Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

AD Security permissions that allow registry modification

Posted on 2009-04-01
6
Medium Priority
?
291 Views
Last Modified: 2013-12-24
I have an issue where our users are authenticating onto a Citrix Secure Access Gateway website to access a published application and receiving error messages pointing to SSL connection failures.

I have narrowed it down to the point where if the users are in the administrators AD member group this published app will load fine for them. However if they are not in this group (and obviously I do not want users in this group) then they receive the error messages when trying to launch the published app.

I am therefore creating a new AD member group and wish to isolate just the security permissions the administrators account uses to read/write to the registry as I believe this Citrix Access Gateway site writes a file to the registry.

Any suggestions would be greatly appreciated
0
Comment
Question by:MartynLawson
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
6 Comments
 
LVL 11

Expert Comment

by:snoopfrogg
ID: 24039166
For permissions related issues like this where you need to determine where an access denied is occurring, I like to use Windows Sysinternal Process Monitor:  http://technet.microsoft.com/en-us/sysinternals/bb896645.aspx.  Run the app as a non-admin user, then filter by access denied entries.  You'll be able to see where the user is lacking permission, helping you avoid having to grant the user too much access.
0
 
LVL 1

Author Comment

by:MartynLawson
ID: 24047977
I have tried that and it is showing no access denied errors, but there are plenty of entries showing Not Found. Do you think that this might be causing the problem?
0
 
LVL 11

Expert Comment

by:snoopfrogg
ID: 24049978
I generally ignore the "Not Found" entries and focus on the "Access Denied" entries when troubleshooting permissions-related issues.  Are you running Process Explorer on the server running Citrix Secure Access Gateway?  You'll want to do so as end users are access resources on the server rather than their own workstations.
0
Looking for the Wi-Fi vendor that's right for you?

We know how difficult it can be to evaluate Wi-Fi vendors, so we created this helpful Wi-Fi Buyer's Guide to help you find the Wi-Fi vendor that's right for your business! Download the guide and get started on our checklist today!

 
LVL 1

Author Comment

by:MartynLawson
ID: 24050035
Unfortunatel the server running the gateway is owned and maintained by a third party and therefore we are only able to do diagnostics from the client side of things. Do you know of any further diagnostics that we would be able to perform from the client side?
0
 
LVL 11

Assisted Solution

by:snoopfrogg
snoopfrogg earned 400 total points
ID: 24050441
That makes troubleshooting this pretty difficult unless the third party is willing to help out.  I think you hit the nail on the head when you indicated you need to determine where exactly in the registry data is being written.  By isolating the key or keys being written, you avoid having to grant too much access.  

One other option, if you don't want to involve the third party, is placing a call to Citrix to see if they can tell you what permissions are needed.  Once you know this, you can pass on the information to the third party and ask them to modify the registry's permissions accordingly.
0
 
LVL 1

Accepted Solution

by:
MartynLawson earned 0 total points
ID: 24094808
I have found out that this issue causing this is a GPO that is not being applied correctly. I have since enforced the GPO and it seems to be picking up the settings.

Thanks for assisting me in diagnosing the problem

Kind Regards

Martyn
0

Featured Post

Office 365 Training for IT Pros

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Lotus Notes has been used since a very long time as an e-mail client and is very popular because of it's unmatched security. In this article we are going to learn about  RRV Bucket corruption and understand various methods to Fix "RRV Bucket Corrupt…
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…
This video shows how to use Hyena, from SystemTools Software, to update 100 user accounts from an external text file. View in 1080p for best video quality.

722 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question