This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Delegate Full Access but prevent assigning of additional Access Templates

Hi,

In my company, I have delegated Full Access (all objects) to several Organizational Units in AD - I recently noticed this also allows admins to assign additional Access Templates to allow other users to have access to that same area. Is there any way I can prevent this from happening? I don't mind them seeing the existing config or the templates themselves, but they should not be able to assign or remove any Access Templates. I already tried blocking class "Access Templates" but that didn't seem to help (guess that only locks out modifying the templates themselves). Couldn't find the option for denying (un)assigning templates or policies etc.

Thanks!

Parents
  • (in parallel) my understanding: FC over OU to AD\OUADmins group
    (a) does not provide view of the ARS’s CN=Configuration (contains AT, Policies etc…)
    (b) does provide R/W Control over OU
    Because of (a) AD\OUAdmins will not be able to see AT’s and will not be able apply new AT’s. Not sure it will allow remove existing ART links to the OU. AT links are stored as records in hidden CN=ATLinks,CN=Configuration which requires permissions over the CN=ATLinks.
    It is a correct practice to grant FC over OU=<Region> (Regional AD Admins)

    #2. Make sure AD\OUAdmins is not DSAdminitrators (aka ARS Admins with FC over whole ARS)
Reply
  • (in parallel) my understanding: FC over OU to AD\OUADmins group
    (a) does not provide view of the ARS’s CN=Configuration (contains AT, Policies etc…)
    (b) does provide R/W Control over OU
    Because of (a) AD\OUAdmins will not be able to see AT’s and will not be able apply new AT’s. Not sure it will allow remove existing ART links to the OU. AT links are stored as records in hidden CN=ATLinks,CN=Configuration which requires permissions over the CN=ATLinks.
    It is a correct practice to grant FC over OU=<Region> (Regional AD Admins)

    #2. Make sure AD\OUAdmins is not DSAdminitrators (aka ARS Admins with FC over whole ARS)
Children
No Data