Users are part of any network and while sometimes troublesome, it’s the responsibility of the IT admin team to ensure that users can access only the resources necessary to perform their roles. The receptionist has no need to access software project data and software developers have no interest in HR resources. Therefore, user permissions are necessary.
GDPR regulations in the EU are a prime example of the new demand on organizations to become more accountable for how they secure personal data. More info can be found in our GDPR Overview.
In smaller organizations, setting user permissions in Windows for network objects is achieved using Windows Explorer, simply right click on a file, folder, volume or device and permissions can be changed if the user has admin control. In this rudimentary example, the ability to read, write and modify file or folder permissions is assigned and a valid user can easily be added with the correct permissions. No big deal, right?
Now, imagine that there are 100 servers, thousands of users and several different domains to handle. A trivial exercise in user permission assignment is now almost insurmountable. How can you assign desired user permissions to an individual account, prevent access to specified domains while still allowing access to MySQL databases, for example?
This is where Active Directory Domain Services comes in (those in the know just say “AD”) and allows a trained administrator to manage everything from one dashboard. Before delving into Active Directory user permissions in a little more detail, it is worth explaining AD.
Active Directory first made an appearance a beta release in Windows 2000. After nearly two decades, it has evolved (with Windows Server 2016 incorporating the latest version) along with the demand for scalability in today’s network architecture, whether that involves physical equipment or virtual solutions.
But, what is Active Directory? It’s a network operating system (NOS) and from a class of products known as Directory Services. In a Windows environment, AD is used, even if other products are also selected. It may not seem like it, but at its core it performs like a database, allowing admins to manage all information, about users, groups, printers and any other devices or objects connected to the network. In addition, of course, it also includes a hierarchy for distinguishing users and admins.
Like any other advance software, AD has its terminology, and these must be understood before creating or importing users in Active Directory. These terms include but are not limited to:
User permissions for all network objects (on all controlled domains) are also managed from AD and adequate admin training in this area can reduce security risks, help ensure compliance with relevant regulations and improve efficiency.
User permissions are not new and we’re all used to the traditional login and username combo to access services. Whether it’s a permission set (Salesforce), actions menu (Oracle), execute permission (Linux) or the ability to assign permissions (Microsoft Dynamics NAV), the terminology used is irrelevant; these companies are enforcing identity management policies.
When it comes to workstations, many companies rely on a local login and password to grant user access. However, with Active Directory, thanks to its domain controllers, a user can log into any machine and connect remotely to a resource if permissions are verified for the object and domain. In short, access is granted by the domain and not a local machine policy.
All users require a domain-controlled account to access the network. As it should be, considering that companies must protect their infrastructure and data from cyber-attacks.
Active Directory admins typically create a new user by selecting one of three methods:
Import-Module ActiveDirectory
Whether you use ADAC, ADUC, or PowerShell (used a lot for automation) to create a new AD user account, setting permissions is normally the next step.
Since 2008, Active Directory admins have predominantly used ADAC and PowerShell to modify user permissions. Unlike local policies, domain-controlled permissions are not as simple, but all methods adhere to the same AD features.
For example, the administrator creates a new user to provide a new gender-neutral robot employee with the necessary access permissions to fulfil the role.
In any case, it is part of the Quality department in a manufacturing facility and part of the role involves compliance audits that cover all company departments. What permissions should it receive? What are the considerations?
Open your preferred GUI tool, find the relevant user account and right click to find ‘properties’, then modify what is needed. It’s tedious to do the same in PowerShell, as primary benefits of this tool lie in copying from one account to another or importing permissions from a group or OU. If the GUI is tedious, then a PowerShell script might save time.
Bearing in mind that this is just an example pulled from an office and that the process is similar, whether ADAC or PowerShell is used, the process is similar.
The following questions and answers should make the user management process a little clearer.
As you’ll notice, setting up user permissions requires some planning but once OUs and User group permissions are defined then the task is easier. AD permissions are in some cases hierarchical so once a user is added to a group or OU then permissions are inherited. If higher than basic user permissions, then the higher permissions take precedence.
In conclusion, Active Directory is not a replacement for local permission management using Windows Explorer. Books have and will continue to be written on the subject. Avoid unnecessary complexity when setting AD permissions or changing policies. In addition, it is worth considering the use of GUIs and tools such as PowerShell to automate repetitive tasks.
In fact, I recommend you test AD in an offline or virtual environment before rolling out changes to an active network as users tend to complain when they can no longer access their social media or streaming video. Is your IT team spending too much time managing users? Perhaps you need to consider the benefits of Active Directory, so they can concentrate more on cybersecurity and process improvement?
Get our latest blog posts delivered in a weekly email.