Introduction
In many environments the network or domain administrator will use the default, built-in groups, to provide the ability to perform these tasks. These built-in groups include groups like Backup Operators, Server Operators, and Group Policy Creator Owners. Although these groups provide the privileges to get the tasks done, they might provide too much access. As an alternative to using these groups, there is a new way of providing the privileges required to complete these tasks. This method uses a feature of Active Directory that bypasses the need to use the built-in groups. The method is called Delegation of Administration, or just Delegation. This article will compare and contrast the two methods. There are distinct advantages in using one method over the other, depending on what the desired result is.Built-in Groups
There are plenty of built-in groups to choose from, so I want to make sure that I categorize the groups to see if we are on the same page. There are some groups which are used for administration of Active Directory, services, and other important directory service features. These groups are located in the Users container, as shown in Figure 1. These groups include:- Cert Publishers
- DNSAdmins
- Domain Admins
- DHCP Admins
- Enterprise Admins
- Group Policy Creator Owners
- Schema Admins
Another category of built-in groups fall under a different place in the Active Directory. They are located in the Builtin container, as shown in Figure 2.
These groups include:
- Administrators
- Account Operators
- Backup Operators
- Server Operators
- Print Operators
Scope and Common Uses of the Built-in Groups
The built-in groups have a very distinct scope. They are designed to be used on the domain controllers and the domain controllers only. We know this because all of these groups are Domain Local (Local in Windows NT). This means that they are to be used to provide privileges to administrators that need to perform tasks on the domain controllers.Another way to confirm this is that each local Security Accounts Manager (SAM) on the clients and servers have their own local built-in groups to perform these duties. The Administrators and Backup Operators groups are in every SAM. The other groups are not needed on the local SAM, because the Administrators group or Power Users group provides the privilege to accomplish the associated tasks on a client or server.
It is important to not only know the scope of these built-in groups, but also the capabilities of these groups. Table 1 lists what each group can do.
It is important to not only know the scope of these built-in groups, but also the capabilities of these groups. Table 1 lists what each group can do.
Administrators
|
Account Operators
|
Backup Operators
|
Print Operators
|
Server Operators
| |
Create, delete, and manage user and group accounts |
X
|
X
|
|||
Read all user information
|
X
|
X
|
X
| ||
Reset password for user accounts
|
X
|
X
|
|||
Share directories
|
X
|
X
| |||
Create, delete, and manage printers
|
X
|
X
|
X
| ||
Backup files and directories
|
X
|
X
|
X
| ||
Restore files and directories
|
X
|
X
|
X
| ||
Log on locally
|
X
|
X
|
X
|
X
|
X
|
Shut down the system
|
X
|
X
|
X
|
X
|
X
|
For example, it is common to want to have a junior administrator or the helpdesk staff to reset passwords for users in the domain. With the built-in groups, you would simply add them to the Account Operators group to accomplish this. However, take a look at the other privileges that this membership provides them. They can also perform all of the following tasks:
- Create, delete, and manage user accounts
- Create, delete, and manage group accounts
- Log on locally
- Shut down the system
Another key point about our example is to consider which user accounts they would be able to reset the password for. If you give a user membership in the Account Operators group, they will be able to reset the password for the following users:
- Administrator account
- All IT staff
- Executives
- HR personnel
Delegation of Administration
Delegation is one of the primary reasons that companies and administrators want to move to Active Directory. The old methods of providing privileges to administrators are too clumsy and provides too large of a scope of influence. Delegation solves all of these problems by allowing granular assignment of privileges within Active Directory. There are really two different concepts that are associated with the “granularity” that delegation provides.- Delegation provides the ability to narrow down the privilege to specific tasks and responsibilities. If the privilege is associated with an object or account, the granularity can be down to the property level of the object or account.
- Delegation allows for scoping of the privilege within Active Directory. This means that an administrator can be given control over some of the objects and accounts in Active Directory, but not all of them.
Microsoft helps you complete the delegation by providing you with a Delegation of Control Wizard, as seen in Figure 3
This wizard takes you through the following steps, allowing you to easily establish the privileges and control that you desire for administrators over objects and accounts within Active Directory.
- You select the location within Active Directory where you want to delegate privileges (this is typically done at the Organizational Unit (OU) level)
- You select which groups you want to give the delegated privileges to.
- You select from a list of “Common tasks” (shown in Figure 4), or from a list of “Custom tasks.” The custom tasks are nothing more than a lengthy list of all permissions that can be assigned to the different objects within Active Directory.
Common Uses for Delegation of Administration
Delegation is used throughout Active Directory and is a very powerful and efficient way to provide targeted privileges. Remember, delegation not only targets a specific task, but it also targets a specific set of objects or accounts within Active Directory.The most common use of delegation is to provide administration over user and group accounts within Active Directory. The delegation is best used when the Active Directory design (particularly the design and organization of OUs) takes into consideration where delegation will be configured. Here are some common tasks that are delegated:
- Resetting passwords for a specific set of user accounts
- Creation of user accounts within a specific OU
- Privilege to read user information for a set of user accounts
- Creating group accounts within a specific OU
- Managing group membership for a specific set of group accounts
- Adding workstation to a specific OU
- Linking GPOs to specific OUs
- Management of printers within a specific OU
- Management of shared folders within a specific OU