?
Solved

dsacls - changed inheriting permissions from the parent on user object

Posted on 2007-10-11
2
Medium Priority
?
2,074 Views
Last Modified: 2013-12-04
I am trying to use the command line to reset permissions on some user objects that have the - inheriting  permissions disabled.
output from dsacls for a user shows - {This object is protected from inheriting permissions from the parent}

I have tried
dsacls "cn=user,dc=domain,dc=name" /p:n

 and I get an error

Parameter /p:n was unexpected.
The parameter is incorrect.

from the GUI I can reset the permissions without an issue. Does anyone have any examples of how I can do this.

Thanks,
Mark
0
Comment
Question by:markpalinux
2 Comments
 
LVL 9

Accepted Solution

by:
MSE-dwells earned 2000 total points
ID: 20060413
Try upper-case, i.e. -          /P:N
0
 
LVL 15

Author Comment

by:markpalinux
ID: 20062454


That worked, I thought I tried that.

ok - 500 points.

Thanks,
Mark
0

Featured Post

Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Wouldn't it be nice if objects in Active Directory automatically moved into the correct Organizational Units? This is what AutoAD aims to do and as a plus, it automatically creates Sites, Subnets, and Organizational Units.
Transferring FSMO roles is done when an admin wants to split roles between certain Domain Controllers or the Domain Controller holding the Roles has been forcefully demoted using dcpromo / forceremoval
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

830 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question