This section demonstrates how to implement a security scenario where each delegated administrator is restricted to managing users from a single department. The scenario is implemented by using an Access Rule that enables a delegated administrator to access only those objects whose Department property is identical to the Department claim of that delegated administrator.
To deploy a new Access Rule, you and your organization must meet the following conditions:
-
Your organization must have an Active Directory domain, with at least one Domain Controller (DC) running a Windows Server version supported by Active Roles. For the supported operating systems, see System Requirements in the Active Roles Release Notes.
-
The Active Roles Administration Database and Active Roles Console of the latest version of the product must be installed on a member server in your Active Directory domain. The member server must also run a Windows server version supported by Active Roles.
-
Your Active Directory domain is registered with Active Roles as a managed domain.
To deploy the Access Rule, configure a Group Policy to enable domain controllers (DCs) to issue claims.
To create a Group Policy for claim support
-
On a DC running a supported version of Windows Server, open the Group Policy Management console.
To open the Console, press Win+R. Then, in the Run dialog, type gpmc.msc, and click OK.
-
In the Console tree, select the Domain Controllers OU under your domain.
-
In the details pane, right-click Default Domain Controllers Policy, then click Edit.
-
Perform the following steps in the Group Policy Management Editor console that appears:
-
In the Console tree, select Computer Configuration > Policies > Administrative Templates > System > KDC.
-
In the details pane, double-click KDC support for claims, compound authentication and Kerberos armoring.
-
In the KDC support for claims, compound authentication and Kerberos armoring dialog, click Enabled and select Supported from the Options drop-down list. When finished, click OK to close the dialog.
-
Close the Group Policy Management Editor.
-
Close Group Policy Management.
-
Open the Windows command prompt and enter the following command:
gpupdate /force
Once you are ready, configure the Group Policy to enable the Active Roles Administration Database to retrieve claims for clients by using Kerberos protocol transition.
To configure the Group Policy to retrieve claims
-
On the server running the Active Roles Administration Service, open the Local Group Policy Editor console.
-
To open the Console, press Win+R. Then, in the Run dialog, type gpmc.msc, and click OK.
-
In the Console tree, select Computer Configuration > Policies > Administrative Templates > System > Kerberos.
-
In the details pane, double-click Kerberos client support for claims, compound authentication and Kerberos armoring.
-
In the Kerberos client support for claims, compound authentication and Kerberos armoring dialog, click Enabled, then click OK.
-
Restart the computer to apply the new setting to the Active Roles Administration Service.
NOTE: Make sure to restart the computer. Restarting only the Active Roles Administration Service is not sufficient.
Once you are ready, to enable Kerberos authentication, add the Service Principal Names (SPNs) of the Active Roles Administration Service to the service account.
To add SPNs to the service account and enable Kerberos authentication
-
Open the Windows command prompt.
-
Enter the following commands:
In the above commands:
-
<FQDN> is the fully qualified domain name of the computer running the Active Roles Administration Service (for example, arsrv.domain.com).
-
<name> is the name of the computer (for example, arsrv).
-
<service-account-name> is the name of the service account (that is the domain user account running the Active Roles Administration Service), for example domain\arsvcacct.
Create a claim type object for your Domain Controller (DC) to issue user claims sourced from the Department attribute. Log in as an Active Roles administrator and perform the following steps in the Active Roles Console.
NOTE: If using a default Active Roles configuration, you must log in with a domain user account that is a member of the Administrators local group of the member server running the Active Roles Administration Service.
To create a claim type
-
In the Console tree, expand the Active Directory node, right-click the Claim Types container, and select New > Claim Type.
-
On the Source Attribute page, scroll down the list of attributes, and click Department.
-
Click Next, then click Finish.