is enabled or
disabled.
We do have a password policy that does exactly what you describe (locks
users out for some period of time after x invalid attempts). We have also
given the senior Help Desk staff the ability to unlock an account under
certain circumstances.
We have some (a couple hundred) accounts that exist to handle the section or
group vm for those areas where individuals that share a phone number.
These, I have identified and developed methods that prevent them from being
used as login accounts. I have also found that there are users that do not
have a computer and never use a computer, but they have vm enabled on their
phone. We also have users that take sabbaticals for 6 months to a year. It
is these last two groups I was hoping to address with setting the UAC
account lockout. Politically I can not disable the accounts. I have tried
to add the accounts to the permanent lockout list which works, but when the
last groups returns it takes time for us to remove them from the list.
Again politically unacceptable.
This makes us having the ability to set the account lockout very appealing.
What I was looking for was a way to set the lockout bit. It was previously
explained that the bit can not be set directly, but that by setting the
lockoutTime to some non-zero value the account is locked (though I've found
that the bit is not always set). My current research and testing is moving
along that path.
David Aragon
From: [EMAIL PROTECTED] [mailto:
[EMAIL PROTECTED] On Behalf Of Al Mulnick
Sent: Monday, August 21, 2006 6:33 AM
To: [email protected]
Subject: Re: [ActiveDir] UAC Question
This part troubles me:
"(for example it will prevent a user from logging
into a system, but not prevent them from getting their voicemail)."
Can you expand on that? To my thinking, if the account is locked out, then
the user should not be able to use it. Period. End of story. No exceptions.
Locked out functionality is there as a precaution to prevent misuse of the
identity (ok, account.) Why would you want to subvert that? What benefit
that cannot be achieved in another manner?
Again, to my way of thinking, there is no reason you would ever want to mess
with it in your day to day. A better option would be to set it to
automatically clear after a certain period which would prevent hackers,
crackers, and script kiddies (side note: set it to something that would
cause a cracker to take longer to realistically crack than the password
change cycle) from obtaining the passwords of the accounts. For example,
.5 hours lockout after x number of attempts means that for every x number of
attempts, anyone trying to programmatically trying to guess passwords would
have to pause for .5 hours before resumption. If you have hundreds of
thousands of possible passwords and combinations, that can make the time to
crack longer than the password change interval if you design it that way.
My initial take on this is that you're trying to do something and that
there's a better/more supported way to accomplish it.
Am I missing something?
On 8/2/06, David Aragon <[EMAIL PROTECTED] > wrote:
http://support.microsoft.com/kb/305144/ discusses the various property flags
for the UserAccountControl (UAC). I have tried to set different flags using
LDP, ADSIEdit, and vbScript. One flag in particular is giving me a lot of
grief, LOCKOUT. I can clear the bit, but can not set it. This is useful to
set for a number of reasons (for example it will prevent a user from logging
into a system, but not prevent them from getting their voicemail).
Is this normal? Can it be set and if so, how? Is it dependent on other
settings (ex. lockoutTime) to be set to remain set?
David Aragon
List info : http://www.activedir.org/List.aspx
List FAQ : http://www.activedir.org/ListFAQ.aspx
List archive: http://www.activedir.org/ml/threads.aspx
List info : http://www.activedir.org/List.aspx
List FAQ : http://www.activedir.org/ListFAQ.aspx
List archive: http://www.activedir.org/ml/threads.aspx