Solved

Need a user to add computers to the domain without having domain admin rights

Posted on 2004-03-25
8
177 Views
Last Modified: 2013-12-04
Greetings,

I have a user called wsadmin.  This user is my workstation administrator and has local admin rights on all workstations.  User can not log on locally to any server.  I need this user to be able to add systems to the domain since he builds them.  I tried Group Policy in the User Rights Assignment section and added him to Add workstations to domain.  Didn't work.  I also tried adding user to Account Operators group which didn't work.  Anyone know a good way to allow user to add systems to the domain withought being a member of domain admins?

P.S. I thought of runas but you have to supply password.  I do not want this user to have the password for a domain admin account.
0
Comment
Question by:netadmins
  • 3
  • 2
8 Comments
 
LVL 12

Expert Comment

by:trywaredk
ID: 10680881
Delegation of Administration Using Microsoft Management Console
http://support.microsoft.com/default.aspx?scid=kb;en-us;201341&Product=win2000

Many Regards
Jorgen Malmgren
IT-Supervisor
Denmark

:o) Your brain is like a parachute. It works best when it's open
0
 

Author Comment

by:netadmins
ID: 10681517
Thanks trywaredk,

I'm not sure if this applies though.  The user is logged on as local administrator at a workstation not yet joined to the domain.  The user attempts to add the system to the domain.  After typing in the domain the user is prompted with a logon.  When they try to logon the get this error:

Logon Failure: the user has not been granted the requested logon type at this computer.

The only way I have been able to allow the user to do this is add them to domain admins.  I only want the user to have local administor rights on the workstation and be able to add and remove computers to the domain.  Have not been able to figure out how to pick and choos what the user can do within the domain.
0
 
LVL 6

Accepted Solution

by:
DanniF earned 50 total points
ID: 10686382
This is actually taken from a document concerning joining an NT4 machine but this is what you do on the 2000 controller to solve your problem:

NOTE, I have edited this procedure to fit your environment, for the original document, see:

http://support.microsoft.com/default.aspx?scid=kb;EN-US;251335

Method 2: Grant the "Create Computer Objects" and "Delete Computer Objects" Access Control Entries (ACEs) to the User
From the Active Directory Users and Computers snap-in, click Advanced Features on the View menu so that the Security tab is exposed when you click Properties.
Right-click the Computers container, and then click Properties.
On the Security tab, click Advanced.
On the Permissions tab, click The user name

Make sure the This object and all child objects option is displayed in the Apply onto box.
From the Permissions box, click to select the Allow check box next to the Create Computer Objects and Delete Computer Objects ACEs, and then click OK.

Hope this helps,

Daniel F.
0
Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

 

Author Comment

by:netadmins
ID: 10930172
Been trying to figure out how to close questions so I can shut this one down.  Thanks for the help.
0
 
LVL 12

Expert Comment

by:trywaredk
ID: 10967214
The Experts Exchange Help Pages - About Closing Questions
http://www.experts-exchange.com/Security/Win_Security/help.jsp - hi9
0
 
LVL 12

Expert Comment

by:trywaredk
ID: 10967226
The Experts Exchange Help Pages - About Closing Questions
http://www.experts-exchange.com/Security/Win_Security/help.jsp#hi9

0

Featured Post

The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, a new law in my state forced us to get a top-to-bottom analysis of all of our contract client's networks. While we have documentation, it was spotty at best for some - and in any event it needed to be checked against reality. That was m…
Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
A short tutorial showing how to set up an email signature in Outlook on the Web (previously known as OWA). For free email signatures designs, visit https://www.mail-signatures.com/articles/signature-templates/?sts=6651 If you want to manage em…

785 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question