AD Security permissions that allow registry modification

Posted on 2009-04-01
Last Modified: 2013-12-24
I have an issue where our users are authenticating onto a Citrix Secure Access Gateway website to access a published application and receiving error messages pointing to SSL connection failures.

I have narrowed it down to the point where if the users are in the administrators AD member group this published app will load fine for them. However if they are not in this group (and obviously I do not want users in this group) then they receive the error messages when trying to launch the published app.

I am therefore creating a new AD member group and wish to isolate just the security permissions the administrators account uses to read/write to the registry as I believe this Citrix Access Gateway site writes a file to the registry.

Any suggestions would be greatly appreciated
Question by:MartynLawson
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
LVL 11

Expert Comment

ID: 24039166
For permissions related issues like this where you need to determine where an access denied is occurring, I like to use Windows Sysinternal Process Monitor:  Run the app as a non-admin user, then filter by access denied entries.  You'll be able to see where the user is lacking permission, helping you avoid having to grant the user too much access.

Author Comment

ID: 24047977
I have tried that and it is showing no access denied errors, but there are plenty of entries showing Not Found. Do you think that this might be causing the problem?
LVL 11

Expert Comment

ID: 24049978
I generally ignore the "Not Found" entries and focus on the "Access Denied" entries when troubleshooting permissions-related issues.  Are you running Process Explorer on the server running Citrix Secure Access Gateway?  You'll want to do so as end users are access resources on the server rather than their own workstations.
Office 365 Training for Admins - 7 Day Trial

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.


Author Comment

ID: 24050035
Unfortunatel the server running the gateway is owned and maintained by a third party and therefore we are only able to do diagnostics from the client side of things. Do you know of any further diagnostics that we would be able to perform from the client side?
LVL 11

Assisted Solution

snoopfrogg earned 100 total points
ID: 24050441
That makes troubleshooting this pretty difficult unless the third party is willing to help out.  I think you hit the nail on the head when you indicated you need to determine where exactly in the registry data is being written.  By isolating the key or keys being written, you avoid having to grant too much access.  

One other option, if you don't want to involve the third party, is placing a call to Citrix to see if they can tell you what permissions are needed.  Once you know this, you can pass on the information to the third party and ask them to modify the registry's permissions accordingly.

Accepted Solution

MartynLawson earned 0 total points
ID: 24094808
I have found out that this issue causing this is a GPO that is not being applied correctly. I have since enforced the GPO and it seems to be picking up the settings.

Thanks for assisting me in diagnosing the problem

Kind Regards


Featured Post

Do you have a plan for Continuity?

It's inevitable. People leave organizations creating a gap in your service. That's where Percona comes in.

See how relies on Percona to:
-Manage their database
-Guarantee data safety and protection
-Provide database expertise that is available for any situation

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Microsoft Access is a place to store data within tables and represent this stored data using multiple database objects such as in form of macros, forms, reports, etc. After a MS Access database is created there is need to improve the performance and…
Your data is at risk. Probably more today that at any other time in history. There are simply more people with more access to the Web with bad intentions.
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

631 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question