If you start adding users to a bunch of new security groups to manage 
application deployments, make sure you keep an eye on your Kerberos token size. 
 Once a user is in 70ish AD groups you may start encountering problems with 
systems that use Kerberos authentication.  The buffer size for Kerberos can 
generally be increased, but it has to be done via Registry changes on each 
server and webserver config (header size limits)where users authenticate with a 
Kerberos ticket.  Not all systems that use Kerberos auth can have their buffer 
size increased either.  If it were me, I would tread very carefully thinking 
you can just use AD groups for everything under the sun.  There is a hard limit 
to the number of groups that a user can be part of.  This limit is not exactly 
sky high either - Kerberos tokens reach a hard limit at 64k which is the 
equivalent of 900ish groups.  If you are in a group that is in a group, both 
groups count towards that limit.  900 sounds like a lot, but if you start using 
AD for everything, it is not that difficult to reach it - especially the 70ish 
limit where you need to start making adjustments on your systems.



From: [email protected] [mailto:[email protected]] On 
Behalf Of Robert Marshall
Sent: Wednesday, January 08, 2014 11:09 AM
To: [email protected]
Subject: RE: [mssms] RBAC, is this possible?

I just setup a client with their first ConfigMgr installation, CM12R2, I mapped 
their deployment collections to AD Security Groups as Jason mentioned, the onus 
is on AD administration using well-known and securable tools that support 
engineers are often use too. You've effectively displaced the administrative 
burden away from the ConfigMgr product. AD Delta discovery and fast evaluation 
can help accelerate deployments that need to be rapid, from those that can be 
deployed at a slower pace. The only negative is that you need to keep an eye on 
how many collections you have enabled for fast evaluation, as this can have a 
serious impact on the site server if it's usage grows out of hand.

From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Jason Wallace
Sent: 08 January 2014 16:27
To: [email protected]<mailto:[email protected]>
Subject: RE: [mssms] RBAC, is this possible?

Correct.

The granularity of RBAC is very good but does not go down as far as the methods 
for populating a collection.

There was a good suggestion for deploying a modified SCCM console to those 
users who will be using the SCCM console and this might work for you

________________________________
Date: Wed, 8 Jan 2014 11:14:15 -0500
Subject: Re: [mssms] RBAC, is this possible?
From: [email protected]<mailto:[email protected]>
To: [email protected]<mailto:[email protected]>
Security Group based collection membership?  I actually love to go that method, 
but this client doesn't want to do that.

It seems the consensus is that one cannot easily prohibit others from modifying 
the queries used in a query based collection.

On Wed, Jan 8, 2014 at 11:02 AM, Jason Sandys 
<[email protected]<mailto:[email protected]>> wrote:
Why not use AD Security groups for this?

J

From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]<mailto:[email protected]>] 
On Behalf Of Krueger, Jeff
Sent: Wednesday, January 8, 2014 8:55 AM
To: [email protected]<mailto:[email protected]>
Subject: RE: [mssms] RBAC, is this possible?

I did this for some of our IT staff, gave them the ability to just add direct 
memberships to a collection and remove devices from a collection.  Had our 
Citrix team publish the console and I modified the xml files to take away the 
collection properties from the context menu and force them to just use the add 
resource menu item.

Unfortunately with RBAC you have to give the modify right for users to be able 
to add devices to a collection which also includes the ability to create query 
rules, it would be nice to have those rights broken down a bit in future updates

From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Stephen Owen

Sent: Wednesday, January 8, 2014 9:29 AM
To: [email protected]<mailto:[email protected]>
Subject: Re: [mssms] RBAC, is this possible?


We did this in 2007 but in 2012, they're wanting to go all Console.

I think I'll be rolling a PowerShell GUI to help facilitate all of this.

Thanks,

On Wed, Jan 8, 2014 at 9:21 AM, Sherry Kissinger 
<[email protected]<mailto:[email protected]>> wrote:
Once someone has create or modify on a collection, they can change anything.

I suggest have a "front end" -- either a web page, or a powershell gui 
(something like that) which those regional staff can use; you could keep it 
simple "input computer names here" (and a separate one for usernames), and 
trust they've already confirmed the exact computer name and the exact username, 
or your could get as complex as you like on verification--confirming the 
computer or user exists, confirming that the user running the "add a computer" 
has the correct "rights" to manage that particular computer or user.

The web page does the actual adding using a service account--which has rights 
to that collection.   Basically, a "roll your own shopping".

You could also look at all the various shopping addons for CM12--that's pretty 
much what you are looking for.

Sherry Kissinger
Microsoft MVP - ConfigMgr
[email protected]<mailto:[email protected]>

________________________________
From: Jason Wallace <[email protected]<mailto:[email protected]>>
To: "[email protected]<mailto:[email protected]>" 
<[email protected]<mailto:[email protected]>>
Sent: Wednesday, January 8, 2014 7:32 AM
Subject: Re: [mssms] RBAC, is this possible?

I really don't think that you would be able to do this.

http://gallery.technet.microsoft.com/Matrix-of-Role-Based-d6318b96<https://urldefense.proofpoint.com/v1/url?u=http://gallery.technet.microsoft.com/Matrix-of-Role-Based-d6318b96&k=DRaZFQufJSh%2Bz2CJu01vGA%3D%3D%0a&r=G7Rp/yVEkz9AB1xRQWzmh1E0dbzzZxlFIY6QTWSRqzc%3D%0a&m=R7wAk66h%2BnO0g4iv7QL29mDiVRLN9Z7pPyfAwCNmOZM%3D%0a&s=aa86d8c2e0e6562753b5c8c1e05d14fa1597678744ec747532ae3606d8280e5f>
 is a very useful resource on RBAC, as is Chris Nacker's blog

Sent from Windows Mail

From: Stephen Owen<mailto:[email protected]>
Sent: Wednesday, 8 January 2014 13:27
To: [email protected]<mailto:[email protected]>

Hi all,

  My client would like to setup RBAC so that regional IT users are able to add 
individual computers or users to a collection, but not create or modify 
query-based collection membership queries, which I will be creating.

  I've not spent a lot of time with RBAC, do you know if this is possible?

Thanks!







________________________________

CONFIDENTIALITY NOTICE: This email contains information from the sender that 
may be CONFIDENTIAL, LEGALLY PRIVILEGED, PROPRIETARY or otherwise protected 
from disclosure. This email is intended for use only by the person or entity to 
whom it is addressed. If you are not the intended recipient, any use, 
disclosure, copying, distribution, printing, or any action taken in reliance on 
the contents of this email, is strictly prohibited. If you received this email 
in error, please contact the sending party by reply email, delete the email 
from your computer system and shred any paper copies.

Note to Patients: There are a number of risks you should consider before using 
e-mail to communicate with us. See our Privacy & Security page on 
www.henryford.com<http://www.henryford.com> for more detailed information as 
well as information concerning MyChart, our new patient portal. If you do not 
believe that our policy gives you the privacy and security protection you need, 
do not send e-mail or Internet communications to us.








________________________________
Notice: This UI Health Care e-mail (including attachments) is covered by the 
Electronic Communications Privacy Act, 18 U.S.C. 2510-2521, is confidential and 
may be legally privileged.  If you are not the intended recipient, you are 
hereby notified that any retention, dissemination, distribution, or copying of 
this communication is strictly prohibited.  Please reply to the sender that you 
have received the message in error, then delete it.  Thank you.
________________________________



Reply via email to