I understand. For a long time I was very "go native delegation" but as I saw
more and more folks doing it, usually poorly, and then trying to figure out
who was doing what and how they were doing it and a long chat with Stuart
about the possibility of business rules and triggers in AD and getting back
the answer of no you won't see it, that is what you should be using MIIS for
then I started moving away from the native delegation camp. It is still nice
that it can be done and there are times where it is fine and you don't need
anything else but there are times when you just don't want that investment
in trying to train those low level admins or offshore resources so giving
them a nice simple web page with a big EASY button makes more sense. 
 
As for specifics, unlocks need to get to the DC the user hits but password
must be changed shouldn't be a problem. That is one of the things I fought
for and got fixed in 2K SP4 / K3 Gold with the Replicate Single Object
capability they put together for that issue. 
 
Even for unlocks I would rather just have a script that cleans it up on all
DCs it can reach simultaneously than have an admin who may or many not truly
understand how things work well enough to pick DCs, even with tools that can
help and give the likely suspect DC. In larger environments, as you are used
to, it isn't uncommon for a user to be tying into all sorts of different
resources so the DC that handles interactive auth isn't the only one that
could cause impact due to an account not getting unlocked. 
 
IMO, provisioning is definitely where it is at, unfortunately for many
companies, it seems that is about 3 large steps away from anything they are
at. You start to ask about common points to retrieve info from and workflow
processes and they start chuckling at you. That is where the proxy tools
really start coming in useful. My personal favorite layout though would be
full provisioning / work flow setup and a password kiosk. It can be a good
amount of work to get there though.
 
There is also the idea of easily tracking the resets alone... If someone is
regularly needing their password reset, that is a good candidate for
training. Getting a report of all password resets with anyone over X resets
in a given year being highlighted could be a useful item. Easy to create
such a report if you have a system that proxies all of the resets. Also you
don't have to worry about the guy taking scripting 101 who accidently
changes everyone's password he has delegated access to... Yeah... that is
for real, saw it take out about 100k users for a day or so while it got
fixed back in about 97/98.
 
--
O'Reilly Active Directory Third Edition -
http://www.joeware.net/win/ad3e.htm 
 
 

  _____  

From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Grillenmeier, Guido
Sent: Friday, December 22, 2006 1:07 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Delegate Password Resets



I don't - I like leveraging the capabilities of AD and this is something
where it can perform quite well. That's not true for other things you can
delegate, such as creation of objects, where you might really want to add a
business logic.  These actions are often combined these days with
provisioning tools.

 

But for resetting passwords in a strongly distributed environment, where you
may want to delegate PW mgmt to specific branches in your company, I prefer
to use the native AD rights and have the change happen on a DC close to the
user. Specifically for lockout and user-must-change-pw actions, since these
are not handled/replicated the same way as pw-resets.

 

/Guido

 

From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of joe
Sent: Freitag, 22. Dezember 2006 18:33
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Delegate Password Resets

 

You will either delegate or you will proxy. That is about it for the
choices. And quite frankly, the proxy is just a delegation to a specific
account that does the authentication/authorization of the support folks on
its own. 

 

To be most honest, I prefer proxy over delegation. It is much easier to
track and control and enforce some kind of business logic. I much prefer to
stop people up front than try to track later what the heck happened. 

 

--

O'Reilly Active Directory Third Edition -
http://www.joeware.net/win/ad3e.htm 

 

 

 

  _____  

From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Salandra, Justin A.
Sent: Thursday, December 21, 2006 9:25 PM
To: ActiveDir@mail.activedir.org
Subject: [ActiveDir] Delegate Password Resets

I wanted to find out from all of you what ways you have delegated password
reset functions to your helpdesks.  We have a product that does this but it
is continually having problems and want to know if there are nay other ways.

 

Justin A. Salandra

MCSE Windows 2000 and 2003

Network and Technology Services Manager

Catholic Health Care System

646.505.3681

cell 917.455.0110

[EMAIL PROTECTED]

 

Reply via email to