Module Overview • Managing Access Overview • Managing NTFS File and Folder Permissions • Assigning Permissions to Shared Resources • Determining Effective Permission... Allow or deny
Trang 1Module 4
Managing Access to Resources in Active Directory® Domain
Services
Trang 2Module Overview
• Managing Access Overview
• Managing NTFS File and Folder Permissions
• Assigning Permissions to Shared Resources
• Determining Effective Permission
Trang 3Lesson 1: Managing Access Overview
• What Are Security Principals?
• What Are Access Tokens?
• What Are Permissions?
• How Access Control Works
Trang 4What Are Security Principals?
Security Principal - A user, group, or computer object that can be
used for authentication and to assign access to resources
Security Principal - A user, group, or computer object that can be
used for authentication and to assign access to resources
Relative ID (RID) - The part of a security ID (SID) that uniquely
identifies an account or group within a domain
Relative ID (RID) - The part of a security ID (SID) that uniquely
identifies an account or group within a domain
Security ID (SID) - A unique value assigned when a user, computer
or security group is created Internal processes in Windows refer to
an account’s SID instead of the account's user or group name
Security ID (SID) - A unique value assigned when a user, computer
or security group is created Internal processes in Windows refer to
an account’s SID instead of the account's user or group name
Security Principal
1454471165- 1004336348- 1606980848- 5555
S-1-5-21-SID
RID DomainID
Trang 5What Are Access Tokens?
User’s Access Token
Subject
Other access information
List of user rights Group SID User SID
Trang 6What Are Permissions?
How are permissions assigned?
Allow or deny permissions can be assigned to a resource (folder, printer, file)
Permissions:
• Are rules to grant or deny access to an object
• Used to control access
Permissions:
• Are rules to grant or deny access to an object
• Used to control access
Permissions can be assigned to accounts from the local computer or from AD DS
Permissions can be explicitly applied, inherited, or
implicitly applied
Trang 7How Access Control Works
Discretionary Access Control List (DACL)
DACL contains a list of users and groups that can access or have been denied access to the resource
Every file and folder on a NTFS volume has an associated DACL
Discretionary Access Control List (DACL)
DACL contains a list of users and groups that can access or have been denied access to the resource
Every file and folder on a NTFS volume has an associated DACL
System Access Control List (SACL)
SACL controls auditing of access to the resource
System Access Control List (SACL)
SACL controls auditing of access to the resource
Access Control Entry (ACE)
Defines each entry in a DACL or SACL Specifies the set of SIDs that are to be allowed, denied or audited
If no ACE is specified within a DACL, access to the resource is denied
Access Control Entry (ACE)
Defines each entry in a DACL or SACL Specifies the set of SIDs that are to be allowed, denied or audited
If no ACE is specified within a DACL, access to the resource is denied
Trang 8Lesson 2: Managing NTFS File and Folder Permissions
• What Are NTFS Permissions?
• What Are Standard and Special Permissions?
• What Is NTFS Permissions Inheritance?
• Effects on NTFS Permissions When Copying and Moving
Files and Folders
Trang 9What Are NTFS Permissions?
Read & Execute List Folder Contents
Modify Read & Execute
Full Control
Deny Permissions take precedence over Allow Permissions
Trang 10What Are Standard and Special Permissions?
Special Permissions
Traverse Folder/ Execute
File Create Folders/Append Data Read Permissions List Folder/ Read Data Write Attributes Change Permissions Read Attributes Write Extended Attributes Take Ownership Read Extended Attributes Delete Subfolders and Files Synchronize
Create Files/Write Data Delete
Standard Permissions
Read List Folder Contents Modify
Write Read & Execute Full Control
Trang 11What Is NTFS Permissions Inheritance?
Blocking
Permission Inheritance can be blocked
Inheritance is used to manage access to resources without assigning explicit permissions to each object
By default, NTFS permissions are inherited in a parent/child relationship
Inheritance is used to manage access to resources without assigning explicit permissions to each object
By default, NTFS permissions are inherited in a parent/child relationship
Blocking can be performed at the file or folder level
Blocking on a folder can be set to propagate the new
permissions to child objects
Trang 12Demonstration: Configuring NTFS Permissions
In this demonstration, you will see how to:
• Configure NTFS permissions
Trang 13Effects on NTFS Permissions When Copying and Moving Files and Folders
• When you copy files and folders, they inherit the
permissions of the destination folder
• When you move files and folders within the same
partition, they keep their permissions
• When you move files and folders to a different
partition, they inherit the permissions of the
Trang 14Lesson 3: Assigning Permissions to Shared Resources
• What Are Shared Folders?
• What Are Administrative Shared Folders?
• Shared Folder Permissions
• Connecting to Shared Folders
• Considerations for Using Shared Folders
• Offline File Configuration and Deployment
Trang 15What Are Shared Folders?
Folders can be shared, but individual files cannot
Shared Folders are folders that allow network access to their contents
Shared Folders are folders that allow network access to their contents
By default the shared folders permission is Full Control for the user that shared the folder
Shared folders can be identified:
Through the MMC Console Share and Storage Management
In Windows Explorer by the two user icon under the folder Through the command line through Net Share
Through Computer Manager under Shared Files
Trang 16What Are Administrative Shared Folders?
Administrative Shares:
• Are hidden shares
• Are not displayed when using Net View or in the
Network view
Administrative Shares:
• Are hidden shares
• Are not displayed when using Net View or in the
Network view
Administrators have full
permissions
Administrators have full
permissions Share permissions cannot be changed Share permissions cannot be changed
Trang 17Shared Folder Permissions
Permission
Read
• Allows for viewing of data in files
• Allows for subfolder browsing
• Programs in the shared folder can be executed
• By default, applied to the Everyone group
Change
• All the permissions in the Read category
• New files and subfolders can be created
• Data in existing files can be modified or removed
• Files and subfolders can be deleted
Full Control • Full permissions included in the Read and Change categories plus permission to change security
settings
Trang 18Demonstration: Creating Shared Folders
In this demonstration, you will see how to:
• Create shared folders
Trang 19Connecting to Shared Folders
Access through UNC:
Naming convention is \\servername\share or \\servername\ share\file
Can be accessed through Windows Explorer, command line, or programmatically
Access through Network:
Uses a graphical tool to browse the network for shares
Works in domain or workgroup mode
Does not show hidden or administrative shares
Access through mapped drives:
Use Windows Explorer or command line to map a drive to \\ servername\share
Trang 20Demonstration: Managing Shared Folders
In this demonstration, you will see how to:
• Manage access to shared folders by using the Share and Storage Management tool
Trang 21Considerations for Using Shared Folders
When creating shared folders:
Use the most restrictive permissions possible
Avoid assigning permissions to individual users, use groups whenever possible
Remember Full Control lets users modify NTFS
permissions Add groups to the Full Control permission group with caution
Add the Authenticated Users group and remove the
Everyone group from the share’s permissions
Trang 22Offline File Configuration and Deployment
When creating offline files:
Select a folder at a networking place, synchronize and then disconnect computer
Make edits to documents on disconnected computer
Reconnect to the computer to the network again to update changes
Files are synchronized automatically
Trang 23Lesson 4: Determining Effective Permission
• What Are Effective NTFS Permissions
• Discussion: Applying NTFS Permissions
• Effects of Combining Shared Folder and NTFS Permissions
• Discussion: Determining Effective NTFS and Shared Folder Permissions
• Considerations for Implementing NTFS and Shared Folder Permissions
Trang 24What Are Effective NTFS Permissions?
Deny takes precedence
Deny takes precedence Permissions can be applied
to a user or a group
Permissions can be applied
to a user or a group
File permissions override folder permissions
File permissions override folder permissions
Creators of file and folders are the owners
Creators of file and folders are the owners
Trang 25Discussion: Applying NTFS Permissions
Users Group
Users Group
Sales Group User1
Users group has
Write for Folder1
Sales group has
Read for Folder1
Users group has
Write for Folder1
Sales group has
Read for Folder1
1
Users group has
Read for Folder1
Sales group has
Write for Folder2
Users group has
Read for Folder1
Sales group has
Write for Folder2
2
Users group has
Modify for Folder1
File2 should only
be available to
Sales group with
Read permission
Users group has
Modify for Folder1
File2 should only
Trang 26Demonstration: Evaluating Effective Permissions
In this demonstration, you will see how to:
• Evaluate effective permissions
Trang 27Effects of Combining Shared Folder and
NTFS Permissions
When combining shared folder and NTFS permissions, the most restrictive permission is applied
Both the share and the NTFS File and Folder
permissions must have the correct permissions,
otherwise the user or group will be implicitly denied access to the resource
Example: If a user or group is given the Share permission
of Read and the NTFS permission of Write, the user or group will only be able to read the file because it is the more
restrictive permission
Trang 28Discussion: Determining Effective NTFS and
Shared Folder Permissions
Class discussion:
• Determine effective NTFS permissions
• Determine shared folder permissions
NTFS Volume
Users Users Group FC
FC FC
FC = Full Control
NTFS Volume
Data Sales Group
Sales Group
Sales Group
2
FC
Sales
Pubs HR FC
Trang 29Considerations for Implementing NTFS and
Shared Folder Permissions
Grant permissions to groups instead of users
Trang 30Lab: Managing Access to Resources
• Exercise 1: Planning a Shared Folder Implementation
(Discussion)
• Exercise 2: Implementing a Shared Folder Implementation
• Exercise 3: Evaluating the Shared Folder Implementation
Logon information
Virtual machine 6419A-NYC-DC1, 6419A-NYC-CL1
User name Administrator , Sven, Dorena
Estimated time: 45 minutes
Trang 31Lab Scenario
Woodgrove Bank is an enterprise that has offices located in several cities throughout the world Woodgrove Bank has deployed AD DS in Windows Server 2008 They have
recently opened a new subsidiary in Toronto, Canada As a network administrator assigned to the new subsidiary, one
of your primary tasks will be to create and manage access
to resources, including the shared folder implementation For example, groups that mirror the departmental
organization of the bank need shared file storage areas
You must also have shared folders to enable files to be
shared during special projects between departments.
Trang 32Lab Review
• To give several of your colleagues access to a shared
folder, what should you do to assign access most
efficiently?
• How could you configure a shared folder that would enable
a department to share files where everyone could add
their files and read those of others, but only a small group
of individuals could edit the contents of all the files?
• Why might you want to use Share and Storage
Management MMC instead of Windows Explorer to create a shared folder?
Trang 33Module Review and Takeaways
• Review questions
• Considerations for managing shared folders and NTFS permissions