Results 1 to 5 of 5

Thread: Giving access to AD user attribute read/write

  1. #1
    Drazen Guest

    Giving access to AD user attribute read/write


    Hi,

    We have to give the permission to read/write msIIS-FTPDir and msIIS-
    FTPRoot AD user attributes for all users under an OU (or to all users
    belonging in a security group) to a particular AD user.
    How can this be accomplished?

    Regards,
    Drazen

  2. #2
    Florian Frommherz [MVP] Guest

    Re: Giving access to AD user attribute read/write

    Howdie!

    Drazen wrote:
    > We have to give the permission to read/write msIIS-FTPDir and msIIS-
    > FTPRoot AD user attributes for all users under an OU (or to all users
    > belonging in a security group) to a particular AD user.
    > How can this be accomplished?


    The easiest way to do that is right-click the target OU and choose
    "Delegation of Control...". A wizard starts. You can then go select the
    priviledged AD user account you want to give permissions to and create
    custom tasks you want to delegate to that user. One of the options is to
    select AD attribute the user is allowed to read/write to.

    That is one method. Others involve "Active Directory Users and
    Computers" with "Advanced Features" view enabled or ADSIEdit both with
    the Security Tab of the OU.

    Cheers,
    Florian

  3. #3
    Drazen Guest

    Re: Giving access to AD user attribute read/write

    On Feb 22, 11:39 am, "Florian Frommherz [MVP]"
    <flor...@frickelsoft.net> wrote:
    > Howdie!
    >
    > Drazen wrote:
    > > We have to give the permission to read/write msIIS-FTPDir and msIIS-
    > > FTPRoot AD user attributes for all users under an OU (or to all users
    > > belonging in a security group) to a particular AD user.
    > > How can this be accomplished?

    >
    > The easiest way to do that is right-click the target OU and choose
    > "Delegation of Control...". A wizard starts. You can then go select the
    > priviledged AD user account you want to give permissions to and create
    > custom tasks you want to delegate to that user. One of the options is to
    > select AD attribute the user is allowed to read/write to.
    >
    > That is one method. Others involve "Active Directory Users and
    > Computers" with "Advanced Features" view enabled or ADSIEdit both with
    > the Security Tab of the OU.
    >
    > Cheers,
    > Florian


    Florian, thank you for your answer.
    I have tried what you said, however after I tried to use Delegation
    wizard on OU and came to "Permissions" part, I could choose "General",
    "Property-specific", "Creation/deletion of specific objects". Choosing
    any or all of those options hasnt exposed the needed attributes (msIIS-
    FTPDir and msIIS-FTPRoot), they are just not here on the list. I am
    able to set security on a specific user in that OU in a way to grant
    read/write on needed attributes, by visiting Security tab of specific
    user.
    So for now I can only do this user-by-user which is not an option for
    me.

    Regards,
    Drazen

  4. #4
    Florian Frommherz Guest

    Re: Giving access to AD user attribute read/write

    Howdie!

    Am 22.02.2010 17:06, schrieb Drazen:
    > Florian, thank you for your answer.
    > I have tried what you said, however after I tried to use Delegation
    > wizard on OU and came to "Permissions" part, I could choose "General",
    > "Property-specific", "Creation/deletion of specific objects". Choosing
    > any or all of those options hasnt exposed the needed attributes (msIIS-
    > FTPDir and msIIS-FTPRoot), they are just not here on the list. I am
    > able to set security on a specific user in that OU in a way to grant
    > read/write on needed attributes, by visiting Security tab of specific
    > user.
    > So for now I can only do this user-by-user which is not an option for
    > me.


    Did you actually turn on the "Advanced Features" in ADUC? If so, you
    should be able to select the attributes when activating "Property specific".

    Cheers,
    Florian

  5. #5
    Drazen Guest

    Re: Giving access to AD user attribute read/write


    Indeed I have. However the needed attributes (msIIS-FTPDir and msIIS-
    FTPRoot) are only on user level, not on OU or security group level.

    Regards,
    Drazen

    On Feb 22, 10:48 pm, Florian Frommherz
    <flor...@LEAVETHISOUT.frickelsoft.net> wrote:
    > Howdie!
    >
    > Am 22.02.2010 17:06, schrieb Drazen:
    >
    > > Florian, thank you for your answer.
    > > I have tried what you said, however after I tried to use Delegation
    > > wizard on OU and came to "Permissions" part, I could choose "General",
    > > "Property-specific", "Creation/deletion of specific objects". Choosing
    > > any or all of those options hasnt exposed the needed attributes (msIIS-
    > > FTPDir and msIIS-FTPRoot), they are just not here on the list. I am
    > > able to set security on a specific user in that OU in a way to grant
    > > read/write on needed attributes, by visiting Security tab of specific
    > > user.
    > > So for now I can only do this user-by-user which is not an option for
    > > me.

    >
    > Did you actually turn on the "Advanced Features" in ADUC? If so, you
    > should be able to select the attributes when activating "Property specific".
    >
    > Cheers,
    > Florian



Similar Threads

  1. Replies: 5
    Last Post: 09-04-2011, 08:18 AM
  2. Replies: 3
    Last Post: 30-11-2010, 05:55 AM
  3. Cannot uninstall programs due to Read Only attribute
    By ComPaCt in forum Operating Systems
    Replies: 5
    Last Post: 14-05-2009, 03:30 PM
  4. Change Read-Only Attribute
    By William Colls in forum Vista Help
    Replies: 2
    Last Post: 18-02-2008, 05:53 AM
  5. Cannot Remove Read-Only Attribute
    By vshori in forum Small Business Server
    Replies: 2
    Last Post: 12-05-2007, 03:23 AM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,713,540,659.16639 seconds with 17 queries