search for: rplcrc

Displaying 8 results from an estimated 8 matches for "rplcrc".

Did you mean: rg_crc
2018 Nov 29
2
Different LDAP query in different DC...
Mandi! Rowland Penny via samba In chel di` si favelave... > S-1-5-21-160080369-3601385002-3131615632-1314 Bingo! Exactly the 'Restricted' group that own the users i use for generico LDAP access! I really think that we have found the trouble! Now... how can i fix it? ;-) And... why that vaule get not propagated?! Thanks. -- dott. Marco Gaiarin GNUPG Key ID: 240A3D66
2018 Nov 29
0
Different LDAP query in different DC...
...nt: > > root at vdcsv1:~# ldbsearch -H /var/lib/samba/private/sam.ldb -b > "DC=ad,DC=fvg,DC=lnf,DC=it" "(cn=prova123)" nTSecurityDescriptor # > record 1 dn: CN=prova123,CN=Aliases,OU=FVG,DC=ad,DC=fvg,DC=lnf,DC=it > nTSecurityDescriptor: > O:DAG:DAD:AI(A;CINPID;RPLCRC;;;S-1-5-21-160080369-360138 > 5002-3131615632-1314) This one has an extra ACE and in readable form it is: (A;CINPID;RPLCRC;;;S-1-5-21-160080369-3601385002-3131615632-1314) "A" SDDL_ACCESS_ALLOWED ACCESS_ALLOWED_ACE_TYPE "CI" SDDL_CONTAINER_INHERIT CONTAINER_INHERIT_AC...
2018 Nov 29
2
Different LDAP query in different DC...
...ool! Seems effectivaly different: root at vdcsv1:~# ldbsearch -H /var/lib/samba/private/sam.ldb -b "DC=ad,DC=fvg,DC=lnf,DC=it" "(cn=prova123)" nTSecurityDescriptor # record 1 dn: CN=prova123,CN=Aliases,OU=FVG,DC=ad,DC=fvg,DC=lnf,DC=it nTSecurityDescriptor: O:DAG:DAD:AI(A;CINPID;RPLCRC;;;S-1-5-21-160080369-360138 5002-3131615632-1314)(OA;CIIOID;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828c c14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIOID;RP;4c164200-20c0-11d0-a768-00aa 006e0529;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIOID;RP;5f202010-79a5- 11d0-9020-00c04fc2d4cf;4828cc14-1...
2018 Nov 29
0
Different LDAP query in different DC...
...ted' group that own the users i use for > generico LDAP access! > I really think that we have found the trouble! > > > Now... how can i fix it? ;-) Depends, do you want to add the ACE on other DC's or remove it ? You can add it with: samba-tool dsacl set --sddl=(A;CINPID;RPLCRC;;;S-1-5-21-160080369-3601385002-3131615632-1314) To remove it, you will have to use Windows tools unless somebody knows another way > > And... why that vaule get not propagated?! It should be propagated, so, no I don't know why it wasn't Rowland
2020 Aug 24
0
Set/Restrict Owner Rights for OU-Admin
...er add? ${TestUser} ${TestUserPWD} --userou OU=${TestOU} # add TestUser to TestGroup samba-tool group addmembers ${TestGroup} ${TestUser} # set OWNER RIGHTS only for OU Test1_with_Owner-Rights samba-tool dsacl set --objectdn "OU=Test1_with_Owner-Rights,${Test_OU_DN}" --sddl="(A;CI;RPLCRC;;;S-1-3-4)" # get groupid and sid from TestGroup # groupid=$(samba-tool group show ${TestGroup} --attributes=objectGUID | grep objectGUID | cut -d " " -f2 -) sid=$(samba-tool group show ${TestGroup} --attributes=objectSid | grep objectSid | cut -d " " -f2 -) # Organizat...
2016 Jan 04
0
LDAP permissions - ldbedit/ldapmodify?
...C=samdom,DC=example,DC=com -s sub "(&(objectClass=organizationalUnit)(objectCategory=organizationalUnit))" nTSecurityDescriptor Which will return something like this: # editing 1 records # record 1 dn: OU=SUDOers,DC=samdom,DC=example,DC=com nTSecurityDescriptor: O:DAG:DAD:AI(A;CI;RPLCRC;;;DU)(A;;RPWPCRCCDCLCLORCWOWDSD DTSW;;;SY)(A;;RPWPCRCCDCLCLORCWOWDSDDTSW;;;DA)(OA;;CCDC;bf967a86-0de6-11d0-a2 85-00aa003049e2;;AO)(OA;;CCDC;bf967aba-0de6-11d0-a285-00aa003049e2;;AO)(OA;;C CDC;bf967a9c-0de6-11d0-a285-00aa003049e2;;AO)(OA;;CCDC;bf967aa8-0de6-11d0-a28 5-00aa003049e2;;PO)(A;;RP...
2016 Jan 04
2
LDAP permissions - ldbedit/ldapmodify?
Hi, A while ago I successfully set permissions on a section of my LDAP / AD tree, using either ADUC or ADSIEDIT (I forget which). These permissions allowed my own user to access this section of the tree; I removed permissions for 'Domain Admins' etc. to ensure that others would not be able to view or change the data - this has worked great for many months. I have just tried to add a new
2018 Nov 29
2
Different LDAP query in different DC...
Mandi! Rowland Penny via samba In chel di` si favelave... > Whilst there are attributes that do not get replicated between DC's, > the majority are, so each DC should allow the same access. > Do you have access to the DC ? > Can you run the search locally ? Sure! As just stated, local access (via ldbsearch against the local SAM) works as expected: root at vdcpp1:~# ldbsearch