Go Premium for a chance to win a PS4. Enter to Win

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 477
  • Last Modified:

How does the active diretory user attribute 'Log on to' work?

I have a service account that has access only to the two application servers it runs jobs on; however it needs to connect to a domain controller to read active directory for user accounts.  Does it need to be granted the user right for 'log on to' in AD?  How does this permission really work?  
0
childersj
Asked:
childersj
  • 5
  • 5
  • 2
  • +1
1 Solution
 
Krzysztof PytkoActive Directory EngineerCommented:
Just install on his workstation

if XP -> administrative tools
if 7 -> RSAT

and he will use dsa.msc console to see AD Users and Computers without need to log on to the DC

Regards,
Krzysztof
0
 
childersjAuthor Commented:
Hmm, thats not really what I was looking for.  This is for business objects application that will be used to read out of AD and populate the information in business objects.  We will be authenticating users through this as well.  It needs to go through AD.  I'm not sure exactly what locking down the 'log on to' feature prevents from happening which is what I am trying to find out.  I don't know if it is talking about interactive logons or if it would block the ldap call to the DC as well.
0
 
Krzysztof PytkoActive Directory EngineerCommented:
It blocks interactive logon. You can still query AD using LDAP syntax. Allowing users direct access to the DC is bad practice. If you can avoid that, do not allow them log on locally to the DCs.

I think that this application would query LDAP for atributes. In case that it needs to write any of them, please make sure that users working with that app, will have delegated apropriate rights to those objects.

Krzysztof
0
Nothing ever in the clear!

This technical paper will help you implement VMware’s VM encryption as well as implement Veeam encryption which together will achieve the nothing ever in the clear goal. If a bad guy steals VMs, backups or traffic they get nothing.

 
childersjAuthor Commented:
They only need read acces to AD, no writes.  They do not need the ability to log on to the DC, only to query for objects/attributes.  Not sure why this isn't working.
0
 
Krzysztof PytkoActive Directory EngineerCommented:
Do you see any error message or error in event log ?
0
 
BobintheNocCommented:
The Log On To: is a method to restrict users from logging into, interactively, all computers in the domain.  By identifying specific computernames, typically workstations, in the LOG ON TO section, the user will ONLY be allowed to log on to those machines.

So, example, if JaneDoe user is only supposed to be allowed to log on to a single workstation in your company, you'd add the desired workstation to the Log On To list.
0
 
childersjAuthor Commented:
NO, that is the strange part, I don't see any errors anywhere.
0
 
Krzysztof PytkoActive Directory EngineerCommented:
What happens if your run grant that user local administrator rights and run this app?
0
 
childersjAuthor Commented:
Not able to grant local admin rights to this app.  This is a secured environment.  It doesn't need to have any admin rights.  I just checked AD and it has rights to read all attributes and permissions.  All attirbute lookups are default which is correct and distinguised name is correct.  I have no idea what else could be going on.
0
 
Krzysztof PytkoActive Directory EngineerCommented:
OK, secured environment? Firewall issues?

0
 
techhealthCommented:
How does the service account "connect to a domain controller to read active directory for user accounts"?  Via what kind of LDAP/AD api?  If the account looks normal in AD, then you might want to troubleshoot the access venue.  The different ways AD gets exposed by have different subtle issues.
0
 
childersjAuthor Commented:
I'm not sure honestly what API it is using.  I believe Business Objects is Java based; however I did figure out the problem and it was that the attribute 'logon to' didn't specify the domain controller.  Once I added it there, it worked just fine.  I didn't think that it would work that way and slightly confused about why it does, but at least it is working now.  I just wish I could find some documentation about exactly how that attribute works.  Most of the documents on technet and the books I have basically just say that it controlls which systems you can access which is not a particuarly helpful description as it states the obvious and doesn't really describe how it works.  I appreciate all of the help.
0
 
techhealthCommented:
It's entirely possible that BO misused the ADSI API calls...  "Logon to" really just refers to whether an account/app is allowed to log on interactively to a machine (in your case DC), which is unnecessary for just authenticating users.  Glad you got it working anyway...
0

Featured Post

Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

  • 5
  • 5
  • 2
  • +1
Tackle projects and never again get stuck behind a technical roadblock.
Join Now