[Last Call] Learn how to a build a cloud-first strategyRegister Now


What AD rights user should have to manage OU?

Posted on 2012-09-18
Medium Priority
Last Modified: 2012-09-18
How can I assign rights to the OU to the user have right to create sub OUs?  It seems like when I assign using delegate or security tab, it only gives permissions to the that top level OU.
Please help.
Question by:Tiras25
LVL 17

Expert Comment

by:Brad Bouchard
ID: 38411718
Right click the OU and click Delegate Control

Should solve your issues.
LVL 17

Expert Comment

by:Brad Bouchard
ID: 38411725
Excuse me for being brash on my first comment and being mistaken.  Right click the domain and then select delegate control.  It will bring up a wizard for exactly what you're trying to do.
LVL 17

Author Comment

ID: 38411779
Well, I don't want to delegate to the whole Domain.  Specific OU only.
Fill in the form and get your FREE NFR key NOW!

Veeam is happy to provide a FREE NFR server license to certified engineers, trainers, and bloggers.  It allows for the non‑production use of Veeam Agent for Microsoft Windows. This license is valid for five workstations and two servers.

LVL 18

Assisted Solution

by:Sarang Tinguria
Sarang Tinguria earned 1000 total points
ID: 38411783

Please use below link and achive the rights which you want to delegate
LVL 57

Accepted Solution

Mike Kline earned 1000 total points
ID: 38411833
So you can right click on an OU and also run the delegation control wizard.  You can create a custom task then select "only the following objects in the folder" and go from there

Do you want them to have any additional rights in the OU.


LVL 17

Author Comment

ID: 38411859
Yes all the rights in the OU is fine.

Featured Post

Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It’s time for spooky stories and consuming way too much sugar, including the many treats we’ve whipped for you in the world of tech. Check it out!
Phishing emails are a popular malware delivery vehicle for attack.  While there are many ways for an attacker to increase the chances of success for their phishing emails, one of the most effective methods involves spoofing the message to appear to …
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Suggested Courses

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question