There is much in ldp I dont know. Everything I do know, I learned from John Craddock's book and the understanding ldap whitepaper from MSFT.
Thanks for all the help so far joe and Dmitri . If I wanted to get my TAM to get the updated version of ldp as it stands, what QFE number should I quote? The more I look into this the more insane I get ;-) Why is the Extended Right is defined with the string "SW" in the sddl format but dsacls uses "WS". Different access masks have different names depending on what I read. "Read permissions" in ldp is "Read Control" in the docs. "Extended write" in ldp is "Write to self" in dsacls. At least thats how I understood it. I may have to make my own notes on this. If I ever have to read this stuff and the delegation docs I am definitely going to go nuts. Would it be fare to say we can do all we need definitely using scripts? Or is that also not definite? You see, until recently I was reading this delegation doc with a grin from ear-to-ear thinking yeah! And now I am not so .... Before I break down and cry like Homer, I'm gonna go get some Zzzzzzzzzzzzzz! Cheers M@ On 7/24/06, Dmitri Gavrilov <[EMAIL PROTECTED]> wrote:
Re "Access System Security" checkbox. We removed it from the latest versions of ldp.exe because it does not do what you want. Even if you grant this right to some principal, he will still be unable to read or tweak the SACLs. The only way to be able to do this is to grant SE_ACCESS_SYSTEM_SECURITY privilege. You do this from gpedit.msc (security settings/User rights assignments). On a more general note -- yes, AD security is a mess to manage and to understand. We are trying to improve it, but it is super super difficult task. Not only the rules are difficult to understand and are numerous, but also we need to respect the existing security setups which use weird ACLs. There were several attempts to improve things, but I don't believe we are getting closer, mostly due to backward compatibility issues, as well as due to the need to introduce new rules (such as confidentiality bit and many new control access rights). BTW, the Delegation Wizard is considered to be the "entry-level" ACLing tool. Alas, it does not work for ADAM. Dmitri -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of joe Sent: Monday, July 24, 2006 1:42 PM To: ActiveDir@mail.activedir.org Subject: RE: [ActiveDir] ldp in ADAM-SP1 Yeah what I was doing was setting a FC ACE for connection objects only. If you want to cover multiple objects for this you would need to specify multiple objectclasses which would result in multiple ACEs which is not a good option. Which means, use a different tool as the bugs in the current version of LDP make that difficult for this specific task. In my tests, I was specifically using LDP from ADAM SP1. But for what you want to do, use ADUC or DSACLS. As an aside, I emailed Matheesha directly a little while ago when my first email was lost in limbo waiting to be sent out by the list. A version of LDP that doesn't have this issue should be in Longhorn when it is released. The developer quickly fixed the first bug I mentioned this morning after I pinged him and it seems the second bug had already been corrected. This folks is the power of this list.... Take note. I am not entirely positive what the "Access system security" is supposed to be... This is not an issue in later versions of LDP... I would say read the chapters on security in the AD book, then if you don't have it, get and read Sakari's book as that has a great chapter on AD security and then finally if you still want to learn more, wander into the MSDN library and start reading about Security Descriptors, Access Control Lists, and Access Control Entries. Once you understand the structures and how they are represented a lot of the security stuff starts making more and more sense. joe -- O'Reilly Active Directory Third Edition - http://www.joeware.net/win/ad3e.htm -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Matheesha Weerasinghe Sent: Monday, July 24, 2006 2:03 PM To: ActiveDir@mail.activedir.org Subject: Re: [ActiveDir] ldp in ADAM-SP1 Joe joe I see you were configuring Full Control (GA) for nTDSConnection objects by configuring perms on the parent nTDSDSA object. I was trying to actually configure full control to the nTDSDSA using perms on the CN=Sites object but the principal is the same I guess. The only thing is nTDSConnection objects cant have child objects can they? Still I am having some issues repro'ing. You said your workaround was to configure on the object types. Did you mean to configure explicitly on the object or on the parent with the child's object type specified in the ACE? I cant repro here and I am not sure whether you used dsacls or ldp to repro. And why does it not choose the "Access System Security" option when you edit a Full Control ACE? Is that expected? I thought full control meant everything. Not everything but "Access System Security". Also how come there is no string defined for "Access System Security"? There is for all other access masks. I freely admit I know very little in this arena. Any lesson offered is most appreciated. I am already reading technet and many books by the fine guys on here. I just havent finished them yet ;-) Thanks to everyone who's read this so far and for all the help I am offered. I truly appreciate it. Sincerely M@ On 7/24/06, joe <[EMAIL PROTECTED]> wrote: > Beautiful, this is bug week.... > > There are actually two bugs here. > > 1. The inherit only check box is greyed out. This is the checkbox you would > need to check in order to specify an inherit only ACE (i.e. Child > Objects Only). > > 2. When you try to work around it and specify the actual object types > to inherit to it creates two ACEs instead of one. The first ACE is the > FC inherit only to the object class you specify but then there is also > a FC to > the object itself. In the example below note the TEST\joe ACEs... I > only added a single FC for nTDSConnection objects for test\joe but got > that AND the non-inheritable Test\joe FC on the object itself. > > > G:\>dsacls "\\r2dc1\CN=NTDS > Settings,CN=R2DC1,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Conf igur > ation,DC=test,DC=loc" > Access list: > Effective Permissions on this object are: > Allow TEST\joe FULL CONTROL > Allow TEST\Domain Admins SPECIAL ACCESS > DELETE > READ PERMISSONS > WRITE PERMISSIONS > CHANGE OWNERSHIP > CREATE CHILD > LIST CONTENTS > WRITE SELF > WRITE PROPERTY > READ PROPERTY > DELETE TREE > LIST OBJECT > CONTROL ACCESS Allow NT > AUTHORITY\Authenticated Users SPECIAL ACCESS > READ PERMISSONS > LIST CONTENTS > READ PROPERTY > LIST OBJECT > Allow NT AUTHORITY\SYSTEM FULL CONTROL > Allow TEST\Domain Admins FULL CONTROL <Inherited from > parent> > Allow TEST\Enterprise Admins FULL CONTROL <Inherited from > parent> > > Permissions inherited to subobjects are: > Inherited to all subobjects > Allow TEST\Domain Admins FULL CONTROL <Inherited from > parent> > Allow TEST\Enterprise Admins FULL CONTROL <Inherited from > parent> > > Inherited to nTDSConnection > Allow TEST\joe FULL CONTROL > The command completed successfully > > > > So in order to generate a generic FC that is only inherited, you > can't, because of bug 1 do it with LDP. If you want to create an ACE > for a specific > objectclass (which nTDSConnection should be ok in terms of what you > are trying to delegate) it can do it but you have to go back and clean > up the the additional ACE created by bug 2. > > > I will alert MSFT. > > joe > > > > > -- > O'Reilly Active Directory Third Edition - > http://www.joeware.net/win/ad3e.htm > > > -----Original Message----- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf Of Matheesha > Weerasinghe > Sent: Monday, July 24, 2006 8:12 AM > To: ActiveDir@mail.activedir.org > Subject: [ActiveDir] ldp in ADAM-SP1 > > All > > Could someone with more experience with ldp provided with ADAM-SP1 > tell me how I would go about configuring inherit-only Full Control > permissions on nTDSDSA objects in the > CN=Sites,CN=Configuration,DC=ForestFQDN ? The inherit-only perms > options is grayed out here and I dont know how to do it. > > Based on joe's comments I assumed the ldp.exe's ACL editor is the most > comprehensive and capable ACL gui editor available. I must be doing > something wrong here so I would appreciate some help. > > Regards > > M@ > List info : http://www.activedir.org/List.aspx > List FAQ : http://www.activedir.org/ListFAQ.aspx > List archive: http://www.activedir.org/ml/threads.aspx > > List info : http://www.activedir.org/List.aspx > List FAQ : http://www.activedir.org/ListFAQ.aspx > List archive: http://www.activedir.org/ml/threads.aspx > List info : http://www.activedir.org/List.aspx List FAQ : http://www.activedir.org/ListFAQ.aspx List archive: http://www.activedir.org/ml/threads.aspx List info : http://www.activedir.org/List.aspx List FAQ : http://www.activedir.org/ListFAQ.aspx List archive: http://www.activedir.org/ml/threads.aspx List info : http://www.activedir.org/List.aspx List FAQ : http://www.activedir.org/ListFAQ.aspx List archive: http://www.activedir.org/ml/threads.aspx
List info : http://www.activedir.org/List.aspx List FAQ : http://www.activedir.org/ListFAQ.aspx List archive: http://www.activedir.org/ml/threads.aspx