Alright guys, thanks for your help.  I have one more question

  Let’s say that I have users and computers in Germany and I want German IT
to only be able to deploy software to computers and users in their
regions.  I set up my geographic collections and security scopes and roles
so that to German IT, only computers and users in their region are visible.



  What happens if IT then makes a query-based collection, which could
include computers and users outside of their region?  Seems to me that the
query would still function and could include users I don’t want them
including on a deployment.



  Is this the way it works in that case?  Any thoughts about how to get
around this if so?




On Wed, Jan 8, 2014 at 3:18 PM, Robert Marshall <[email protected]> wrote:

> There’s limitations either way, Kerberos or fast collection evaluation, as
> long as the client knows the limits this is a simple way to get things
> going.
>
>
>
> *From:* [email protected] [mailto:
> [email protected]] *On Behalf Of *Miller, Todd
> *Sent:* 08 January 2014 18:09
>
> *To:* [email protected]
> *Subject:* RE: [mssms] RBAC, is this possible?
>
>
>
> If you start adding users to a bunch of new security groups to manage
> application deployments, make sure you keep an eye on your Kerberos token
> size.  Once a user is in 70ish AD groups you may start encountering
> problems with systems that use Kerberos authentication.  The buffer size
> for Kerberos can generally be increased, but it has to be done via Registry
> changes on each server and webserver config (header size limits)where users
> authenticate with a Kerberos ticket.  Not all systems that use Kerberos
> auth can have their buffer size increased either.  If it were me, I would
> tread very carefully thinking you can just use AD groups for everything
> under the sun.  There is a hard limit to the number of groups that a user
> can be part of.  This limit is not exactly sky high either – Kerberos
> tokens reach a hard limit at 64k which is the equivalent of 900ish groups.
> If you are in a group that is in a group, both groups count towards that
> limit.  900 sounds like a lot, but if you start using AD for everything, it
> is not that difficult to reach it – especially the 70ish limit where you
> need to start making adjustments on your systems.
>
>
>
>
>
>
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *Robert Marshall
> *Sent:* Wednesday, January 08, 2014 11:09 AM
>
> *To:* [email protected]
> *Subject:* RE: [mssms] RBAC, is this possible?
>
>
>
> I just setup a client with their first ConfigMgr installation, CM12R2, I
> mapped their deployment collections to AD Security Groups as Jason
> mentioned, the onus is on AD administration using well-known and securable
> tools that support engineers are often use too. You’ve effectively
> displaced the administrative burden away from the ConfigMgr product. AD
> Delta discovery and fast evaluation can help accelerate deployments that
> need to be rapid, from those that can be deployed at a slower pace. The
> only negative is that you need to keep an eye on how many collections you
> have enabled for fast evaluation, as this can have a serious impact on the
> site server if it’s usage grows out of hand.
>
>
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *Jason Wallace
>
> *Sent:* 08 January 2014 16:27
> *To:* [email protected]
> *Subject:* RE: [mssms] RBAC, is this possible?
>
>
>
> Correct.
>
>
> The granularity of RBAC is very good but does not go down as far as the
> methods for populating a collection.
>
> There was a good suggestion for deploying a modified SCCM console to those
> users who will be using the SCCM console and this might work for you
>
>
> ------------------------------
>
> Date: Wed, 8 Jan 2014 11:14:15 -0500
> Subject: Re: [mssms] RBAC, is this possible?
> From: [email protected]
> To: [email protected]
>
> Security Group based collection membership?  I actually love to go that
> method, but this client doesn't want to do that.
>
>
>
> It seems the consensus is that one cannot easily prohibit others from
> modifying the queries used in a query based collection.
>
>
>
> On Wed, Jan 8, 2014 at 11:02 AM, Jason Sandys <[email protected]> wrote:
>
> Why not use AD Security groups for this?
>
>
>
> J
>
>
>
> *From:* [email protected] [mailto:
> [email protected]] *On Behalf Of *Krueger, Jeff
> *Sent:* Wednesday, January 8, 2014 8:55 AM
> *To:* [email protected]
> *Subject:* RE: [mssms] RBAC, is this possible?
>
>
>
> I did this for some of our IT staff, gave them the ability to just add
> direct memberships to a collection and remove devices from a collection.
> Had our Citrix team publish the console and I modified the xml files to
> take away the collection properties from the context menu and force them to
> just use the add resource menu item.
>
>
>
> Unfortunately with RBAC you have to give the modify right for users to be
> able to add devices to a collection which also includes the ability to
> create query rules, it would be nice to have those rights broken down a bit
> in future updates
>
>
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *Stephen Owen
>
>
> *Sent:* Wednesday, January 8, 2014 9:29 AM
> *To:* [email protected]
>
> *Subject:* Re: [mssms] RBAC, is this possible?
>
>
>
>
>
> We did this in 2007 but in 2012, they're wanting to go all Console.
>
>
>
> I think I'll be rolling a PowerShell GUI to help facilitate all of this.
>
>
>
> Thanks,
>
>
>
> On Wed, Jan 8, 2014 at 9:21 AM, Sherry Kissinger <
> [email protected]> wrote:
>
> Once someone has create or modify on a collection, they can change
> anything.
>
> I suggest have a "front end" -- either a web page, or a powershell gui
> (something like that) which those regional staff can use; you could keep it
> simple "input computer names here" (and a separate one for usernames), and
> trust they've already confirmed the exact computer name and the exact
> username, or your could get as complex as you like on
> verification--confirming the computer or user exists, confirming that the
> user running the "add a computer" has the correct "rights" to manage that
> particular computer or user.
>
> The web page does the actual adding using a service account--which has
> rights to that collection.   Basically, a "roll your own shopping".
>
> You could also look at all the various shopping addons for CM12--that's
> pretty much what you are looking for.
>
>
>
> Sherry Kissinger
> Microsoft MVP - ConfigMgr
> [email protected]
>
>
> ------------------------------
>
> *From:* Jason Wallace <[email protected]>
> *To:* "[email protected]" <[email protected]>
> *Sent:* Wednesday, January 8, 2014 7:32 AM
> *Subject:* Re: [mssms] RBAC, is this possible?
>
>
>
> I really don’t think that you would be able to do this.
>
>
>
> http://gallery.technet.microsoft.com/Matrix-of-Role-Based-d6318b96<https://urldefense.proofpoint.com/v1/url?u=http://gallery.technet.microsoft.com/Matrix-of-Role-Based-d6318b96&k=DRaZFQufJSh%2Bz2CJu01vGA%3D%3D%0a&r=G7Rp/yVEkz9AB1xRQWzmh1E0dbzzZxlFIY6QTWSRqzc%3D%0a&m=R7wAk66h%2BnO0g4iv7QL29mDiVRLN9Z7pPyfAwCNmOZM%3D%0a&s=aa86d8c2e0e6562753b5c8c1e05d14fa1597678744ec747532ae3606d8280e5f>is
>  a very useful resource on RBAC, as is Chris Nacker’s blog
>
>
>
> Sent from Windows Mail
>
>
>
> *From:* Stephen Owen <[email protected]>
> *Sent:* Wednesday, 8 January 2014 13:27
> *To:* [email protected]
>
>
>
> Hi all,
>
>
>
>   My client would like to setup RBAC so that regional IT users are able to
> add individual computers or users to a collection, but not create or modify
> query-based collection membership queries, which I will be creating.
>
>
>
>   I've not spent a lot of time with RBAC, do you know if this is possible?
>
>
>
>
> Thanks!
>
>
>
>
>
>
>
>
>
>
>
>
>
>
> ------------------------------
>
>
> CONFIDENTIALITY NOTICE: This email contains information from the sender
> that may be CONFIDENTIAL, LEGALLY PRIVILEGED, PROPRIETARY or otherwise
> protected from disclosure. This email is intended for use only by the
> person or entity to whom it is addressed. If you are not the intended
> recipient, any use, disclosure, copying, distribution, printing, or any
> action taken in reliance on the contents of this email, is strictly
> prohibited. If you received this email in error, please contact the sending
> party by reply email, delete the email from your computer system and shred
> any paper copies.
>
> Note to Patients: There are a number of risks you should consider before
> using e-mail to communicate with us. See our Privacy & Security page on
> www.henryford.com for more detailed information as well as information
> concerning MyChart, our new patient portal. If you do not believe that our
> policy gives you the privacy and security protection you need, do not send
> e-mail or Internet communications to us.
>
>
>
>
>
>
>
>
>
>
>
>
>
>
> ------------------------------
>
> Notice: This UI Health Care e-mail (including attachments) is covered by
> the Electronic Communications Privacy Act, 18 U.S.C. 2510-2521, is
> confidential and may be legally privileged.  If you are not the intended
> recipient, you are hereby notified that any retention, dissemination,
> distribution, or copying of this communication is strictly prohibited.
> Please reply to the sender that you have received the message in error,
> then delete it.  Thank you.
> ------------------------------
>
>
>
>



Reply via email to