Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Read Only User for AD Schema

Posted on 2011-03-18
6
Medium Priority
?
693 Views
Last Modified: 2012-05-11
Is there a way to place a small number of users in a AD group that would give them read only access to the AD schema?  Might have to create a group if there is not a built-in AD group.  Don't want to put them in the Domain Administrator group.
0
Comment
Question by:ljacobs
6 Comments
 
LVL 10

Expert Comment

by:Muzafar Momin
ID: 35165263
you can delegate the rights from AD schema management console by add them in properties -> security tab
0
 
LVL 27

Accepted Solution

by:
KenMcF earned 2000 total points
ID: 35165333
What do you need them to see, are there confidential attributes they need access to? If it is just the standard schema they can install the RSAT or Admin tools depending on OS and register the schema management dll
"regsvr32 schmmgmt.dll"
then add the AD schema to the MMC.
0
 
LVL 51

Expert Comment

by:Netman66
ID: 35168003
All users can read the schema already.  All they need is the console.

0
 

Author Comment

by:ljacobs
ID: 35192333
We are still trying to determine which solution works for us.
0
 
LVL 74

Expert Comment

by:Glen Knight
ID: 37475332
This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.
0

Featured Post

Has Powershell sent you back into the Stone Age?

If managing Active Directory using Windows Powershell® is making you feel like you stepped back in time, you are not alone.  For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…

972 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question