Access control lists may report incorrect information in Windows Server 2003 (884049)
The information in this article applies to:
- Microsoft Windows Server 2003, Datacenter Edition
- Microsoft Windows Server 2003, Enterprise Edition
- Microsoft Windows Server 2003, Standard Edition
- Microsoft Windows Server 2003, Web Edition
- Microsoft Windows Small Business Server 2003, Premium Edition
- Microsoft Windows Small Business Server 2003, Standard Edition
- Microsoft Windows Server 2003, Datacenter Edition for Itanium-based Systems
- Microsoft Windows Server 2003, Enterprise Edition for Itanium-based Systems
SYMPTOMSWhen you are logged on to a Microsoft Windows Server 2003 computer, you view the access control list (ACL) for an object that is contained in the Active Directory directory service. You notice that user accounts that are members of the local Administrators group on the Windows Server 2003 computer appear to have permissions to Active Directory objects.CAUSEThis problem occurs because the security identifier (SID) for the local Administrators group on a Windows Server 2003 is the same as the SID that is assigned to the Domain Administrators group. WORKAROUNDTo work around this problem, create a new security group, and then add the Domain Admins and Enterprise Admins groups to it. Then, use this new security group instead of the Domain Administrators group when you manage ACLs for Active Directory objects. To create the new security group, follow these steps: - Click Start, point to All Programs, point to Administrative Tools, and then click Active Directory Users and Computers.
- Expand DomainName, right-click Users, point to New, and then click Group.
- Type a name for your group in the Group name box, click to select either Domain local or Global in the Group scope box, click to select Security in the Group type box, and then click OK.
- In the right pane of the Active Directory Users and Computers snap-in, double-click the domain local security group that you just created.
- On the Members tab, click Add.
- Type the following in the Enter the object names to select (examples) box, and then click OK two times:
domain admins;enterprise admins
When you modify the ACL for an Active Directory object, use this group instead of the Domain Administrators group. This provides the same functionality as the Domain Administrators group, but uses a different SID. STATUSMicrosoft has confirmed that this is a problem in the Microsoft products that are listed in the "Applies to" section.MORE INFORMATIONThis is a problem with the way that effective permissions appear There is no effect on how the permissions are applied.
The Administrators group in the domain is implemented as a BUILTIN\Administrators group on a domain controller and has a well-known SID of S-1-5-32-544. The local BUILTIN\Administrators group on any member server or workstation also has an SID of S-1-5-32-544.
When Windows Server 2003 calculates the effective permissions of an object, it matches the ACL of the object that is obtained from a domain controller with the SIDs of groups where the user is a member. These group SIDs are obtained locally. If the object ACL contains an SID of S-1-5-32-544 for Administrators group in the domain, and the user is a member of a local Administrators group, there is no way for Windows Server 2003 to distinguish between the two accounts.
This problem is also true in reverse. If the user is a member of Administrators group in the domain and is not the member of local Administrators group, Windows Server 2003 will not show the correct list of permissions. This problem occurs because the group expansion is always performed locally. A computer that is not a domain controller or that is a workstation cannot expand a group that is local on the domain controller.
Modification Type: | Major | Last Reviewed: | 11/29/2004 |
---|
Keywords: | kbnofix kbpermissions kbadmin kbaccounts kbtshoot kbBug kbprb KB884049 kbAudITPRO kbAudEndUser kbAudDeveloper |
---|
|