SlideShare a Scribd company logo
Lecture 8:
Permissions and
Resources
Network Design & Administration
Group Types
• When defining a group, need to consider its type.
• This will dictate what it can and cannot do (i.e. security and
  permissions of group).
• Four basic types of groups:
  •   Distribution groups




                                                                   Network Design & Administration
  •   Security groups
  •   Application basic groups
  •   LDAP query groups
• Administrators mostly use security groups to specify what
  permissions the group has when interacting with a resource.
• Distribution groups are used when limited access to a
  resource is required (e.g. used extensively in MS Exchange
  Server for sending emails to groups)                                     2
Groups Scope
• Groups have a Scope.
• Depending on its scope, a group can be assigned permissions
  to different extents in the domain structure.
• There are three types of scope:
  • Domain Local




                                                                  Network Design & Administration
  • Global
  • Universal
• Group scope is affected by the Functional Level of the domain
  in which it exists.
• The functional level of a domain is dictated by the lowest
  version of windows server running as a domain controller
  within the domain.
• This can also dictate the functional level of a forest.                 3
Domain Functional Levels[1]
• Limits what functionality domain controllers offer within the domain.
• All functional levels provide the default Active Directory Domain
  Services feature set plus additional features depending on the operating
  system.
 Functional Level            Features[1]
 Windows 2000 Native         Universal groups enabled for distribution and




                                                                              Network Design & Administration
                             security groups; group nesting; group
                             conversion; SID history.
 Windows Server 2003         Domain rename; last logon timestamp;
                             password setting on inetOrgPerson / User
                             objects; redirect users/computers containers;
                             authorisation manager policies; constrained
                             delegation; selective authorisation.
 Windows Server 2008         Distributed File System replication of SYSVOL;
                             Advanced Encryption Services for Kerberos;
                             interactive logon info; fine-grained password            4
                             policies
 Windows Server 2008 R2      Active Directory domain recycle bin.
Forest Functional Levels[1]
• Functional levels impact the forest functional level.
• Each Server version adds more features to basic forest
  functionality.
Forest Functional Level    Features[1]




                                                                               Network Design & Administration
Windows 2000               Default AD feature set

Windows Server 2003        Forest trust; domain rename; linked value
                           replication; Read-only domain controllers
                           (RODC); improved knowledge consistency
                           checker; dynamic objects;
                           deactivation/redefinition of attributes and
                           classes in schema.
Windows Server 2008        No additional forest level features; will default
                           to a Server 2008 FL instead of a 2003 FL.                   5
Windows Server 2008 R2
Group Scope Revisited![2]
• Scope can be domain local, global, or universal.
Group Scope    Group Membership Can Include[2]             Can be used to [2]

Domain Local   User accounts from any domain in the        Assign access to resources
               forest; global groups or universal groups   only in the local domain; on
               from any domain in the forest; user         all servers in domain




                                                                                           Network Design & Administration
               accounts or global or universal groups      running Windows Server
               from any domain in trusted forest;          2000/2003/2008.
               nested domain local groups from the
               local domain.
Global         User accounts from the domain where         Assign access to resources in
               the group is created; nested global         all domains in forest or
               groups from the local domain.               between trusted forests;
                                                           member servers running
                                                           Windows Server.
Universal      User accounts from any domain in            Assign access to resources in           6
               forest; global groups from any domain       all domains in forest or
               in forest; nested universal groups from     between trusted forests; on
               any domain in forest.                       all servers running 2000 +
Why?
• Allows different groups different degrees of
  permission when included within each other.
• Different sorts of objects are allowed
  membership of different group types (scopes)




                                                       Network Design & Administration
• Remember, this applies to security groups.
  Distribution groups, as mentioned
  previously, only relate to directory-aware
  applications (e.g. MS Exchange)
  • Since security groups can also be used as
    distribution groups, often don’t bother with the           7

    latter.
Domain Local Groups
• Available even in lower domain functional levels.
• Typically assigned permissions to resources. (e.g. shared
  folder or printer)
   • Then allows easier group nesting




                                                              Network Design & Administration
• Can also be used to group users from the same domain
  needing the same permissions to access a resource in the
  same domain.
• Can only be used to assign permissions to resources in
  the domain in which they were created (the meaning of
  domain local!)
• See table for permitted membership.                                 8
Global groups
• Often used to gather users or computers together in the
  same domain with same role or function, or requiring
  similar access requirements.
• Can only include members from within their own domain




                                                             Network Design & Administration
  (including other global groups from the same domain).
• Can be granted permissions for resources in any domain
  in the forest and in trusted domains in other forests.
• Not replicated outside of their own domain – using them
  minimises replication traffic to the global catalogue.
• Use these for objects that require frequent maintenance.
  (e.g. user or computer accounts)                                   9
Universal groups
• Used mainly to grant access to related resources in
  multiple domains.
  • e.g. if executives need access to printers throughout the network.
• Mainly used to consolidate groups than span multiple




                                                                         Network Design & Administration
  domains – unnecessary in single-domain networks.
• Best practice:
  • Create global group in each domain for user or computer
    accounts, then universal group contains the global groups.
  • Avoids too much replication traffic, since universal group
    membership changes infrequently.

                                                                         10
Global & Domain Local Groups
- Planning
1. Create domain local groups for shared resources
   (e.g. A group for a set of colour printers)
2. Assign resource permissions to domain local
   group (e.g. Whatever permissions needed to use




                                                         Network Design & Administration
   printers)
3. Create Global groups for users with common
   roles (e.g. Accounts or Sales)
4. Add global groups into appropriate domain local
   groups (e.g. To give Sales access to the specialist
                                                         11
   printers)
Permissions
• A privilege granted to a user, group or computer
  to perform a particular action or access a
  particular resource.
• Windows Server 2008 has many different sorts




                                                            Network Design & Administration
  of permissions – most visible are:
  •   File-system – access to files & folders under NTFS.
  •   Share – access to file system and printer shares.
  •   AD – access to Active Directory objects.
  •   Registry – access to registry keys.
                                                            12
• They are all separate/different!
Access Control Lists (ACL)
• An Access Control List is associated to an object being accessed, not
  the object accessing it.
• Lists all permissions that can access that object. (e.g. users, groups,
  etc.)
• Also lists what operations can be done to the object.




                                                                            Network Design & Administration
• List made out of Access Control Entries (ACE’s) (i.e. the name of the
  security principle and the permissions it has been granted)
• Example:
            /home/cmp3robinj/
                 [ACL]                          Access Control Entry
                         (cmp3robinj, read)
                         (cmp3robinj, write)
                         (cmp3robinj, create)
                         (cmp3robinj, delete)
                                                                            13
                         (admins, read)
                         (admins, write)
NTFS Permissions
• Mostly can use Standard permissions for NTFS files
  and folders:
  • Read, Read & Execute, Write, Modify, List Folder
    Contents, Full Control




                                                            Network Design & Administration
• Occasionally need to set up more fine-grained, using
  the 14 NTFS Special Permissions.
  • The Standard permissions are just a convenient
    grouping into most frequently used sets.
• There are slight differences when permissions are
  applied to a file rather than a folder (and List Folder
                                                            14
  Contents is obviously not applicable to files!)
Example Permissions


                Creator Owner is a ‘Special




                                                Network Design & Administration
                User’. Will discuss again
                later.


                Permissions can be
                explicitly Allowed or
                Denied.


                Note: list in this case gives
                Users Read & Execute, List      15
                folder contents and read
                permissions only.
Access to Special Permissions

                        Note that permissions
                        can be inherited from
                        higher folders (not
                        applicable when it’s c: )




                                                    Network Design & Administration
                        To make more detailed
                        changes, need to edit
                        an individual ACE.




                                                    16
Example Permissions Breakdown
    “Read & Execute” is composed of:
        List Folder/Read Data
        Read Attributes




                                                                     Network Design & Administration
        Read Extended Attributes
        Read Permissions
        Synchronise
        Traverse Folder/Execute File
Lets security principals move through     Without this, get “Read”
                                          Standard Permissions.      17
inaccessible folders to reach folders /
files they are allowed to access.
Inheritance Rules for
Permissions
• By default, subordinate objects inherit
  permissions possessed by parent.
 • e.g. if user is granted permission to root of




                                                    Network Design & Administration
   a drive, they have same permission on all
   files and subfolders.
 • Can counteract inheritance by either:
    • Turning off inheritance – when working with
      special permissions.
    • Deny permissions explicitly.                  18
Precedence Rules for Permissions
• Allowed permissions are cumulative:
  • All of the permissions of a security principal
    combine to give the Effective Permissions.
• Denied permissions override Allowed




                                                       Network Design & Administration
  permissions:
  • Explicitly denying permissions overrides Allowed
    from any other source.
• Explicit permissions take precedence over
  inherited permissions
                                                       19
  • So explicitly Allowed override inherited Denied.
Permissions can get complicated!
• As a result, depending on a user’s group membership
  and any permissions given explicitly to that user, get
  combination of all of them!
• Not directly shown in Properties window since it shows




                                                            Network Design & Administration
  separate groups etc.
   • e.g. User cmp3robinj is granted Allow Read & Execute
     on folder ModuleSpecs. But cmp3robinj is also
     member of the Lecturers group, which has been
     granted Allow Full Control and the Everyone group,
     granted Allow Read.
   • Therefore, cmp3robinj has effective permission of      20
     Allow Full Control on this folder.
• Need to use Effective Permissions view.
Effective Permissions
                        Checking on a single
                        folder or file to
                        determine a particular
                        user’s permissions.




                                                  Network Design & Administration
                        Only takes account of
                        NTFS interactions. Does
                        not include effects of
                        Share Permissions or
                        login method.
                                                  21

 Read-only!
Next time & References
• Further different sorts of permissions – including file shares.



[1] Windows Server 2008 Active Directory Resource Kit, page 181-




                                                                    Network Design & Administration
[2] Windows Server 2008 Active Directory Resource Kit, page 368-
369




                                                                    22

More Related Content

What's hot

DDBMS
DDBMSDDBMS
Distributed file systems dfs
Distributed file systems   dfsDistributed file systems   dfs
Distributed file systems dfs
Pragati Startup Presentation Designer firm
 
OPERATING SYSTEMS DESIGN AND IMPLEMENTATION
OPERATING SYSTEMSDESIGN AND IMPLEMENTATIONOPERATING SYSTEMSDESIGN AND IMPLEMENTATION
OPERATING SYSTEMS DESIGN AND IMPLEMENTATION
sathish sak
 
Introduction to distributed file systems
Introduction to distributed file systemsIntroduction to distributed file systems
Introduction to distributed file systems
Viet-Trung TRAN
 
12. End user devices.pptx
12. End user devices.pptx12. End user devices.pptx
12. End user devices.pptx
Sibghatullah585075
 
Distributed Operating Systems
Distributed Operating SystemsDistributed Operating Systems
Distributed Operating Systems
Ummiya Mohammedi
 
PCD - Process control daemon
PCD - Process control daemonPCD - Process control daemon
PCD - Process control daemon
haish
 
DNS over HTTPS
DNS over HTTPSDNS over HTTPS
DNS over HTTPS
Daniel Stenberg
 
11. operating-systems-part-2
11. operating-systems-part-211. operating-systems-part-2
11. operating-systems-part-2
Muhammad Ahad
 
Database fundamentals(database)
Database fundamentals(database)Database fundamentals(database)
Database fundamentals(database)
welcometofacebook
 
Unix architecture | Operating System
Unix architecture | Operating SystemUnix architecture | Operating System
Unix architecture | Operating System
Sumit Pandey
 
Raid
Raid Raid
Ch4 memory management
Ch4 memory managementCh4 memory management
Ch4 memory management
Bullz Musetsho
 
Oracle Tablespace - Basic
Oracle Tablespace - BasicOracle Tablespace - Basic
Oracle Tablespace - Basic
Eryk Budi Pratama
 
Process Synchronization
Process SynchronizationProcess Synchronization
Process Synchronization
Sonali Chauhan
 
File sharing
File sharingFile sharing
File sharing
janani thirupathi
 
Threads in Operating System | Multithreading | Interprocess Communication
Threads in Operating System | Multithreading | Interprocess CommunicationThreads in Operating System | Multithreading | Interprocess Communication
Threads in Operating System | Multithreading | Interprocess Communication
Shivam Mitra
 
Distributed Database Management System
Distributed Database Management SystemDistributed Database Management System
Distributed Database Management System
AAKANKSHA JAIN
 
ditributed databases
ditributed databasesditributed databases
ditributed databases
Hira Awan
 
12. oracle database architecture
12. oracle database architecture12. oracle database architecture
12. oracle database architecture
Amrit Kaur
 

What's hot (20)

DDBMS
DDBMSDDBMS
DDBMS
 
Distributed file systems dfs
Distributed file systems   dfsDistributed file systems   dfs
Distributed file systems dfs
 
OPERATING SYSTEMS DESIGN AND IMPLEMENTATION
OPERATING SYSTEMSDESIGN AND IMPLEMENTATIONOPERATING SYSTEMSDESIGN AND IMPLEMENTATION
OPERATING SYSTEMS DESIGN AND IMPLEMENTATION
 
Introduction to distributed file systems
Introduction to distributed file systemsIntroduction to distributed file systems
Introduction to distributed file systems
 
12. End user devices.pptx
12. End user devices.pptx12. End user devices.pptx
12. End user devices.pptx
 
Distributed Operating Systems
Distributed Operating SystemsDistributed Operating Systems
Distributed Operating Systems
 
PCD - Process control daemon
PCD - Process control daemonPCD - Process control daemon
PCD - Process control daemon
 
DNS over HTTPS
DNS over HTTPSDNS over HTTPS
DNS over HTTPS
 
11. operating-systems-part-2
11. operating-systems-part-211. operating-systems-part-2
11. operating-systems-part-2
 
Database fundamentals(database)
Database fundamentals(database)Database fundamentals(database)
Database fundamentals(database)
 
Unix architecture | Operating System
Unix architecture | Operating SystemUnix architecture | Operating System
Unix architecture | Operating System
 
Raid
Raid Raid
Raid
 
Ch4 memory management
Ch4 memory managementCh4 memory management
Ch4 memory management
 
Oracle Tablespace - Basic
Oracle Tablespace - BasicOracle Tablespace - Basic
Oracle Tablespace - Basic
 
Process Synchronization
Process SynchronizationProcess Synchronization
Process Synchronization
 
File sharing
File sharingFile sharing
File sharing
 
Threads in Operating System | Multithreading | Interprocess Communication
Threads in Operating System | Multithreading | Interprocess CommunicationThreads in Operating System | Multithreading | Interprocess Communication
Threads in Operating System | Multithreading | Interprocess Communication
 
Distributed Database Management System
Distributed Database Management SystemDistributed Database Management System
Distributed Database Management System
 
ditributed databases
ditributed databasesditributed databases
ditributed databases
 
12. oracle database architecture
12. oracle database architecture12. oracle database architecture
12. oracle database architecture
 

Viewers also liked

Windows Remote Management - EN
Windows Remote Management - ENWindows Remote Management - EN
Windows Remote Management - EN
Kirill Nikolaev
 
Chapter05 Managing File Access
Chapter05      Managing  File  AccessChapter05      Managing  File  Access
Chapter05 Managing File Access
Raja Waseem Akhtar
 
Lecture 12 monitoring the network
Lecture 12   monitoring the networkLecture 12   monitoring the network
Lecture 12 monitoring the network
Wiliam Ferraciolli
 
Lecture 3 more on servers and services
Lecture 3   more on servers and servicesLecture 3   more on servers and services
Lecture 3 more on servers and services
Wiliam Ferraciolli
 
Lecture 11 managing the network
Lecture 11   managing the networkLecture 11   managing the network
Lecture 11 managing the network
Wiliam Ferraciolli
 
Lecture 7 naming and structuring objects
Lecture 7   naming and structuring objectsLecture 7   naming and structuring objects
Lecture 7 naming and structuring objects
Wiliam Ferraciolli
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
Novell
 
Active Directory File Permissions. Get Fast Answers to Who? What?
Active Directory File Permissions. Get Fast Answers to Who? What?Active Directory File Permissions. Get Fast Answers to Who? What?
Active Directory File Permissions. Get Fast Answers to Who? What?
SolarWinds
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
Intel IT Center
 
Hacking Microsoft Remote Desktop Services for Fun and Profit
Hacking Microsoft Remote Desktop Services for Fun and ProfitHacking Microsoft Remote Desktop Services for Fun and Profit
Hacking Microsoft Remote Desktop Services for Fun and Profit
Alisa Esage Шевченко
 
Identity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital TransformationIdentity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital Transformation
WSO2
 
Security, Identity, and Access Management - Module 3 Part 1 - AWSome Day 2017
Security, Identity, and Access Management - Module 3 Part 1 - AWSome Day 2017Security, Identity, and Access Management - Module 3 Part 1 - AWSome Day 2017
Security, Identity, and Access Management - Module 3 Part 1 - AWSome Day 2017
Amazon Web Services
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
David J Rosenthal
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
OneLogin
 
Chapter14 Windows Server 2003 Security Features
Chapter14      Windows  Server 2003  Security  FeaturesChapter14      Windows  Server 2003  Security  Features
Chapter14 Windows Server 2003 Security Features
Raja Waseem Akhtar
 
Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directory
thebigredhemi
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
Identacor
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IBM Sverige
 
GraphTalks Rome - Identity and Access Management
GraphTalks Rome - Identity and Access ManagementGraphTalks Rome - Identity and Access Management
GraphTalks Rome - Identity and Access Management
Neo4j
 
SQL Server on Linux - march 2017
SQL Server on Linux - march 2017SQL Server on Linux - march 2017
SQL Server on Linux - march 2017
Sorin Peste
 

Viewers also liked (20)

Windows Remote Management - EN
Windows Remote Management - ENWindows Remote Management - EN
Windows Remote Management - EN
 
Chapter05 Managing File Access
Chapter05      Managing  File  AccessChapter05      Managing  File  Access
Chapter05 Managing File Access
 
Lecture 12 monitoring the network
Lecture 12   monitoring the networkLecture 12   monitoring the network
Lecture 12 monitoring the network
 
Lecture 3 more on servers and services
Lecture 3   more on servers and servicesLecture 3   more on servers and services
Lecture 3 more on servers and services
 
Lecture 11 managing the network
Lecture 11   managing the networkLecture 11   managing the network
Lecture 11 managing the network
 
Lecture 7 naming and structuring objects
Lecture 7   naming and structuring objectsLecture 7   naming and structuring objects
Lecture 7 naming and structuring objects
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
Active Directory File Permissions. Get Fast Answers to Who? What?
Active Directory File Permissions. Get Fast Answers to Who? What?Active Directory File Permissions. Get Fast Answers to Who? What?
Active Directory File Permissions. Get Fast Answers to Who? What?
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
Hacking Microsoft Remote Desktop Services for Fun and Profit
Hacking Microsoft Remote Desktop Services for Fun and ProfitHacking Microsoft Remote Desktop Services for Fun and Profit
Hacking Microsoft Remote Desktop Services for Fun and Profit
 
Identity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital TransformationIdentity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital Transformation
 
Security, Identity, and Access Management - Module 3 Part 1 - AWSome Day 2017
Security, Identity, and Access Management - Module 3 Part 1 - AWSome Day 2017Security, Identity, and Access Management - Module 3 Part 1 - AWSome Day 2017
Security, Identity, and Access Management - Module 3 Part 1 - AWSome Day 2017
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
 
Chapter14 Windows Server 2003 Security Features
Chapter14      Windows  Server 2003  Security  FeaturesChapter14      Windows  Server 2003  Security  Features
Chapter14 Windows Server 2003 Security Features
 
Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directory
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
 
GraphTalks Rome - Identity and Access Management
GraphTalks Rome - Identity and Access ManagementGraphTalks Rome - Identity and Access Management
GraphTalks Rome - Identity and Access Management
 
SQL Server on Linux - march 2017
SQL Server on Linux - march 2017SQL Server on Linux - march 2017
SQL Server on Linux - march 2017
 

Similar to Lecture 8 permissions

Lecture 9 further permissions
Lecture 9   further permissionsLecture 9   further permissions
Lecture 9 further permissions
Wiliam Ferraciolli
 
Creating a fortress in your active directory environment
Creating a fortress in your active directory environmentCreating a fortress in your active directory environment
Creating a fortress in your active directory environment
David Rowe
 
Active directory
Active directoryActive directory
Active directory
Prasanth Menon
 
Security and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web StudioSecurity and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web Studio
AVEVA
 
Active directoryfinal
Active directoryfinalActive directoryfinal
Active directoryfinal
Rafał Kucharski
 
Activedirecotryfundamentals
ActivedirecotryfundamentalsActivedirecotryfundamentals
Activedirecotryfundamentals
Shekhar Singh
 
Windows Network concepts
Windows Network conceptsWindows Network concepts
Windows Network concepts
Duressa Teshome
 
70 640 Lesson05 Ppt 041009
70 640 Lesson05 Ppt 04100970 640 Lesson05 Ppt 041009
70 640 Lesson05 Ppt 041009
Coffeyville Community College
 
Active Directory
Active DirectoryActive Directory
Active Directory
Jessica Henderson
 
Active Directory
Active DirectoryActive Directory
Active Directory
Hameda Hurmat
 
Active-Directory-Domain-Services.pptx
Active-Directory-Domain-Services.pptxActive-Directory-Domain-Services.pptx
Active-Directory-Domain-Services.pptx
JavedAjmal1
 
PowerPoint Presentation
PowerPoint PresentationPowerPoint Presentation
PowerPoint Presentation
webhostingguy
 
Directory Services Nma Unit-1
Directory Services Nma Unit-1Directory Services Nma Unit-1
Directory Services Nma Unit-1
GPAPassedStudents
 
Chapter01 Introduction To Windows Server 2003
Chapter01     Introduction To  Windows  Server 2003Chapter01     Introduction To  Windows  Server 2003
Chapter01 Introduction To Windows Server 2003
Raja Waseem Akhtar
 
Ctive directory interview question and answers
Ctive directory interview question and answersCtive directory interview question and answers
Ctive directory interview question and answers
sankar palla
 
Server 2008 r2 ppt
Server 2008 r2 pptServer 2008 r2 ppt
Server 2008 r2 ppt
Raj Solanki
 
Chapter Two.pptx
Chapter Two.pptxChapter Two.pptx
Chapter Two.pptx
ssuser8347a1
 
Final domain control policy
Final domain control policy  Final domain control policy
Final domain control policy
BhagyashriJadhav16
 
Ads overview-en
Ads overview-enAds overview-en
Ads overview-en
Sandip More
 
Net essentials6e ch9
Net essentials6e ch9Net essentials6e ch9
Net essentials6e ch9
APSU
 

Similar to Lecture 8 permissions (20)

Lecture 9 further permissions
Lecture 9   further permissionsLecture 9   further permissions
Lecture 9 further permissions
 
Creating a fortress in your active directory environment
Creating a fortress in your active directory environmentCreating a fortress in your active directory environment
Creating a fortress in your active directory environment
 
Active directory
Active directoryActive directory
Active directory
 
Security and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web StudioSecurity and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web Studio
 
Active directoryfinal
Active directoryfinalActive directoryfinal
Active directoryfinal
 
Activedirecotryfundamentals
ActivedirecotryfundamentalsActivedirecotryfundamentals
Activedirecotryfundamentals
 
Windows Network concepts
Windows Network conceptsWindows Network concepts
Windows Network concepts
 
70 640 Lesson05 Ppt 041009
70 640 Lesson05 Ppt 04100970 640 Lesson05 Ppt 041009
70 640 Lesson05 Ppt 041009
 
Active Directory
Active DirectoryActive Directory
Active Directory
 
Active Directory
Active DirectoryActive Directory
Active Directory
 
Active-Directory-Domain-Services.pptx
Active-Directory-Domain-Services.pptxActive-Directory-Domain-Services.pptx
Active-Directory-Domain-Services.pptx
 
PowerPoint Presentation
PowerPoint PresentationPowerPoint Presentation
PowerPoint Presentation
 
Directory Services Nma Unit-1
Directory Services Nma Unit-1Directory Services Nma Unit-1
Directory Services Nma Unit-1
 
Chapter01 Introduction To Windows Server 2003
Chapter01     Introduction To  Windows  Server 2003Chapter01     Introduction To  Windows  Server 2003
Chapter01 Introduction To Windows Server 2003
 
Ctive directory interview question and answers
Ctive directory interview question and answersCtive directory interview question and answers
Ctive directory interview question and answers
 
Server 2008 r2 ppt
Server 2008 r2 pptServer 2008 r2 ppt
Server 2008 r2 ppt
 
Chapter Two.pptx
Chapter Two.pptxChapter Two.pptx
Chapter Two.pptx
 
Final domain control policy
Final domain control policy  Final domain control policy
Final domain control policy
 
Ads overview-en
Ads overview-enAds overview-en
Ads overview-en
 
Net essentials6e ch9
Net essentials6e ch9Net essentials6e ch9
Net essentials6e ch9
 

More from Wiliam Ferraciolli

Lecture 10 the user experience
Lecture 10   the user experienceLecture 10   the user experience
Lecture 10 the user experience
Wiliam Ferraciolli
 
Lecture 10 the user experience (1)
Lecture 10   the user experience (1)Lecture 10   the user experience (1)
Lecture 10 the user experience (1)
Wiliam Ferraciolli
 
Lecture 5&6 corporate architecture
Lecture 5&6   corporate architectureLecture 5&6   corporate architecture
Lecture 5&6 corporate architecture
Wiliam Ferraciolli
 
Lecture 4 client workstations
Lecture 4   client workstationsLecture 4   client workstations
Lecture 4 client workstations
Wiliam Ferraciolli
 
Lecture 2 servers and services
Lecture 2   servers and servicesLecture 2   servers and services
Lecture 2 servers and services
Wiliam Ferraciolli
 
Lecture 1 introduction
Lecture 1   introductionLecture 1   introduction
Lecture 1 introduction
Wiliam Ferraciolli
 
Lecture 13, 14 & 15 c# cmd let programming and scripting
Lecture 13, 14 & 15   c# cmd let programming and scriptingLecture 13, 14 & 15   c# cmd let programming and scripting
Lecture 13, 14 & 15 c# cmd let programming and scripting
Wiliam Ferraciolli
 
Isys20261 lecture 14
Isys20261 lecture 14Isys20261 lecture 14
Isys20261 lecture 14
Wiliam Ferraciolli
 
Isys20261 lecture 12
Isys20261 lecture 12Isys20261 lecture 12
Isys20261 lecture 12
Wiliam Ferraciolli
 
Isys20261 lecture 11
Isys20261 lecture 11Isys20261 lecture 11
Isys20261 lecture 11
Wiliam Ferraciolli
 
Isys20261 lecture 10
Isys20261 lecture 10Isys20261 lecture 10
Isys20261 lecture 10
Wiliam Ferraciolli
 
Isys20261 lecture 09
Isys20261 lecture 09Isys20261 lecture 09
Isys20261 lecture 09
Wiliam Ferraciolli
 
Isys20261 lecture 08
Isys20261 lecture 08Isys20261 lecture 08
Isys20261 lecture 08
Wiliam Ferraciolli
 
Isys20261 lecture 07
Isys20261 lecture 07Isys20261 lecture 07
Isys20261 lecture 07
Wiliam Ferraciolli
 
Isys20261 lecture 06
Isys20261 lecture 06Isys20261 lecture 06
Isys20261 lecture 06
Wiliam Ferraciolli
 
Isys20261 lecture 05
Isys20261 lecture 05Isys20261 lecture 05
Isys20261 lecture 05
Wiliam Ferraciolli
 
Isys20261 lecture 04
Isys20261 lecture 04Isys20261 lecture 04
Isys20261 lecture 04
Wiliam Ferraciolli
 
Isys20261 lecture 03
Isys20261 lecture 03Isys20261 lecture 03
Isys20261 lecture 03
Wiliam Ferraciolli
 
Isys20261 lecture 02
Isys20261 lecture 02Isys20261 lecture 02
Isys20261 lecture 02
Wiliam Ferraciolli
 
Isys20261 lecture 01
Isys20261 lecture 01Isys20261 lecture 01
Isys20261 lecture 01
Wiliam Ferraciolli
 

More from Wiliam Ferraciolli (20)

Lecture 10 the user experience
Lecture 10   the user experienceLecture 10   the user experience
Lecture 10 the user experience
 
Lecture 10 the user experience (1)
Lecture 10   the user experience (1)Lecture 10   the user experience (1)
Lecture 10 the user experience (1)
 
Lecture 5&6 corporate architecture
Lecture 5&6   corporate architectureLecture 5&6   corporate architecture
Lecture 5&6 corporate architecture
 
Lecture 4 client workstations
Lecture 4   client workstationsLecture 4   client workstations
Lecture 4 client workstations
 
Lecture 2 servers and services
Lecture 2   servers and servicesLecture 2   servers and services
Lecture 2 servers and services
 
Lecture 1 introduction
Lecture 1   introductionLecture 1   introduction
Lecture 1 introduction
 
Lecture 13, 14 & 15 c# cmd let programming and scripting
Lecture 13, 14 & 15   c# cmd let programming and scriptingLecture 13, 14 & 15   c# cmd let programming and scripting
Lecture 13, 14 & 15 c# cmd let programming and scripting
 
Isys20261 lecture 14
Isys20261 lecture 14Isys20261 lecture 14
Isys20261 lecture 14
 
Isys20261 lecture 12
Isys20261 lecture 12Isys20261 lecture 12
Isys20261 lecture 12
 
Isys20261 lecture 11
Isys20261 lecture 11Isys20261 lecture 11
Isys20261 lecture 11
 
Isys20261 lecture 10
Isys20261 lecture 10Isys20261 lecture 10
Isys20261 lecture 10
 
Isys20261 lecture 09
Isys20261 lecture 09Isys20261 lecture 09
Isys20261 lecture 09
 
Isys20261 lecture 08
Isys20261 lecture 08Isys20261 lecture 08
Isys20261 lecture 08
 
Isys20261 lecture 07
Isys20261 lecture 07Isys20261 lecture 07
Isys20261 lecture 07
 
Isys20261 lecture 06
Isys20261 lecture 06Isys20261 lecture 06
Isys20261 lecture 06
 
Isys20261 lecture 05
Isys20261 lecture 05Isys20261 lecture 05
Isys20261 lecture 05
 
Isys20261 lecture 04
Isys20261 lecture 04Isys20261 lecture 04
Isys20261 lecture 04
 
Isys20261 lecture 03
Isys20261 lecture 03Isys20261 lecture 03
Isys20261 lecture 03
 
Isys20261 lecture 02
Isys20261 lecture 02Isys20261 lecture 02
Isys20261 lecture 02
 
Isys20261 lecture 01
Isys20261 lecture 01Isys20261 lecture 01
Isys20261 lecture 01
 

Lecture 8 permissions

  • 2. Group Types • When defining a group, need to consider its type. • This will dictate what it can and cannot do (i.e. security and permissions of group). • Four basic types of groups: • Distribution groups Network Design & Administration • Security groups • Application basic groups • LDAP query groups • Administrators mostly use security groups to specify what permissions the group has when interacting with a resource. • Distribution groups are used when limited access to a resource is required (e.g. used extensively in MS Exchange Server for sending emails to groups) 2
  • 3. Groups Scope • Groups have a Scope. • Depending on its scope, a group can be assigned permissions to different extents in the domain structure. • There are three types of scope: • Domain Local Network Design & Administration • Global • Universal • Group scope is affected by the Functional Level of the domain in which it exists. • The functional level of a domain is dictated by the lowest version of windows server running as a domain controller within the domain. • This can also dictate the functional level of a forest. 3
  • 4. Domain Functional Levels[1] • Limits what functionality domain controllers offer within the domain. • All functional levels provide the default Active Directory Domain Services feature set plus additional features depending on the operating system. Functional Level Features[1] Windows 2000 Native Universal groups enabled for distribution and Network Design & Administration security groups; group nesting; group conversion; SID history. Windows Server 2003 Domain rename; last logon timestamp; password setting on inetOrgPerson / User objects; redirect users/computers containers; authorisation manager policies; constrained delegation; selective authorisation. Windows Server 2008 Distributed File System replication of SYSVOL; Advanced Encryption Services for Kerberos; interactive logon info; fine-grained password 4 policies Windows Server 2008 R2 Active Directory domain recycle bin.
  • 5. Forest Functional Levels[1] • Functional levels impact the forest functional level. • Each Server version adds more features to basic forest functionality. Forest Functional Level Features[1] Network Design & Administration Windows 2000 Default AD feature set Windows Server 2003 Forest trust; domain rename; linked value replication; Read-only domain controllers (RODC); improved knowledge consistency checker; dynamic objects; deactivation/redefinition of attributes and classes in schema. Windows Server 2008 No additional forest level features; will default to a Server 2008 FL instead of a 2003 FL. 5 Windows Server 2008 R2
  • 6. Group Scope Revisited![2] • Scope can be domain local, global, or universal. Group Scope Group Membership Can Include[2] Can be used to [2] Domain Local User accounts from any domain in the Assign access to resources forest; global groups or universal groups only in the local domain; on from any domain in the forest; user all servers in domain Network Design & Administration accounts or global or universal groups running Windows Server from any domain in trusted forest; 2000/2003/2008. nested domain local groups from the local domain. Global User accounts from the domain where Assign access to resources in the group is created; nested global all domains in forest or groups from the local domain. between trusted forests; member servers running Windows Server. Universal User accounts from any domain in Assign access to resources in 6 forest; global groups from any domain all domains in forest or in forest; nested universal groups from between trusted forests; on any domain in forest. all servers running 2000 +
  • 7. Why? • Allows different groups different degrees of permission when included within each other. • Different sorts of objects are allowed membership of different group types (scopes) Network Design & Administration • Remember, this applies to security groups. Distribution groups, as mentioned previously, only relate to directory-aware applications (e.g. MS Exchange) • Since security groups can also be used as distribution groups, often don’t bother with the 7 latter.
  • 8. Domain Local Groups • Available even in lower domain functional levels. • Typically assigned permissions to resources. (e.g. shared folder or printer) • Then allows easier group nesting Network Design & Administration • Can also be used to group users from the same domain needing the same permissions to access a resource in the same domain. • Can only be used to assign permissions to resources in the domain in which they were created (the meaning of domain local!) • See table for permitted membership. 8
  • 9. Global groups • Often used to gather users or computers together in the same domain with same role or function, or requiring similar access requirements. • Can only include members from within their own domain Network Design & Administration (including other global groups from the same domain). • Can be granted permissions for resources in any domain in the forest and in trusted domains in other forests. • Not replicated outside of their own domain – using them minimises replication traffic to the global catalogue. • Use these for objects that require frequent maintenance. (e.g. user or computer accounts) 9
  • 10. Universal groups • Used mainly to grant access to related resources in multiple domains. • e.g. if executives need access to printers throughout the network. • Mainly used to consolidate groups than span multiple Network Design & Administration domains – unnecessary in single-domain networks. • Best practice: • Create global group in each domain for user or computer accounts, then universal group contains the global groups. • Avoids too much replication traffic, since universal group membership changes infrequently. 10
  • 11. Global & Domain Local Groups - Planning 1. Create domain local groups for shared resources (e.g. A group for a set of colour printers) 2. Assign resource permissions to domain local group (e.g. Whatever permissions needed to use Network Design & Administration printers) 3. Create Global groups for users with common roles (e.g. Accounts or Sales) 4. Add global groups into appropriate domain local groups (e.g. To give Sales access to the specialist 11 printers)
  • 12. Permissions • A privilege granted to a user, group or computer to perform a particular action or access a particular resource. • Windows Server 2008 has many different sorts Network Design & Administration of permissions – most visible are: • File-system – access to files & folders under NTFS. • Share – access to file system and printer shares. • AD – access to Active Directory objects. • Registry – access to registry keys. 12 • They are all separate/different!
  • 13. Access Control Lists (ACL) • An Access Control List is associated to an object being accessed, not the object accessing it. • Lists all permissions that can access that object. (e.g. users, groups, etc.) • Also lists what operations can be done to the object. Network Design & Administration • List made out of Access Control Entries (ACE’s) (i.e. the name of the security principle and the permissions it has been granted) • Example: /home/cmp3robinj/ [ACL] Access Control Entry (cmp3robinj, read) (cmp3robinj, write) (cmp3robinj, create) (cmp3robinj, delete) 13 (admins, read) (admins, write)
  • 14. NTFS Permissions • Mostly can use Standard permissions for NTFS files and folders: • Read, Read & Execute, Write, Modify, List Folder Contents, Full Control Network Design & Administration • Occasionally need to set up more fine-grained, using the 14 NTFS Special Permissions. • The Standard permissions are just a convenient grouping into most frequently used sets. • There are slight differences when permissions are applied to a file rather than a folder (and List Folder 14 Contents is obviously not applicable to files!)
  • 15. Example Permissions Creator Owner is a ‘Special Network Design & Administration User’. Will discuss again later. Permissions can be explicitly Allowed or Denied. Note: list in this case gives Users Read & Execute, List 15 folder contents and read permissions only.
  • 16. Access to Special Permissions Note that permissions can be inherited from higher folders (not applicable when it’s c: ) Network Design & Administration To make more detailed changes, need to edit an individual ACE. 16
  • 17. Example Permissions Breakdown “Read & Execute” is composed of: List Folder/Read Data Read Attributes Network Design & Administration Read Extended Attributes Read Permissions Synchronise Traverse Folder/Execute File Lets security principals move through Without this, get “Read” Standard Permissions. 17 inaccessible folders to reach folders / files they are allowed to access.
  • 18. Inheritance Rules for Permissions • By default, subordinate objects inherit permissions possessed by parent. • e.g. if user is granted permission to root of Network Design & Administration a drive, they have same permission on all files and subfolders. • Can counteract inheritance by either: • Turning off inheritance – when working with special permissions. • Deny permissions explicitly. 18
  • 19. Precedence Rules for Permissions • Allowed permissions are cumulative: • All of the permissions of a security principal combine to give the Effective Permissions. • Denied permissions override Allowed Network Design & Administration permissions: • Explicitly denying permissions overrides Allowed from any other source. • Explicit permissions take precedence over inherited permissions 19 • So explicitly Allowed override inherited Denied.
  • 20. Permissions can get complicated! • As a result, depending on a user’s group membership and any permissions given explicitly to that user, get combination of all of them! • Not directly shown in Properties window since it shows Network Design & Administration separate groups etc. • e.g. User cmp3robinj is granted Allow Read & Execute on folder ModuleSpecs. But cmp3robinj is also member of the Lecturers group, which has been granted Allow Full Control and the Everyone group, granted Allow Read. • Therefore, cmp3robinj has effective permission of 20 Allow Full Control on this folder. • Need to use Effective Permissions view.
  • 21. Effective Permissions Checking on a single folder or file to determine a particular user’s permissions. Network Design & Administration Only takes account of NTFS interactions. Does not include effects of Share Permissions or login method. 21 Read-only!
  • 22. Next time & References • Further different sorts of permissions – including file shares. [1] Windows Server 2008 Active Directory Resource Kit, page 181- Network Design & Administration [2] Windows Server 2008 Active Directory Resource Kit, page 368- 369 22