Delegation of Organizational Unit administration
The following table lists a sample set of permission entries for a scenario of delegating administration of Organizational Units:
Table 9: Permission entries for delegating administration of Organizational Units
| Domain | Object Access | Allow List | 
| Domain | Object Property Access | Allow Read All Properties | 
| Domain | Object Property Access | Allow Write LDAP Server (permission to change Operational Domain Controller) | 
| Organizational Unit | Object Access | Allow List | 
| Organizational Unit | Object Property Access | Allow Read All Properties | 
| Organizational Unit | Child Object Creation/Deletion | Allow Create/Delete Users | 
| User | Object Access | Allow List | 
| User | Object Property Access | Allow Read/Write All Properties | 
| User | Object Property Access | Deny Write Employee ID | 
This set of permission entries has several important characteristics:
- It allows access to the Domain and the Organizational Unit object classes. This is because without access to the domain and the Organizational Units a delegated administrator cannot see the users beneath. This access should always include the List and Read All Properties permissions. 
- It gives a delegated administrator the ability to create and delete user objects. This permission applies to the Organizational Unit object class. 
- It gives a delegated administrator the ability to see (List) users and modify any property except Employee ID. 
 
    Delegation of group administration
The following table lists a sample set of permission entries for a scenario of delegating administration of groups:
Table 10: Permission entries for delegating administration of groups
| Domain | Object Access | Allow List | 
| Domain | Object Property Access | Allow Read All Properties | 
| Domain | Object Property Access | Allow Write LDAP Server (permission to change Operational Domain Controller) | 
| Organizational Unit | Object Access | Allow List | 
| Organizational Unit | Object Property Access | Allow Read All Properties | 
| Organizational Unit | Child Object Creation/Deletion | Allow Create/Delete Groups | 
| Group | Object Access | Allow List | 
| Group | Object Property Access | Allow Read All Properties | 
| Group | Object Property Access | Allow Write Members | 
| User | Object Access | Allow List | 
| User | Object Property Access | Allow Read All Properties | 
This set of permission entries has several important characteristics:
- It allows access to the Domain and the Organizational Unit object classes. This is because without access to the domain and the Organizational Units a delegated administrator cannot see the groups and users beneath. This access should always include the List and Read All Properties permissions. 
- It gives a delegated administrator the ability to create and delete group objects. This permission applies to the Organizational Unit object class. 
- It gives a delegated administrator the ability to see (List) groups, view any property of a group (Read All Properties), and add or remove members from a group (Write Members). 
- It gives a delegated administrator the ability to see (List) users and view any property of a user (Read All Properties). This is necessary for a delegated administrator to be able to add users to a group. 
 
    Delegation in a functional vs. hosted environment
For your delegation model to work correctly, you need to determine whether you have a functional or hosted environment.
 
    Delegation in a functional environment
In a functional environment there is a separate group of administrators for each function. So there may be a group for managing users, a helpdesk, domain administrators, and Exchange administrators. In case of a functional environment, you need to decide on a certain role for each function. These roles usually cross Organizational Unit boundaries so delegation is typically done at the root of the domain or domains. Typically a delegation model for this scenario would look something like the following:
Table 11: Delegation model in a functional environment
| Domain / Read All Objects | 
All Objects - List 
All Objects - Read All Properties 
Domain - Write LDAP Server Property (permission to change Operational Domain Controller)  | Authenticated Users | 
| Domain / User Admin | 
User Objects - Full Control 
Organizational Unit - Create/Delete User Objects  | User Admin group | 
| Domain / Group Admin | 
Group Objects - Full Control 
Organizational Unit - Create/Delete Group Objects  | Group Admin group |