With this one, it wouldn't. This is one of the most commonly requested things 
in AD history. No one needs to be reminded, it's all about schedule now.


-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Susan Bradley, 
CPA aka Ebitz - SBS Rocks [MVP]
Sent: Saturday, September 02, 2006 12:43 PM
To: ActiveDir@mail.activedir.org
Subject: Re: [ActiveDir] Seperate Administrator password policy

...you know a few Longhorn bugs filed on this might help

(hint hint)

Grillenmeier, Guido wrote:
>
> ;-) thanks for the feedback anyways Eric - it gives us an idea that we 
> shouldn't build our hopes too high for the multiple-password-policies 
> feature at this stage in the LH development phase. But I'll keep 
> hoping anyways.
>
> /Guido
>
> *From:* [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED] *On Behalf Of *Eric Fleischman
> *Sent:* Saturday, September 02, 2006 6:25 PM
> *To:* ActiveDir@mail.activedir.org
> *Subject:* RE: [ActiveDir] Seperate Administrator password policy
>
> Is this a serious question? I have no idea. If I knew, not only would 
> I do this, but I'd run out and buy a lotto ticket immediately. <g>
>
> This isn't about NDA or not. We can't see in to the future like this. 
> We do our best to build as much as we can. At some point, the gates 
> close. What makes it in is quazi-predictable, but not to the level 
> you're asking for.
>
> ~Eric
>
> ------------------------------------------------------------------------
>
> *From:* [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED] *On Behalf Of 
> *Grillenmeier, Guido
> *Sent:* Saturday, September 02, 2006 2:15 AM
> *To:* ActiveDir@mail.activedir.org
> *Subject:* RE: [ActiveDir] Seperate Administrator password policy
>
> Eric,
>
> can you already state publicly, what the chance of this feature is to 
> make it into Longhorn, if at all? Or is this still NDA?
>
> Thanks,
>
> Guido
>
> *From:* [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED] *On Behalf Of *Eric Fleischman
> *Sent:* Saturday, September 02, 2006 6:32 AM
> *To:* ActiveDir@mail.activedir.org
> *Subject:* RE: [ActiveDir] Seperate Administrator password policy
>
> A few comments, in no particular order...
>
> > I can visualize mechanisms to pull this off in the existing GPOs or 
> to do it outside of the GPOs
>
> Well sure...it doesn't take a visionary to see how this could be done. 
> ;) See LDAP policies for one such example (though by no means the only 
> choice...in fact, not how I would do it). I would point out that if you 
> pulled out password policy, it would make sense to pull out all policy 
> dependencies in AD itself so as to fully separate the 
> relationship...that is, AD and associated components (SAM, Kerberos, 
> etc.) do not depend on policy application for anything.
>
> > If you leave the world of the GPO I think you get more flexible as 
> you could then implement it in such a way that these password
>
> > policies could be applied to users within containers and even 
> specific individual users which would be great for say service IDs
>
> > or admin IDs
>
> Well, yea. I mean, this is the DCR that we've been asked for over and 
> over for like 5 years. While there are many ways to achieve it (group 
> memberships, direct links from the user & parent containers, etc.) the 
> net net is the same.
>
> > From the standpoint of speed/perf, I am not sure if it makes sense to 
> have an assemble the final policy on the fly mechanism here
>
> /<efleis snip of the rest of the paragraph, but I'm commenting on it all>/
>
> The reality is that I don't think most orgs will have thousands of 
> password policies, so the merging is likely not all that bad. And the 
> # of settings is low.
>
> That said, I'm still against this as it seems uber inconsistent to me 
> and very error prone.
>
> > Using groups could be troublesome, what is the override mechanism, 
> which group is more important if there are policies on 10
>
> > groups you are in?
>
> This is a trivially solvable problem, I'm not worried about this.
>
> On the larger point of the right way to skin this cat, I actually 
> disagree. I am for groups for the same reason I'm for them in the RODC 
> PRP scenario. Again, there are a great many orgs where you have OUs 
> separated by many things, say geographical location, and now want to 
> make an OU-separated set of lower-priv admins have some special 
> password policy (imagine the "regional admins" scenario for a customer 
> who has OUs separated by location). I really think the argument is 
> very much the same as RODC PRP use of groups...we don't want to push an 
> OU model here. I'm typically against building features in such a way 
> that they dictate a specific OU model to use them as that could fly 
> directly in the face of the logic you used for your existing OU model.
>
> > It confuses me somewhat why DCs insist on pulling this from DDP 
> instead of just assembling the policy, like any other, from all
>
> > applicable GPOs. I assume it was done to avoid a situation where two 
> DCs could have different policies applied to them and
>
> > depending on what DC handled your password change, you would be 
> subject to different rules.
>
> Yes, that's why. In fact, there were some way early win2k bugs that 
> yielded just this (like pre-SP1 if I remember right, or maybe even as 
> late as SP1, I'm not sure).
>
> > If that's the case, I can't say I'm a big fan of illogical hacks to 
> help out less-cluefull admins.
>
> I love this sentence. J
>
> ~E
>
> ------------------------------------------------------------------------
>
> *From:* [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED] *On Behalf Of *joe
> *Sent:* Friday, September 01, 2006 2:57 PM
> *To:* ActiveDir@mail.activedir.org
> *Subject:* RE: [ActiveDir] Seperate Administrator password policy
>
> I can visualize mechanisms to pull this off in the existing GPOs or to 
> do it outside of the GPOs. Having thought about this quite a bit in 
> the past, my personal preference would be to handle this outside of 
> the GPOs for several reasons. Some of the reasons off the top of my head:
>
> o I never really liked policy items that simply made changes in AD and 
> then the changes to the policy were simultaneously moving through AD 
> replication and GPO replication. It is illogical. Either prevent the 
> attributes from replicating in AD or don't replicate them through 
> group policy, pick one. Preferably, IMO, get them out of the group 
> policy and use a standard LDAP attribute on the required objects.
>
> o If you leave the world of the GPO I think you get more flexible as 
> you could then implement it in such a way that these password policies 
> could be applied to users within containers and even specific 
> individual users which would be great for say service IDs or admin IDs.
>
> o It removes you from the complexity and confusion between the member 
> password policies and domain password policies which even now is still 
> a huge topic for questions in the newsgroups and here.
>
> o You don't get people trying to apply different password policies to 
> different domain controllers. I would like this executed for all 
> domain/domain controller security settings in general actually.
>
> From the standpoint of speed/perf, I am not sure if it makes sense to 
> have an assemble the final policy on the fly mechanism here. >From a 
> perf standpoint I don't think you want to be having to do the logic to 
> combine multiple password policies into one policy for every password 
> change (which would be the case if you go to the user granularity 
> level) and instead would just have an override mechanism. You can do 
> this with regular GPOs because the clients individually are processing 
> them, not the DCs. So for this, you would want to use the closest 
> policy to the user as the one applied. The alternative here is if 
> there was a builtin inheritance flowdown model like there is for 
> ACLing where you can simply look at the one object and know exactly 
> what the password policy is whether the settings were higher up or 
> directly on the object just like you can with ACLs. Either way, you 
> need to be able to do a very simple query and very simply processing 
> and get the decision for what the policy should be for the user. This 
> isn't a good place in the code to be just hanging out trying to figure 
> out what to do for a while.
>
> Using groups could be troublesome, what is the override mechanism, 
> which group is more important if there are policies on 10 groups you 
> are in?
>
> Whatever ends up getting done for password policy would be nice to see 
> on kerberos and lockout policy as well. You shouldn't hopefully need 
> to do it much with the former but there are times where I wish I had 
> it available because the only other option was to open the policy for 
> the entire domain regardless of the stupidity of the idea from a 
> security standpoint.
>
> This has been a discussion point inside of MSFT for quite a long time 
> now and I can assure you that anything that gets implemented/released 
> went through considerable discussion by the developers inside of MSFT 
> and to people outside outside of MSFT.
>
> joe
>
> --
>
> O'Reilly Active Directory Third Edition - 
> http://www.joeware.net/win/ad3e.htm
>
> ------------------------------------------------------------------------
>
> *From:* [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED] *On Behalf Of *Crawford, Scott
> *Sent:* Friday, September 01, 2006 4:08 PM
> *To:* ActiveDir@mail.activedir.org
> *Subject:* RE: [ActiveDir] Seperate Administrator password policy
>
> Ø of plans to allow setting password policies at the OU level
>
> What would be the direction they'd go to implement this? Since the 
> setting is in the computer section of the GPO, it seems to offer all 
> the functionality one *should* expect. And in fact, it is applicable 
> at the OU level and it applies to computers [1]. It seems that the 
> major reason people want to be able to set the policy at the OU level 
> is so that it applies to users. The issue is that it's a computer 
> setting, not a user setting. IMHO, the only way to allow different 
> password policies for different users, is to move the settings to the 
> user section of the GPO.
>
> [1] It confuses me somewhat why DCs insist on pulling this from DDP 
> instead of just assembling the policy, like any other, from all 
> applicable GPOs. I assume it was done to avoid a situation where two 
> DCs could have different policies applied to them and depending on 
> what DC handled your password change, you would be subject to 
> different rules. If that's the case, I can't say I'm a big fan of 
> illogical hacks to help out less-cluefull admins.
>
> ------------------------------------------------------------------------
>
> *From:* [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED] *On Behalf Of 
> *Grillenmeier, Guido
> *Sent:* Thursday, August 31, 2006 7:58 AM
> *To:* ActiveDir@mail.activedir.org
> *Subject:* RE: [ActiveDir] Seperate Administrator password policy
>
> Agree, a separate domain is certainly a very high price to pay - it'll 
> cause ongoing headaches with very little benefit. Other companies add 
> requirements for smartcard logons for Admins or also solve it via 
> organizational rules as mentioned by ZV.
>
> I've heard of plans to allow setting password policies at the OU level 
> for Longhorn AD, which is due out mid next year. This could be wishful 
> thinking (has been a request for quite some time), but I hope they 
> make it.
>
> /Guido
>
> *From:* [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED] *On Behalf Of *Za Vue
> *Sent:* Thursday, August 31, 2006 2:39 PM
> *To:* ActiveDir@mail.activedir.org
> *Subject:* Re: [ActiveDir] Seperate Administrator password policy
>
> Would it be easier just to ask them to use 15 characters? Run a small 
> script to check on the numbers of characters after the passwords have 
> been changed. If under 15 than ask them to change it again.
>
> -Z.V.
>
> Almeida Pinto, Jorge de wrote:
>
> third party software could be an option
>
> for example: http://www.anixis.com/products/ppe/default.htm
>
> jorge
>
>     ------------------------------------------------------------------------
>
>     *From:* [EMAIL PROTECTED]
>     <mailto:[EMAIL PROTECTED]>
>     [mailto:[EMAIL PROTECTED] *On Behalf Of *Bahta,
>     Nathaniel V CTR USAF NASIC/SCNA
>     *Sent:* Thursday, August 31, 2006 14:15
>     *To:* ActiveDir@mail.activedir.org
>     <mailto:ActiveDir@mail.activedir.org>
>     *Subject:* [ActiveDir] Seperate Administrator password policy
>
>     Just wanted to field this to see if it makes any sense to any of
>     you guys.
>
>     We are going to implement a mandatory 15 character password policy
>     for all of our administrator accounts. The only way that makes
>     sense is a subdomain with a separate password policy, since there
>     is only one per domain. I also know that I have to edit the
>     minPwdLength attribute and the uASCompat attribute to make this
>     work on the subdomain. Can anyone think of another method of doing
>     this?
>
>     Thanks,
>
>     Nate Bahta
>
> This e-mail and any attachment is for authorised use by the intended 
> recipient(s) only. It may contain proprietary material, confidential 
> information and/or be subject to legal privilege. It should not be 
> copied, disclosed to, retained or used by, any other party. If you are 
> not an intended recipient then please promptly delete this e-mail and 
> any attachment and all copies and inform the sender. Thank you.
>
List info   : http://www.activedir.org/List.aspx
List FAQ    : http://www.activedir.org/ListFAQ.aspx
List archive: http://www.activedir.org/ml/threads.aspx
List info   : http://www.activedir.org/List.aspx
List FAQ    : http://www.activedir.org/ListFAQ.aspx
List archive: http://www.activedir.org/ml/threads.aspx

Reply via email to