Allow members of a group to be unlocked by a specific account on AD
- by JohnLBevan
Background
I'm creating a service to allow support staff to enable their firecall accounts out of hours (i.e. if there's an issue in the night and we can't get hold of someone with admin rights, another member of the support team can enable their personal firecall account on AD, which has previously been setup with admin rights). This service also logs a reason for the change, alerts key people, and a bunch of other bits to ensure that this change of access is audited / so we can ensure these temporary admin rights are used in the proper way.
To do this I need the service account which my service runs under to have permissions to enable users on active directory. Ideally I'd like to lock this down so that the service account can only enable/disable users in a particular AD security group.
Question
How do you grant access to an account to enable/disable users who are members of a particular security group in AD?
Backup Question
If it's not possible to do this by security group, is there a suitable alternative? i.e. could it be done by OU, or would it be best to write a script to loop through all members of the security group and update the permissions on the objects (firecall accounts) themselves?
Thanks in advance.
Additional Tags
(I don't yet have access to create new tags here, so listing below to help with keyword searches until it can be tagged & this bit editted/removed)
DSACLS, DSACLS.EXE, FIRECALL, ACCOUNT, SECURITY-GROUP