• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 481
  • Last Modified:

How does the active diretory user attribute 'Log on to' work?

I have a service account that has access only to the two application servers it runs jobs on; however it needs to connect to a domain controller to read active directory for user accounts.  Does it need to be granted the user right for 'log on to' in AD?  How does this permission really work?  
0
childersj
Asked:
childersj
  • 5
  • 5
  • 2
  • +1
1 Solution
 
Krzysztof PytkoSenior Active Directory EngineerCommented:
Just install on his workstation

if XP -> administrative tools
if 7 -> RSAT

and he will use dsa.msc console to see AD Users and Computers without need to log on to the DC

Regards,
Krzysztof
0
 
childersjAuthor Commented:
Hmm, thats not really what I was looking for.  This is for business objects application that will be used to read out of AD and populate the information in business objects.  We will be authenticating users through this as well.  It needs to go through AD.  I'm not sure exactly what locking down the 'log on to' feature prevents from happening which is what I am trying to find out.  I don't know if it is talking about interactive logons or if it would block the ldap call to the DC as well.
0
 
Krzysztof PytkoSenior Active Directory EngineerCommented:
It blocks interactive logon. You can still query AD using LDAP syntax. Allowing users direct access to the DC is bad practice. If you can avoid that, do not allow them log on locally to the DCs.

I think that this application would query LDAP for atributes. In case that it needs to write any of them, please make sure that users working with that app, will have delegated apropriate rights to those objects.

Krzysztof
0
Creating Active Directory Users from a Text File

If your organization has a need to mass-create AD user accounts, watch this video to see how its done without the need for scripting or other unnecessary complexities.

 
childersjAuthor Commented:
They only need read acces to AD, no writes.  They do not need the ability to log on to the DC, only to query for objects/attributes.  Not sure why this isn't working.
0
 
Krzysztof PytkoSenior Active Directory EngineerCommented:
Do you see any error message or error in event log ?
0
 
BobintheNocCommented:
The Log On To: is a method to restrict users from logging into, interactively, all computers in the domain.  By identifying specific computernames, typically workstations, in the LOG ON TO section, the user will ONLY be allowed to log on to those machines.

So, example, if JaneDoe user is only supposed to be allowed to log on to a single workstation in your company, you'd add the desired workstation to the Log On To list.
0
 
childersjAuthor Commented:
NO, that is the strange part, I don't see any errors anywhere.
0
 
Krzysztof PytkoSenior Active Directory EngineerCommented:
What happens if your run grant that user local administrator rights and run this app?
0
 
childersjAuthor Commented:
Not able to grant local admin rights to this app.  This is a secured environment.  It doesn't need to have any admin rights.  I just checked AD and it has rights to read all attributes and permissions.  All attirbute lookups are default which is correct and distinguised name is correct.  I have no idea what else could be going on.
0
 
Krzysztof PytkoSenior Active Directory EngineerCommented:
OK, secured environment? Firewall issues?

0
 
techhealthCommented:
How does the service account "connect to a domain controller to read active directory for user accounts"?  Via what kind of LDAP/AD api?  If the account looks normal in AD, then you might want to troubleshoot the access venue.  The different ways AD gets exposed by have different subtle issues.
0
 
childersjAuthor Commented:
I'm not sure honestly what API it is using.  I believe Business Objects is Java based; however I did figure out the problem and it was that the attribute 'logon to' didn't specify the domain controller.  Once I added it there, it worked just fine.  I didn't think that it would work that way and slightly confused about why it does, but at least it is working now.  I just wish I could find some documentation about exactly how that attribute works.  Most of the documents on technet and the books I have basically just say that it controlls which systems you can access which is not a particuarly helpful description as it states the obvious and doesn't really describe how it works.  I appreciate all of the help.
0
 
techhealthCommented:
It's entirely possible that BO misused the ADSI API calls...  "Logon to" really just refers to whether an account/app is allowed to log on interactively to a machine (in your case DC), which is unnecessary for just authenticating users.  Glad you got it working anyway...
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Making Bulk Changes to Active Directory

Watch this video to see how easy it is to make mass changes to Active Directory from an external text file without using complicated scripts.

  • 5
  • 5
  • 2
  • +1
Tackle projects and never again get stuck behind a technical roadblock.
Join Now