Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

AD Security permissions that allow registry modification

Posted on 2009-04-01
6
Medium Priority
?
296 Views
Last Modified: 2013-12-24
I have an issue where our users are authenticating onto a Citrix Secure Access Gateway website to access a published application and receiving error messages pointing to SSL connection failures.

I have narrowed it down to the point where if the users are in the administrators AD member group this published app will load fine for them. However if they are not in this group (and obviously I do not want users in this group) then they receive the error messages when trying to launch the published app.

I am therefore creating a new AD member group and wish to isolate just the security permissions the administrators account uses to read/write to the registry as I believe this Citrix Access Gateway site writes a file to the registry.

Any suggestions would be greatly appreciated
0
Comment
Question by:MartynLawson
  • 3
  • 3
6 Comments
 
LVL 11

Expert Comment

by:snoopfrogg
ID: 24039166
For permissions related issues like this where you need to determine where an access denied is occurring, I like to use Windows Sysinternal Process Monitor:  http://technet.microsoft.com/en-us/sysinternals/bb896645.aspx.  Run the app as a non-admin user, then filter by access denied entries.  You'll be able to see where the user is lacking permission, helping you avoid having to grant the user too much access.
0
 
LVL 1

Author Comment

by:MartynLawson
ID: 24047977
I have tried that and it is showing no access denied errors, but there are plenty of entries showing Not Found. Do you think that this might be causing the problem?
0
 
LVL 11

Expert Comment

by:snoopfrogg
ID: 24049978
I generally ignore the "Not Found" entries and focus on the "Access Denied" entries when troubleshooting permissions-related issues.  Are you running Process Explorer on the server running Citrix Secure Access Gateway?  You'll want to do so as end users are access resources on the server rather than their own workstations.
0
Simplify Active Directory Administration

Administration of Active Directory does not have to be hard.  Too often what should be a simple task is made more difficult than it needs to be.The solution?  Hyena from SystemTools Software.  With ease-of-use as well as powerful importing and bulk updating capabilities.

 
LVL 1

Author Comment

by:MartynLawson
ID: 24050035
Unfortunatel the server running the gateway is owned and maintained by a third party and therefore we are only able to do diagnostics from the client side of things. Do you know of any further diagnostics that we would be able to perform from the client side?
0
 
LVL 11

Assisted Solution

by:snoopfrogg
snoopfrogg earned 400 total points
ID: 24050441
That makes troubleshooting this pretty difficult unless the third party is willing to help out.  I think you hit the nail on the head when you indicated you need to determine where exactly in the registry data is being written.  By isolating the key or keys being written, you avoid having to grant too much access.  

One other option, if you don't want to involve the third party, is placing a call to Citrix to see if they can tell you what permissions are needed.  Once you know this, you can pass on the information to the third party and ask them to modify the registry's permissions accordingly.
0
 
LVL 1

Accepted Solution

by:
MartynLawson earned 0 total points
ID: 24094808
I have found out that this issue causing this is a GPO that is not being applied correctly. I have since enforced the GPO and it seems to be picking up the settings.

Thanks for assisting me in diagnosing the problem

Kind Regards

Martyn
0

Featured Post

Important Lessons on Recovering from Petya

In their most recent webinar, Skyport Systems explores ways to isolate and protect critical databases to keep the core of your company safe from harm.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Active Directory can easily get cluttered with unused service, user and computer accounts. In this article, I will show you the way I like to implement ADCleanup..
How much do you know about the future of data centers? If you're like 50% of organizations, then it's probably not enough. Read on to get up to speed on this emerging field.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

886 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question