Solved

Need VB Code to set Registry Permissions

Posted on 2001-08-15
8
271 Views
Last Modified: 2013-01-23
I am in need of VB code to change the permissions on a specific key in the registry.  Does anyone know if this is possible?  Here are the details:  I am writing .msi files and VB scripts to completely Automate configuration of Windows 2000 Professional (soon to be XP so it should work for both).  I created a value in the registry under HKLM\System\CurrCtlSet\LanManServer\Parameters named SrvComment that uses variables to show the currently logged on user under the Server Comment.  All works fine except that when a standard user logs on, they do not have sufficient permission to modify this registry key.  If I manually change this permission it will work, but I want to automate everything.  So I need to find a way to automatically change the permission to this registry key so I don't have to touch it.  Lack of security on this key does not concern me.
0
Comment
Question by:DesktopPro
8 Comments
 
LVL 38

Accepted Solution

by:
PaulHews earned 200 total points
Comment Utility
Never tried this in 2000, but it works in NT.

You could try impersonation code when you access the key.  Call Logon to make the code behave in the security context of the user you specify.  Call logoff again to reset security context of the running code.

Declare Function RevertToSelf Lib "advapi32.dll" () As Long

Declare Function LogonUser Lib "advapi32.dll" Alias "LogonUserA" (ByVal lpszUsername As String, ByVal
lpszDomain As String, ByVal lpszPassword As String, ByVal dwLogonType As Long, ByVal dwLogonProvider
As Long, phToken As Long) As Long

Declare Function ImpersonateLoggedOnUser Lib "advapi32.dll" (ByVal hToken As Long) As Long

Const LOGON32_LOGON_INTERACTIVE = 2
Const LOGON32_PROVIDER_DEFAULT = 0


Public Sub Logon(ByVal strAdminUser As String, ByVal strAdminPassword As String, ByVal strAdminDomain
As String)
 
 Dim lngTokenHandle, lngLogonType, lngLogonProvider As Long
 Dim blnResult As Boolean
 
 lngLogonType = LOGON32_LOGON_INTERACTIVE
 lngLogonProvider = LOGON32_PROVIDER_DEFAULT
 
 blnResult = RevertToSelf()
 
 blnResult = LogonUser(strAdminUser, strAdminDomain, strAdminPassword, lngLogonType, lngLogonProvider,
lngTokenHandle)
                                                     
 blnResult = ImpersonateLoggedOnUser(lngTokenHandle)
End Sub

Public Sub Logoff()
 Dim blnResult As Boolean
 
 blnResult = RevertToSelf()
End Sub
0
 
LVL 14

Expert Comment

by:wsh2
Comment Utility
<ping>
0
 
LVL 6

Expert Comment

by:JonFish85
Comment Utility
wow nice code PaulHews! Where'd you find that? or did you cram it together yourself? Keepin an eye on this one, as I may find use for the code sometime...
0
 
LVL 3

Expert Comment

by:nzjonboy
Comment Utility
listening...
0
Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

 
LVL 38

Expert Comment

by:PaulHews
Comment Utility
That's from MSKB.  Originally used it in ASP applications to access data on the network (ASP app running under limited inet user security and couldn't access any network files)
0
 

Expert Comment

by:ratantata
Comment Utility
Suggestion- how about making the config application run as a service that monitors all users?
Since NT services starts even before any user logs on, this might be useful
**Cheers**
0
 

Author Comment

by:DesktopPro
Comment Utility
Thanks, PaulHews.  I am going to try this as soon as I have a chance and will get back with you.
0
 
LVL 48

Expert Comment

by:Mikal613
Comment Utility
do you have the Database setup?

The last thing is you have to Put it on your phone (usually a Jar file)

a)wap or a sync cable are your options or if your phone Supports MMS you can email it as a attachment
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

When designing a form there are several BorderStyles to choose from, all of which can be classified as either 'Fixed' or 'Sizable' and I'd guess that 'Fixed Single' or one of the other fixed types is the most popular choice. I assume it's the most p…
Enums (shorthand for ‘enumerations’) are not often used by programmers but they can be quite valuable when they are.  What are they? An Enum is just a type of variable like a string or an Integer, but in this case one that you create that contains…
Get people started with the utilization of class modules. Class modules can be a powerful tool in Microsoft Access. They allow you to create self-contained objects that encapsulate functionality. They can easily hide the complexity of a process from…
Show developers how to use a criteria form to limit the data that appears on an Access report. It is a common requirement that users can specify the criteria for a report at runtime. The easiest way to accomplish this is using a criteria form that a…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now