These permissions are for a special operation on an Active Directory object, where the operation is not necessarily related to read or write access to a particular attribute on that object.
Extended right | Description |
---|---|
Applies to Computers and Users | |
Receive As Applies to: Computer and User |
Exchange right: allows receiving mail as a given mailbox. |
Send As Applies to: User, computer, and inetOrgPerson |
Exchange right: allows sending mail as the mailbox. |
Send To Applies to: Group |
Exchange right: allows sending to a mailbox. |
Change Password |
Permits changing password on user account. You do need to know the original password to be able to make the change. |
Reset Password Applies to: User, computer, and inetOrgPerson |
Permits resetting password on user account. With this permission, when you reset the password, you do not need to know the original password. |
Applies to Domain-DNS | |
Replicating Directory Changes Applies to: Domain-DNS |
Extended right needed to replicate changes from a given NC. |
Add/Remove Replica In Domain Applies to: Domain-DNS |
Extended right needed to do a replica install. |
Add GUID
Applies to: Domain-DNS |
Extended right needed at the NC root to add an object with a specific GUID. |
Change PDC Applies to: Domain-DNS |
Extended right needed to change the PDC. |
Manage Replication Topology Applies to: Domain-DNS |
Extended right needed to update the replication topology for a given NC. |
Replication Synchronization Applies to: Domain-DNS, DMD, Configuration |
Extended right needed to synchronize replication from a given computer. |
Generate Resultant Set of Policy (Logging) Applies to: Domain-DNS, Organizational-Unit |
The user who has the rights on an organizational unit or domain will be able to generate logging mode Resultant Set of Policy (RSoP) data for the users/computers within the organizational unit. |
Generate Resultant Set of Policy (Planning) Applies to: Domain-DNS, Organizational-Unit |
The user who has the rights on an organizational unit or domain will be able to generate planning mode RSoP data for the users or computers within the organizational unit. |
Applies to NTDS-DSA | |
Allocate Rids | Extended right needed to request RID pool. |
Do Garbage Collection Applies to: NTDS-DSA |
Extended right to force the directory service to do garbage collection. Control right to force the directory service to do garbage collection. |
Recalculate Hierarchy Applies to: NTDS-DSA |
Extended right to force the directory service to recalculate the hierarchy. |
Applies to a Group Policy container | |
Apply Group Policy | Extended right to determine if a Group Policy object applies or not. For a Group Policy object to apply to a user group or computer, the Apply Group Policy and Read permissions must be set. |
Applies to Site | |
Open Connector Queue | Allows opening connector queue. |
A validated write is different from a write permission which does not allow for any value checking. The value checking, or validation, ensures that the value conforms to required semantics, is within a legal range of values, or undergoes some other special checking that would not be performed for a simple low-level write to the property.
Validated write | Description |
---|---|
Add/remove self as member
Applies to: Group |
Validated write permission to enable one to add or remove one's own account from membership of a group. |
Validated write to DNS host name Applies to: Computer |
Validated write permission to enable setting of a DNS host name attribute that is compliant with the computer name and domain name. |
Validated write to service principal name Applies to: Computer |
Validated write permission to enable setting of the SPN attribute which is compliant to the DNS host name of the computer. |
A property set consists of a group of related properties (or attributes). Granting access rights to a property set rather than to individual properties greatly improves performance and simplifies security management.
Password and account lockout properties for the domain are stored in the Directory Service as attributes of the domain object. These properties can also be managed through the user interface using the Domain Security Policy Group Policy object, the values are then sychronized to the Directory Service. Password policies as well as all account policies are domainwide and applied to all members of the domain.
Applies to: DomainProperty set permitting control to a list of domain attributes.
Applies to: DomainProperty set that contains user attributes that describe user e-mail information.
Applies to: Group, UserProperty set containing a set of user attributes that constitute general user information.
Applies to: UserProperty set containing user attributes that describe group membership information.
Applies to: UserProperty set containing user attributes that describe personal user information.
Applies to: Computer, Contact, UserProperty set containing user attributes that describe user public information.
Applies to: Computer, UserSystem Internal: Do not use or modify this right.
Applies to: UserProperty set containing user attributes that describe account restrictions.
Applies to: Computer, UserProperty set containing user attributes that describe user logon information.
Applies to: UserProperty set containing user attributes that describe user web related information.
Applies to: Web Information Contact, UserFor a complete list of Active Directory permissions, see the MSDN home page on the Microsoft Web site(http://www.microsoft.com/).