To delegate more granular data management permissions for the resources stored in your Active Directory (AD) environment, use the Access Templates (ATs) in the Configuration > Access Templates > Active Directory > Advanced container of the Active Roles Console.
These ATs contain more granular data management tasks for computer objects, contacts, domains, groups, Organizational Units (OUs), printers, shared folders and users.
| 
 Access Template  | 
 Description  | 
| 
 Computer Objects – Create  | 
 Grants permission to create computer objects. NOTE: This AT provides no additional permissions.  | 
| 
 Computer Objects – Delete  | 
 Grants permission to delete computer objects. NOTE: This AT provides no additional permissions.  | 
| 
 Computer Objects – List  | 
 Grants permission to list computer objects. NOTE: This AT provides no additional permissions.  | 
| 
 Computer Objects – Read/Write Account Restrictions  | 
 Grants permission to view or modify properties that set account restrictions for computer objects (that is, the User-Account-Restrictions property set of computer objects). For more information on the affected properties, see User-Account-Restrictions property set in the Microsoft Active Directory Schema documentation.  | 
| 
 Computer Objects – Read/Write General Information  | 
 Grants permission to view or modify the following general information properties of computer objects: 
  | 
| 
 Computer Objects – Read/Write Manager  | 
 Grants permission to view or modify the person assigned to the management of the computer resource (that is, the Managed By attribute of the computer). NOTE: This AT provides no additional permissions.  | 
| 
 Computer Objects – Read/Write Personal Information  | 
 Grants permission to view or modify the personal information properties of computer objects (that is, the Personal-Information property set of computer objects). For more information on the affected properties, see Personal-Information property set in the Microsoft Active Directory Schema documentation.  | 
| 
 Computer Objects – Read/Write Public Information  | 
 Grants permission to view or modify the public information properties of computer objects (that is, the Public-Information property set of computer objects). For more information on the affected properties, see Public-Information property set in the Microsoft Active Directory Schema documentation.  | 
| 
 Computer Objects - Reset Computer Accounts  | 
 Grants permission to reset computer accounts. NOTE: This AT provides no additional permissions.  | 
| 
 Computer Objects - View BitLocker Recovery Keys  | 
 Grants the permission to search and view all properties of computer child objects that contain a Full Volume Encryption recovery password in their associated globally unique identifier (GUID). TIP: Use this AT to delegate the task of retrieving BitLocker recovery keys stored in AD.  | 
| 
 Contacts – Create  | 
 Grants permission to create contact objects. NOTE: This AT provides no additional permissions.  | 
| 
 Contacts – Delete  | 
 Grants permission to delete contact objects. NOTE: This AT provides no additional permissions.  | 
| 
 Contacts – Read Group Membership  | 
 Grants permission to view the list of groups to which the contact object belongs. NOTE: This AT provides no additional permissions.  | 
| 
 Contacts – Read/Write Organizational Information  | 
 Grants permission to view or modify the following organizational properties of the contact: 
  | 
| 
 Contacts – Read/Write Personal Information  | 
 Grants permission to view or modify the personal information properties of contacts (that is, the Personal-Information property set of contacts). For more information on the affected properties, see Personal-Information property set in the Microsoft Active Directory Schema documentation.  | 
| 
 Contacts – Read/Write Web Information  | 
 Grants permission to view or modify the web-related information properties of contacts (that is, the Web-Information property set of contacts). For more information on the affected properties, see Web-Information property set in the Microsoft Active Directory Schema documentation.  | 
| 
 Contacts – Rename  | 
 Grants permission to rename contact objects. NOTE: This AT provides no additional permissions.  | 
| 
 Domains – Change PDC  | 
 Grants permission to change the role owner of the Primary Domain Controller (PDC) Emulator. NOTE: This AT provides no additional permissions.  | 
| 
 Domains – Delegate Control and Enforce Active Roles Server Policy  | 
 Grants permission to apply Active Roles ATs and Policy Objects to domain objects. NOTE: This AT provides no additional permissions.  | 
| 
 Domains – Generate Resultant Set of Policy (Logging)  | 
 Grants permission to generate Group Policy Result data for the users and/or computers in a specific domain.  | 
| 
 Domains – Generate Resultant Set of Policy (Planning)  | 
 Grants permission to generate Group Policy Modeling data for the users and/or computers in a specific domain. Administrators can use Group Policy modeling to troubleshoot Group Policy settings and testing GPOs before deploying them in a live environment.  | 
| 
 Domains – List  | 
 Grants permission to list domain objects. NOTE: This AT provides no additional permissions.  | 
| 
 Domains – Read/Write General Information  | 
 Grants permission to view or modify the following general information properties of domain objects: 
  | 
| 
 Domains – Read/Write Manager  | 
 Grants permission to view or modify the person assigned to the management of a domain (that is, the Managed By attribute of the domain). NOTE: This AT provides no additional permissions.  | 
| 
 Domains – Read/Write Other Domain Parameters  | 
 Grants permission to view or modify properties permitting control to a list of domain attributes (that is, the Domain-Other-Parameters property set of domains). For more information on the affected properties, see Domain-Other-Parameters property set in the Microsoft Active Directory Schema documentation.  | 
| 
 Domains – Read/Write Password & Lockout Policies  | 
 Grants permission to view or modify lockout and password expiration related properties on the user accounts of a domain (that is, the Domain-Password property set of domains). For more information on the affected properties, see Domain-Password property set in the Microsoft Active Directory Schema documentation.  | 
| 
 Group Policy Container – Apply Group Policy  | 
 Grants the extended right used by the Group Policy engine (that is, the Apply-Group-Policy extended right) to determine if a Group Policy Object (GPO) applies to a user and/or computer.  | 
| 
 Groups – Add/Remove Self As Member  | 
 Grants permission to enable updating group membership via Self-Membership validated write (that is, allowing users to add or remove their own account from the group).  | 
| 
 Groups – Copy  | 
 Grants permission to copy groups. NOTE: This AT provides no additional permissions.  | 
| 
 Groups – Create  | 
 Grants permission to create groups. NOTE: This AT provides no additional permissions.  | 
| 
 Groups – Delete  | 
 Grants permission to delete groups. NOTE: This AT provides no additional permissions.  | 
| 
 Groups - Deprovision  | 
 Grants permission to deprovision groups. NOTE: This AT provides no additional permissions.  | 
| 
 Groups – List  | 
 Grants permission to list groups. NOTE: This AT provides no additional permissions.  | 
| 
 Groups – Manage Membership Rules  | 
 Grants permission to view or modify the criteria of rule-based group membership assignments within Active Roles. NOTE: This AT provides no additional permissions.  | 
| 
 Groups – Read Group Membership  | 
 Grants permission to view the list of groups to which a specific group belongs. NOTE: This AT provides no additional permissions.  | 
| 
 Groups – Read/Write E-mail Address  | 
 Grants permission to view or modify the list of email addresses for a group.  | 
| 
 Groups – Read/Write General Information  | 
 Grants permission to view or modify the following general information properties of groups: 
  | 
| 
 Groups – Read/Write Group Members  | 
 Grants permission to add or remove members to or from a group.  | 
| 
 Groups – Read/Write Group Type and Scope  | 
 Grants permission to view or modify the type and scope settings of a group. NOTE: This AT provides no additional permissions.  | 
| 
 Groups – Read/Write Manager  | 
 Grants permission to view or modify the person assigned to manage a specific group (that is, the Managed By attribute of the group).  | 
| 
 Groups – Read/Write Phone and Mail Options  | 
 Grants permission to view or modify the email-related information properties of a group (that is, the Email-Information property set of group objects). For more information on the affected properties, see Email-Information property set in the Microsoft Active Directory Schema documentation.  | 
| 
 Groups – Rename  | 
 Grants permission to rename groups. NOTE: This AT provides no additional permissions.  | 
| 
 Groups - Undo Deprovision  | 
 Grants permission to restore (that is, perform the Undo Deprovision action) on groups. NOTE: This AT provides no additional permissions.  | 
| 
 Groups - Undo Deprovision - Deny  | 
 Grants permission to deny the restoration of group objects (that is, performing the Undo Deprovision action on them).  | 
| 
 Objects - Deny Deletion  | 
 Grants permission to deny the deletion and sub-tree deletion of a specific object. NOTE: This AT provides no additional permissions.  | 
| 
 Objects - Deny Deletion of Child Objects  | 
 Grants permission to deny deleting all child objects from a specific AD container. NOTE: This AT provides no additional permissions.  | 
| 
 OUs – Create  | 
 Grants permission to create Organizational Units (OUs). NOTE: This AT provides no additional permissions.  | 
| 
 OUs – Delegate Control and Enforce Active Roles Server Policy  | 
 Grants permission to apply Active Roles ATs and Policy Objects to an OU. NOTE: This AT provides no additional permissions.  | 
| 
 OUs – Delete  | 
 Grants permission to delete OUs. NOTE: This AT provides no additional permissions.  | 
| 
 OUs – Generate Resultant Set of Policy (Logging)  | 
 Grants permission to generate Group Policy Results data for the users and computers within the specific OU.  | 
| 
 OUs – Generate Resultant Set of Policy (Planning)  | 
 Grants permission to generate Group Policy Modeling data for the users and computers within the specific OU.  | 
| 
 OUs – List  | 
 Grants permission to list OUs. NOTE: This AT provides no additional permissions.  | 
| 
 OUs – Read/Write General Information  | 
 Grants permission to view or modify the following general information properties of OUs: 
  | 
| 
 OUs – Read/Write Manager  | 
 Grants permission to view or modify the person assigned to manage a specific OU (that is, the Managed By attribute of the OU).  | 
| 
 OUs – Rename  | 
 Grants permission to rename OUs. NOTE: This AT provides no additional permissions.  | 
| 
 Printer Objects – Create  | 
 Grants permission to create printer queue objects. NOTE: This AT provides no additional permissions.  | 
| 
 Printer Objects – Delete  | 
 Grants permission to delete printer queue objects. NOTE: This AT provides no additional permissions.  | 
| 
 Printer Objects – List  | 
 Grants permission to list printer queue objects. NOTE: This AT provides no additional permissions.  | 
| 
 Printer Objects – Read/Write General Information  | 
 Grants permission to view or modify the following general information properties of printer queue objects: 
  | 
| 
 Printer Objects – Read/Write Manager  | 
 Grants permission to view or modify the person assigned to manage a specific printer (that is, the Managed By attribute of the printer).  | 
| 
 Printer Objects – Rename  | 
 Grants permission to rename printer queue objects. NOTE: This AT provides no additional permissions.  | 
| 
 Shared Folders – Create  | 
 Grants permission to create shared folder objects. NOTE: This AT provides no additional permissions.  | 
| 
 Shared Folders – Delete  | 
 Grants permission to delete shared folder objects. NOTE: This AT provides no additional permissions.  | 
| 
 Shared Folders – List  | 
 Grants permission to list shared folder objects. NOTE: This AT provides no additional permissions.  | 
| 
 Shared Folders – Read/Write General Information  | 
 Grants permission to view or modify the following general information properties of shared folders: 
  | 
| 
 Shared Folders – Read/Write Manager  | 
 Grants permission to view or modify the person assigned to manage a specific shared folder (that is, the Managed By attribute of the shared folder).  | 
| 
 Shared Folders – Rename  | 
 Grants permission to rename shared folder objects. NOTE: This AT provides no additional permissions.  | 
| 
 Users - Assign/Remove Digital Certificates  | 
 Grants permission to assign or remove digital (X.509) certificates to or from AD users ( that is, read or write the userCertificate attribute of user objects).  | 
| 
 Users - Change Password (Extended Right)  | 
 Grants permission to change the password of users (that is, grants the User-Change-Password extended right).  | 
| 
 Users - Copy  | 
 Grants the permission to copy user objects. NOTE: This AT provides no additional permissions.  | 
| 
 Users - Create  | 
 Grants permission to create user objects. NOTE: This AT provides no additional permissions.  | 
| 
 Users - Delete  | 
 Grants permission to delete user objects. NOTE: This AT provides no additional permissions.  | 
| 
 Users - Deprovision  | 
 Grants permission to deprovision user objects. NOTE: This AT provides no additional permissions.  | 
| 
 Users - Enable/Disable Account  | 
 Grants permission to enable or disable user objects. NOTE: This AT provides no additional permissions.  | 
| 
 Users - List  | 
 Grants permission to list user objects. NOTE: This AT provides no additional permissions.  | 
| 
 Users - Read Group Membership  | 
 Grants permission to view the list of groups the selected user is a member of. NOTE: This AT provides no additional permissions.  | 
| 
 Users - Read/Write Account Information  | 
 Grants permission to view or modify the following account information properties of user objects: 
  | 
| 
 Users - Read/Write Account Restrictions  | 
 Grants permission to view or modify the account restriction properties of user objects (that is, the User-Account-Restrictions property set of user objects). For more information on the affected properties, see User-Account-Restrictions property set in the Microsoft Active Directory Schema documentation.  | 
| 
 Users - Read/Write Dial-In Properties  | 
 Grants permission to view or modify the following dial-in specific properties of user objects: 
  | 
| 
 Users - Read/Write General Information  | 
 Grants permission to view or modify the general information properties of user objects (that is, the General-Information property set of user objects). For more information on the affected properties, see General-Information property set in the Microsoft Active Directory Schema documentation.  | 
| 
 Users - Read/Write Logon Information  | 
 Grants permission to view or modify the logon information properties of user objects (that is, the User-Logon property set of user objects). For more information on the affected properties, see User-Logon property set in the Microsoft Active Directory Schema documentation.  | 
| 
 Users - Read/Write Organizational Information  | 
 Grants permission to view or modify the following organization-related properties of user objects: 
  | 
| 
 Users - Read/Write Personal Information  | 
 Grants permission to view or modify the personal information properties of user objects (that is, the Personal-Information property set of user objects). For more information on the affected properties, see Personal-Information property set in the Microsoft Active Directory Schema documentation.  | 
| 
 Users - Read/Write Phone and Mail Options  | 
 Grants permission to view or modify the email-related information properties of user objects (that is, the Email-Information property set of user objects). For more information on the affected properties, see Email-Information property set in the Microsoft Active Directory Schema documentation.  | 
| 
 Users - Read/Write Profile Properties  | 
 Grants permission to view or modify the following profile-related properties of user objects: 
  | 
| 
 Users - Read/Write Public Information  | 
 Grants permission to view or modify the public information properties of user objects (that is, the Public-Information property set of user objects). For more information on the affected properties, see Public-Information property set in the Microsoft Active Directory Schema documentation.  | 
| 
 Users - Read/Write Web Information  | 
 Grants permission to view or modify the web-related information properties of user objects (that is, the Web-Information property set of user objects). For more information on the affected properties, see Web-Information property set in the Microsoft Active Directory Schema documentation.  | 
| 
 Users - Read/Write WTS Properties  | 
 Grants permission to view or modify the following user object properties describing Terminal Services-related information: 
  | 
| 
 Users - Rename  | 
 Grants permission to rename user objects. NOTE: This AT provides no additional permissions.  | 
| 
 Users - Reset Password (Extended Right)  | 
 Grants permission to reset the password of user objects (that is, grants the User-Reset-Password extended right). NOTE: This AT provides no additional permissions.  | 
| 
 Users - Run Check Policy (Extended Right)  | 
 Grants permission to use the Check Policy action on user objects. NOTE: This AT provides no additional permissions.  | 
| 
 Users - Undo Deprovision  | 
 Grants permission to restore user objects (that is, performing the Undo Deprovision action on them).  | 
| 
 Users - Undo Deprovision - Deny  | 
 Grants permission to deny the restoration of user objects (that is, performing the Undo Deprovision action on them).  | 
| 
 Users - Unlock Account  | 
 Grants permission to unlock user objects that get locked due to reaching the limit of failed login attempts set in your organization.  | 
| 
 Users - View Change History (Extended Right)  | 
 Grants permission to use the Change History and User Activity actions on user objects.  | 
| 
 Users - View Delegated Rights (Extended Right)  | 
 Grants permission to use the Delegated Rights action on user objects.  | 
| 
 Users - View Digital Certificates  | 
 Grants permission to view the digital (X.509) certificates assigned to the AD user (that is, the permission to read the userCertificate attribute of user objects).  | 
| 
 Users - View Entitlement Profile (Extended Right)  | 
 Grants permission to use the Entitlement Profile action on user objects to view the resources to which the selected user object is entitled.  | 
| 
 Users - Write Password  | 
 Grants permission to set the password of user objects. NOTE: This AT provides no additional permissions.  |