Also keep in mind that if you were ever a member of one of these ‘protected groups’ that your inheritance will not be “turned on” again, nor will the admincount attribute be reset to 0….so you can change those back when you know the user isn’t a member of one of the ‘protected groups’ (changing those values before ensuring this will result in the values being reset…as you are well aware by this point).  AdminCount is just a ‘book keeping’ method to know that the ACL has been stamped by AdminSDHolder.

 

I hope that helps.

 

Robert Williams, MCSE NT4/2K/2K3, Security+

Infrastructure Rapid Response Engineer

Northeast Region

Microsoft Corporation

Global Solutions Support Center

 


From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Free, Bob
Sent: Wednesday, June 08, 2005 4:00 PM
To: ActiveDir@mail.activedir.org
Subject: RE: [ActiveDir] Security permissions on user object

 

It ssounds like it's the adminSDHolder behavior that's getting you. Are the users members of any of the other protected groups? It varies across versions, IIRC 2003 added more groups. The articles below should help point in the right direction.

 

http://support.microsoft.com/default.aspx?scid=kb;en-us;318180

http://support.microsoft.com/default.aspx?scid=kb;en-us;817433

 


From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Rimmerman, Russ
Sent: Wednesday, June 08, 2005 12:26 PM
To: ActiveDir@mail.activedir.org
Subject: [ActiveDir] Security permissions on user object

We migrated all our users from an NT4 domain to our AD domain.  Anyone who was in "Domain Admins" on our NT4 domain got migrated into "Domain Admins" on our AD domain.  We took them out of Domain Admins on our AD domain, but their accounts are inheriting the permissions like a normal user inherits.

 

Whenever someone who is NOT a domain admin tries to reset a password or modify any properties of these migrated "Domain Admins" who are no longer Domain Admins, they are denied access.


If I open up one of these users, they are not inheriting the permissions on their user object like every other normal user does.  If I open their account and go to the object security the "Inherit from parent the permission entries that apply to child objects.  Include these with entries explicity defined here." box is not checked like every other user.  If I check the box, others are temporarily able to modify that former domain admins account, but eventually, the box is unchecked again and they inherit their old security on their user object and it's broken again.

 

I know that I once read that this is by design, but how the heck do I fix these users once and for all? 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This e-mail is confidential, may contain proprietary information
of the Cooper Cameron Corporation and its operating Divisions
and may be confidential or privileged.

This e-mail should be read, copied, disseminated and/or used only
by the addressee. If you have received this message in error please
delete it, together with any attachments, from your system.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 

Reply via email to