If you modify a query-based collection though, couldn't that impact the
whole environment?

I guess the only way to secure that further would be to make use of
limiting collections, then the query they modify could only grab all of the
systems/users from within the limiting collection.



On Wed, Jan 15, 2014 at 10:56 AM, Jason Wallace <[email protected]> wrote:

> Hi Stephen
>
> I hope not to be corrected but my understanding is that once an object has
> been scoped and you cannot see it then it will not appear in queries or
> reports either.
>
> I am on a slightly similar project where we have several companies sharing
> infrastructure and needing to run compliance reports
>
> On 15 Jan 2014, at 15:26, "Stephen Owen" <[email protected]> wrote:
>
> Alright guys, thanks for your help.  I have one more question
>
>   Let’s say that I have users and computers in Germany and I want German
> IT to only be able to deploy software to computers and users in their
> regions.  I set up my geographic collections and security scopes and roles
> so that to German IT, only computers and users in their region are visible.
>
>
>
>   What happens if IT then makes a query-based collection, which could
> include computers and users outside of their region?  Seems to me that the
> query would still function and could include users I don’t want them
> including on a deployment.
>
>
>
>   Is this the way it works in that case?  Any thoughts about how to get
> around this if so?
>
>
>
>
> On Wed, Jan 8, 2014 at 3:18 PM, Robert Marshall <[email protected]>wrote:
>
>> There’s limitations either way, Kerberos or fast collection evaluation,
>> as long as the client knows the limits this is a simple way to get things
>> going.
>>
>>
>>
>> *From:* [email protected] [mailto:
>> [email protected]] *On Behalf Of *Miller, Todd
>> *Sent:* 08 January 2014 18:09
>>
>> *To:* [email protected]
>> *Subject:* RE: [mssms] RBAC, is this possible?
>>
>>
>>
>> If you start adding users to a bunch of new security groups to manage
>> application deployments, make sure you keep an eye on your Kerberos token
>> size.  Once a user is in 70ish AD groups you may start encountering
>> problems with systems that use Kerberos authentication.  The buffer size
>> for Kerberos can generally be increased, but it has to be done via Registry
>> changes on each server and webserver config (header size limits)where users
>> authenticate with a Kerberos ticket.  Not all systems that use Kerberos
>> auth can have their buffer size increased either.  If it were me, I would
>> tread very carefully thinking you can just use AD groups for everything
>> under the sun.  There is a hard limit to the number of groups that a user
>> can be part of.  This limit is not exactly sky high either – Kerberos
>> tokens reach a hard limit at 64k which is the equivalent of 900ish groups.
>> If you are in a group that is in a group, both groups count towards that
>> limit.  900 sounds like a lot, but if you start using AD for everything, it
>> is not that difficult to reach it – especially the 70ish limit where you
>> need to start making adjustments on your systems.
>>
>>
>>
>>
>>
>>
>>
>> *From:* [email protected] [
>> mailto:[email protected] <[email protected]>] *On
>> Behalf Of *Robert Marshall
>> *Sent:* Wednesday, January 08, 2014 11:09 AM
>>
>> *To:* [email protected]
>> *Subject:* RE: [mssms] RBAC, is this possible?
>>
>>
>>
>> I just setup a client with their first ConfigMgr installation, CM12R2, I
>> mapped their deployment collections to AD Security Groups as Jason
>> mentioned, the onus is on AD administration using well-known and securable
>> tools that support engineers are often use too. You’ve effectively
>> displaced the administrative burden away from the ConfigMgr product. AD
>> Delta discovery and fast evaluation can help accelerate deployments that
>> need to be rapid, from those that can be deployed at a slower pace. The
>> only negative is that you need to keep an eye on how many collections you
>> have enabled for fast evaluation, as this can have a serious impact on the
>> site server if it’s usage grows out of hand.
>>
>>
>>
>> *From:* [email protected] [
>> mailto:[email protected] <[email protected]>] *On
>> Behalf Of *Jason Wallace
>>
>> *Sent:* 08 January 2014 16:27
>> *To:* [email protected]
>> *Subject:* RE: [mssms] RBAC, is this possible?
>>
>>
>>
>> Correct.
>>
>>
>> The granularity of RBAC is very good but does not go down as far as the
>> methods for populating a collection.
>>
>> There was a good suggestion for deploying a modified SCCM console to
>> those users who will be using the SCCM console and this might work for you
>>
>>
>> ------------------------------
>>
>> Date: Wed, 8 Jan 2014 11:14:15 -0500
>> Subject: Re: [mssms] RBAC, is this possible?
>> From: [email protected]
>> To: [email protected]
>>
>> Security Group based collection membership?  I actually love to go that
>> method, but this client doesn't want to do that.
>>
>>
>>
>> It seems the consensus is that one cannot easily prohibit others from
>> modifying the queries used in a query based collection.
>>
>>
>>
>> On Wed, Jan 8, 2014 at 11:02 AM, Jason Sandys <[email protected]> wrote:
>>
>> Why not use AD Security groups for this?
>>
>>
>>
>> J
>>
>>
>>
>> *From:* [email protected] [mailto:
>> [email protected]] *On Behalf Of *Krueger, Jeff
>> *Sent:* Wednesday, January 8, 2014 8:55 AM
>> *To:* [email protected]
>> *Subject:* RE: [mssms] RBAC, is this possible?
>>
>>
>>
>> I did this for some of our IT staff, gave them the ability to just add
>> direct memberships to a collection and remove devices from a collection.
>> Had our Citrix team publish the console and I modified the xml files to
>> take away the collection properties from the context menu and force them to
>> just use the add resource menu item.
>>
>>
>>
>> Unfortunately with RBAC you have to give the modify right for users to be
>> able to add devices to a collection which also includes the ability to
>> create query rules, it would be nice to have those rights broken down a bit
>> in future updates
>>
>>
>>
>> *From:* [email protected] [
>> mailto:[email protected] <[email protected]>] *On
>> Behalf Of *Stephen Owen
>>
>>
>> *Sent:* Wednesday, January 8, 2014 9:29 AM
>> *To:* [email protected]
>>
>> *Subject:* Re: [mssms] RBAC, is this possible?
>>
>>
>>
>>
>>
>> We did this in 2007 but in 2012, they're wanting to go all Console.
>>
>>
>>
>> I think I'll be rolling a PowerShell GUI to help facilitate all of this.
>>
>>
>>
>> Thanks,
>>
>>
>>
>> On Wed, Jan 8, 2014 at 9:21 AM, Sherry Kissinger <
>> [email protected]> wrote:
>>
>> Once someone has create or modify on a collection, they can change
>> anything.
>>
>> I suggest have a "front end" -- either a web page, or a powershell gui
>> (something like that) which those regional staff can use; you could keep it
>> simple "input computer names here" (and a separate one for usernames), and
>> trust they've already confirmed the exact computer name and the exact
>> username, or your could get as complex as you like on
>> verification--confirming the computer or user exists, confirming that the
>> user running the "add a computer" has the correct "rights" to manage that
>> particular computer or user.
>>
>> The web page does the actual adding using a service account--which has
>> rights to that collection.   Basically, a "roll your own shopping".
>>
>> You could also look at all the various shopping addons for CM12--that's
>> pretty much what you are looking for.
>>
>>
>>
>> Sherry Kissinger
>> Microsoft MVP - ConfigMgr
>> [email protected]
>>
>>
>> ------------------------------
>>
>> *From:* Jason Wallace <[email protected]>
>> *To:* "[email protected]" <[email protected]>
>> *Sent:* Wednesday, January 8, 2014 7:32 AM
>> *Subject:* Re: [mssms] RBAC, is this possible?
>>
>>
>>
>> I really don’t think that you would be able to do this.
>>
>>
>>
>> http://gallery.technet.microsoft.com/Matrix-of-Role-Based-d6318b96<https://urldefense.proofpoint.com/v1/url?u=http://gallery.technet.microsoft.com/Matrix-of-Role-Based-d6318b96&k=DRaZFQufJSh%2Bz2CJu01vGA%3D%3D%0a&r=G7Rp/yVEkz9AB1xRQWzmh1E0dbzzZxlFIY6QTWSRqzc%3D%0a&m=R7wAk66h%2BnO0g4iv7QL29mDiVRLN9Z7pPyfAwCNmOZM%3D%0a&s=aa86d8c2e0e6562753b5c8c1e05d14fa1597678744ec747532ae3606d8280e5f>is
>>  a very useful resource on RBAC, as is Chris Nacker’s blog
>>
>>
>>
>> Sent from Windows Mail
>>
>>
>>
>> *From:* Stephen Owen <[email protected]>
>> *Sent:* Wednesday, 8 January 2014 13:27
>> *To:* [email protected]
>>
>>
>>
>> Hi all,
>>
>>
>>
>>   My client would like to setup RBAC so that regional IT users are able
>> to add individual computers or users to a collection, but not create or
>> modify query-based collection membership queries, which I will be creating.
>>
>>
>>
>>
>>   I've not spent a lot of time with RBAC, do you know if this is
>> possible?
>>
>>
>>
>> Thanks!
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>> ------------------------------
>>
>>
>> CONFIDENTIALITY NOTICE: This email contains information from the sender
>> that may be CONFIDENTIAL, LEGALLY PRIVILEGED, PROPRIETARY or otherwise
>> protected from disclosure. This email is intended for use only by the
>> person or entity to whom it is addressed. If you are not the intended
>> recipient, any use, disclosure, copying, distribution, printing, or any
>> action taken in reliance on the contents of this email, is strictly
>> prohibited. If you received this email in error, please contact the sending
>> party by reply email, delete the email from your computer system and shred
>> any paper copies.
>>
>> Note to Patients: There are a number of risks you should consider before
>> using e-mail to communicate with us. See our Privacy & Security page on
>> www.henryford.com for more detailed information as well as information
>> concerning MyChart, our new patient portal. If you do not believe that our
>> policy gives you the privacy and security protection you need, do not send
>> e-mail or Internet communications to us.
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>> ------------------------------
>>
>> Notice: This UI Health Care e-mail (including attachments) is covered by
>> the Electronic Communications Privacy Act, 18 U.S.C. 2510-2521, is
>> confidential and may be legally privileged.  If you are not the intended
>> recipient, you are hereby notified that any retention, dissemination,
>> distribution, or copying of this communication is strictly prohibited.
>> Please reply to the sender that you have received the message in error,
>> then delete it.  Thank you.
>> ------------------------------
>>
>>
>>
>>
>
>
>



Reply via email to