Delegation of Organizational Unit administration
The following table lists a sample set of permission entries for a scenario of delegating administration of Organizational Units:
Table 9: Permission entries for delegating administration of Organizational Units
Domain |
Object Access |
Allow List |
Domain |
Object Property Access |
Allow Read All Properties |
Domain |
Object Property Access |
Allow Write LDAP Server (permission to change Operational Domain Controller) |
Organizational Unit |
Object Access |
Allow List |
Organizational Unit |
Object Property Access |
Allow Read All Properties |
Organizational Unit |
Child Object Creation/Deletion |
Allow Create/Delete Users |
User |
Object Access |
Allow List |
User |
Object Property Access |
Allow Read/Write All Properties |
User |
Object Property Access |
Deny Write Employee ID |
This set of permission entries has several important characteristics:
- It allows access to the Domain and the Organizational Unit object classes. This is because without access to the domain and the Organizational Units a delegated administrator cannot see the users beneath. This access should always include the List and Read All Properties permissions.
- It gives a delegated administrator the ability to create and delete user objects. This permission applies to the Organizational Unit object class.
- It gives a delegated administrator the ability to see (List) users and modify any property except Employee ID.
Delegation of group administration
The following table lists a sample set of permission entries for a scenario of delegating administration of groups:
Table 10: Permission entries for delegating administration of groups
Domain |
Object Access |
Allow List |
Domain |
Object Property Access |
Allow Read All Properties |
Domain |
Object Property Access |
Allow Write LDAP Server (permission to change Operational Domain Controller) |
Organizational Unit |
Object Access |
Allow List |
Organizational Unit |
Object Property Access |
Allow Read All Properties |
Organizational Unit |
Child Object Creation/Deletion |
Allow Create/Delete Groups |
Group |
Object Access |
Allow List |
Group |
Object Property Access |
Allow Read All Properties |
Group |
Object Property Access |
Allow Write Members |
User |
Object Access |
Allow List |
User |
Object Property Access |
Allow Read All Properties |
This set of permission entries has several important characteristics:
- It allows access to the Domain and the Organizational Unit object classes. This is because without access to the domain and the Organizational Units a delegated administrator cannot see the groups and users beneath. This access should always include the List and Read All Properties permissions.
- It gives a delegated administrator the ability to create and delete group objects. This permission applies to the Organizational Unit object class.
- It gives a delegated administrator the ability to see (List) groups, view any property of a group (Read All Properties), and add or remove members from a group (Write Members).
- It gives a delegated administrator the ability to see (List) users and view any property of a user (Read All Properties). This is necessary for a delegated administrator to be able to add users to a group.
Delegation in a functional vs. hosted environment
For your delegation model to work correctly, you need to determine whether you have a functional or hosted environment.
Delegation in a functional environment
In a functional environment there is a separate group of administrators for each function. So there may be a group for managing users, a helpdesk, domain administrators, and Exchange administrators. In case of a functional environment, you need to decide on a certain role for each function. These roles usually cross Organizational Unit boundaries so delegation is typically done at the root of the domain or domains. Typically a delegation model for this scenario would look something like the following:
Table 11: Delegation model in a functional environment
Domain / Read All Objects |
- All Objects - List
- All Objects - Read All Properties
- Domain - Write LDAP Server Property (permission to change Operational Domain Controller)
|
Authenticated Users |
Domain / User Admin |
- User Objects - Full Control
- Organizational Unit - Create/Delete User Objects
|
User Admin group |
Domain / Group Admin |
- Group Objects - Full Control
- Organizational Unit - Create/Delete Group Objects
|
Group Admin group |