|
Article ID: 817433 - View products that this article applies to. System TipThis article applies to a different version of Windows than the one you are using. Content in this article may not be relevant to you.Visit the Windows 7 Solution Center On This PageSYMPTOMS After you upgrade to Microsoft Windows Server 2003, you may
experience the following symptoms:
327825
(http://support.microsoft.com/kb/327825/
)
New
resolution for problems with Kerberos authentication when users belong to many groups
CAUSEWhen you delegate permissions using the Delegation of
Control wizard, these permissions rely on the user object that inherits the
permissions from the parent container. Members of protected groups do not
inherit permissions from the parent container. Therefore, if you set
permissions using the Delegation of Control wizard, these permissions are not
applied to members of protected groups. Note Membership in a protected group is defined as either direct membership or transitive membership using one or more security or distribution groups. Distribution groups are included because they can be converted to security groups. In Windows Server 2003, the number of groups that are protected has been increased to enhance security in Active Directory (see the "More Information" section). The number of groups that are protected also increases if you apply the 327825 hotfix to Windows 2000. RESOLUTIONTo resolve this problem, you can install a hotfix. You must
install the hotfix on the domain controller that holds the primary domain
controller (PDC) emulator operations master role in each domain. Additionally,
you must install the hotfix on all domain controllers that you might use to
take over this role if the current PDC emulator operations master role holder
becomes unavailable. If you are not sure of the domain controller you would use
to take over the role, we recommend that you consider installing the hotfix on
all domain controllers. If a domain controller without the hotfix assumes the
PDC emulator operations master role, the user's permissions will be reset
again. Windows 2000 hotfix informationA supported hotfix is available from Microsoft. However, this hotfix is intended to correct only the problem that is described in this article. Apply this hotfix only to systems that are experiencing this specific problem.If the hotfix is available for download, there is a "Hotfix download available" section at the top of this Knowledge Base article. If this section does not appear, submit a request to Microsoft Customer Service and Support to obtain the hotfix. Note If additional issues occur or if any troubleshooting is required, you might have to create a separate service request. The usual support costs will apply to additional support questions and issues that do not qualify for this specific hotfix. For a complete list of Microsoft Customer Service and Support telephone numbers or to create a separate service request, visit the following Microsoft Web site: http://support.microsoft.com/contactus/?ws=support Note The "Hotfix download available" form displays the languages for which the hotfix is available. If you do not see your language, it is because a hotfix is not available for that language.
(http://support.microsoft.com/contactus/?ws=support)
Restart requirementYou must restart the computer after you apply this hotfix.Hotfix replacement informationThis hotfix does not replace any other hotfixes.File informationThe English version of this hotfix has the file attributes (or later file attributes) that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). When you view the file information, it is converted to local time. To find the difference between UTC and local time, use the Time Zone tab in the Date and Time item in Control Panel.Date Time Version Size File name ---------------------------------------------------------- 24-Mar-2004 02:17 5.0.2195.6876 388,368 Advapi32.dll 24-Mar-2004 02:17 5.0.2195.6866 69,904 Browser.dll 24-Mar-2004 02:17 5.0.2195.6824 134,928 Dnsapi.dll 24-Mar-2004 02:17 5.0.2195.6876 92,432 Dnsrslvr.dll 24-Mar-2004 02:17 5.0.2195.6883 47,888 Eventlog.dll 24-Mar-2004 02:17 5.0.2195.6890 143,632 Kdcsvc.dll 11-Mar-2004 02:37 5.0.2195.6903 210,192 Kerberos.dll 21-Sep-2003 00:32 5.0.2195.6824 71,888 Ksecdd.sys 11-Mar-2004 02:37 5.0.2195.6902 520,976 Lsasrv.dll 25-Feb-2004 23:59 5.0.2195.6902 33,552 Lsass.exe 19-Jun-2003 20:05 5.0.2195.6680 117,520 Msv1_0.dll 24-Mar-2004 02:17 5.0.2195.6897 312,592 Netapi32.dll 19-Jun-2003 20:05 5.0.2195.6695 371,984 Netlogon.dll 10-Aug-2004 00:17 5.0.2195.6966 933,648 Ntdsa.dll 24-Mar-2004 02:17 5.0.2195.6897 388,368 Samsrv.dll 24-Mar-2004 02:17 5.0.2195.6893 111,376 Scecli.dll 24-Mar-2004 02:17 5.0.2195.6903 253,200 Scesrv.dll 04-Jun-2004 23:13 5.0.2195.6935 5,887,488 Sp3res.dll 24-Mar-2004 02:17 5.0.2195.6824 50,960 W32time.dll 21-Sep-2003 00:32 5.0.2195.6824 57,104 W32tm.exe Windows Server 2003 service pack informationTo resolve this problem, obtain the latest service pack for Windows Server 2003. For more information, click the following article number to view the article in the Microsoft Knowledge Base:889100
(http://support.microsoft.com/kb/889100/
)
How to obtain the latest service pack for Windows Server 2003
Windows Server 2003 hotfix informationA supported hotfix is available from Microsoft. However, this hotfix is intended to correct only the problem that is described in this article. Apply this hotfix only to systems that are experiencing this specific problem. This hotfix might receive additional testing. Therefore, if you are not severely affected by this problem, we recommend that you wait for the next software update that contains this hotfix.If the hotfix is available for download, there is a "Hotfix download available" section at the top of this Knowledge Base article. If this section does not appear, contact Microsoft Customer Service and Support to obtain the hotfix. Note If additional issues occur or if any troubleshooting is required, you might have to create a separate service request. The usual support costs will apply to additional support questions and issues that do not qualify for this specific hotfix. For a complete list of Microsoft Customer Service and Support telephone numbers or to create a separate service request, visit the following Microsoft Web site: http://support.microsoft.com/contactus/?ws=support Note The "Hotfix download available" form displays the languages for which the hotfix is available. If you do not see your language, it is because a hotfix is not available for that language.
The English version of this hotfix has the file attributes (or later file attributes) that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). When you view the file information, it is converted to local time. To find the difference between UTC and local time, use the Time Zone tab in the Date and Time item in Control Panel.
(http://support.microsoft.com/contactus/?ws=support)
Restart requirementYou must restart the computer after you apply this hotfix.Hotfix replacement informationThis hotfix does not replace any other hotfixes.File informationWindows Server 2003, 32-bit editionsDate Time Version Size File name -------------------------------------------------------- 02-Nov-2004 01:26 5.2.3790.229 1,532,416 Ntdsa.dll 02-Nov-2004 01:26 5.2.3790.212 32,768 Ntdsatq.dll 19-Sep-2004 11:41 5.2.3790.212 59,392 Ws03res.dll Windows Server 2003, 64-bit editionsDate Time Version Size File name Platform ------------------------------------------------------------------- 02-Nov-2004 01:21 5.2.3790.229 4,057,088 Ntdsa.dll IA-64 02-Nov-2004 01:21 5.2.3790.212 82,432 Ntdsatq.dll IA-64 19-Sep-2004 09:43 5.2.3790.212 58,880 Ws03res.dll IA-64 19-Sep-2004 11:41 5.2.3790.212 59,392 Wws03res.dll x86
To enable the new functionality, you must modify an object in the configuration container. This setting is forest wide. To modify the object, follow these steps:
WORKAROUNDTo work around this problem, use one of the following
methods. Method 1: Make sure members are not members of a protected groupIf you use permissions that are delegated at the organizational unit level, make sure that all users who require the delegated permissions are not members of one of the protected groups. For users who were previously members of a protected group, the inheritance flag is not automatically reset when the user is removed from a protected group. To do this, you can use the following script.Note This script checks the inheritance flag for all users whose AdminCount is set to 1. If inheritance is disabled (SE_DACL_PROTECTED is set), the script will enable inheritance. If inheritance is already enabled, inheritance will remain enabled. Additionally, AdminCount will be reset to 0. When the adminSDHolder thread runs again, it will disable inheritance and set AdminCount to 1 for all users who remain in protected groups. Therefore, AdminCount and inheritance are set correctly for all users who are no longer members of protected groups. Use the following command to run the script: cscript /nologo resetaccountsadminsdholder.vbs Microsoft
provides programming examples for illustration only, without warranty either
expressed or implied. This includes, but is not limited to, the implied
warranties of merchantability or fitness for a particular purpose. This article
assumes that you are familiar with the programming language that is being
demonstrated and with the tools that are used to create and to debug
procedures. Microsoft support engineers can help explain the functionality of a
particular procedure, but they will not modify these examples to provide added
functionality or construct procedures to meet your specific requirements.
ldifde -f Admincount-1.txt -d dc=your
domain -r "(&(objectcategory=person)(objectclass=user)(admincount=1))" Review the output file to confirm that all users
who will have the DACL protected bit cleared will have the correct
permissions with inherited access controlled entries (ACEs) only. This method
is preferred and does not weaken existing security.Method 2: Enable inheritance on the adminSDHolder containerIf you enable inheritance on the adminSDHolder container, all members of the protected groups have inherited permissions enabled. In terms of security functionality, this method reverts the behavior of the adminSDHolder container back to the pre-Service Pack 4 functionality.Enabling inheritance on the adminSDHolder containerIf you enable inheritance on the adminSDHolder container, one of the two protective access control list (ACL) mechanisms is disabled. The default permissions are applied. However, all members of protected groups inherit permissions from the organizational unit and any parent organizational units if inheritance is enabled at the organizational unit level.To provide inheritance protection for administrative users, move all administrative users (and other users who require inheritance protection) to their own organizational unit. At the organizational unit level, remove inheritance and then set the permissions to match the current ACLs on the adminSDHolder container. Because the permissions on the adminSDHolder container may vary (for example, Microsoft Exchange Server adds some permissions or the permissions may have been modified), review a member of a protected group for the current permissions on the adminSDHolder container. Be aware that the user interface (UI) does not display all permissions on the adminSDHolder container. Use DSacls to view all permissions on the adminSDHolder container. You can enable inheritance on the adminSDHolder container by using ADSI Edit or Active Directory Users and Computers. The path of the adminSDHolder container is CN=adminSDHolder,CN=System,DC=<MyDomain>,DC=<Com> Note If you use Active Directory Users and Computers, make sure that Advanced Features is selected on the View menu. To enable inheritance on the adminSDHolder container:
Method 3: Avoid inheritance and only change ACLsIf you do not want users who are members of Protected Groups to inherit permissions from the container that the users reside in, and you only want to change the security on the user objects, you can edit the security on the adminSDHolder container directory. In this scenario, you do not have to enable Inheritance on the adminSDHolder container. You only have to add that group or edit the security of the security groups that are already defined on the adminSDHolder container. After one hour, the SDProp thread will apply the change made to the ACLs of the adminSDHolder container to all the members of protected groups. The members will not inherit the security of the container they reside in.For example, the Self account requires the Allow to Read All Properties right. Edit the adminSDHolder container security settings to allow this right on the Self account. After one hour, this right will be allowed to the Self account for all users who are members of protected groups. The Inheritance flag is not changed. The following example demonstrates how to apply changes onto the adminSDHolder object only. This example grants the following permissions on the adminSDHolder object:
232199
(http://support.microsoft.com/kb/232199/
)
Description and update of the Active Directory adminSDHolder object
318180
(http://support.microsoft.com/kb/318180/
)
AdminSDHolder thread affects transitive members of distribution groups
STATUSMicrosoft has confirmed that this is a problem in the Microsoft products that are listed in the "Applies to" section. This problem was first corrected in Windows Server 2003 Service Pack 1. MORE INFORMATIONActive Directory uses a protection mechanism to make sure
that ACLs are set correctly for members of sensitive groups. The mechanism runs
one time an hour on the PDC operations master. The operations master compares
the ACL on the user accounts that are members of protected groups against the
ACL on the following object: CN=adminSDHolder,CN=System,DC=<MyDomain>,DC=<Com> Note "DC=<MyDomain>,DC=<Com>" represents the distinguished name (DN) of your domain. If the ACL is different, the ACL on the user object is overwritten to reflect the security settings of the adminSDHolder object (and ACL inheritance is disabled). This process protects these accounts from being modified by unauthorized users if the accounts are moved to a container or organizational unit where a malicious user has been delegated administrative credentials to modify user accounts. Be aware that when a user is removed from the administrative group, the process is not reversed and must be manually changed. Note To control the frequency at which the adminSDHolder object updates security descriptors, create or modify the AdminSDProtectFrequency entry in the following registry subkey: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Parameters The following list describes the protected groups in Windows 2000:
The following list describes the protected groups in Windows Server 2003 and in Windows 2000 after you apply the 327825 hotfix or you install Windows 2000 Service Pack 4:
For more information about delegated administration, download the Best Practices for Delegating Active Directory Administration white paper. To do this, visit the following Microsoft Web site: http://www.microsoft.com/downloads/details.aspx?familyid=631747a3-79e1-48fa-9730-dae7c0a1d6d3&displaylang=en
(http://www.microsoft.com/downloads/details.aspx?familyid=631747a3-79e1-48fa-9730-dae7c0a1d6d3&displaylang=en)
PropertiesArticle ID: 817433 - Last Review: 20 April 2009 - Revision: 24.0 APPLIES TO
|
Contact us for more help |

