Microsoft KB Archive/279723

= How to grant help-desk personnel the specific right to unlock locked user accounts =

Article ID: 279723

Article Last Modified on 10/30/2006

-

APPLIES TO


 * Microsoft Windows 2000 Server
 * Microsoft Windows 2000 Advanced Server

-



This article was previously published under Q279723



SUMMARY
This article describes how help-desk supervisors or domain administrators can delegate the right to unlock locked user accounts.



MORE INFORMATION
You can use one of the following two methods to accomplish this type of delegation:

Method 1
The DSACLS tool (Dsacls.exe) can facilitate the management of access control lists (ACLs) for directory services. DSACLS enables you to query and manipulate security attributes on Active Directory objects. This tool is the command-line equivalent of the Security page on various Active Directory snap-in tools.

You can use DSACLS to delegate the specific permission to unlock a locked account in the Active Directory Users and Computers snap-in. For example, to delegate the permission to unlock user accounts in a certain organizational unit to a security group, use the following command:

dsacls &quot;ou=ouname,dc=domain,dc=com&quot; /I:s /G &quot;domain\group Name&quot;:rpwp;lockoutTime;user

For an explanation of what each part of the preceding command means:

&quot;ou=ouname,dc=domain,dc=com&quot;: This syntax represents the organizational unit to which you want to delegate authority.

&quot;/i:s&quot;: This syntax means that the permission is inherited onto child objects only.

&quot;/g &quot;domain\group name&quot;:rpwp;lockouttime;user&quot;: This syntax means grant the permission to the Global Security group &quot;Group Name&quot;, grant Read permission and Write permission, grant the permission to the lockoutTime attribute, and grant the permission only to user-type objects.

As another example, to delegate authority to the members of the Help Desk security group over user accounts in the Sales organizational unit in the &quot;ad.company.com&quot; domain (down-level domain name = ad), you can use the following command:

dsacls &quot;ou=sales,dc=ad,dc=company,dc=com&quot; /I:s /G &quot;ad\help desk&quot;:rpwp;lockoutTime;user

Method 2
The ADSIEdit tool (Adsiedit.msc) is a low-level editor of Active Directory. This tool is located on the Windows 2000 CD-ROM in the Support Tools folder. You must select &quot;Typical Install&quot;, and then locate the Support Tools folder.

To use the ADSIEdit tool:
 * 1) Start the ADSIEdit tool (Adsiedit.msc) from the Windows 2000 Support Tools folder.
 * 2) Right-click the container or object that you want to grant this permission to.
 * 3) Click the Security tab.
 * 4) Click Advanced.
 * 5) Click Add, and then specify the user or group that you want to grant this right to.
 * 6) Click the Properties tab.
 * 7) In the Apply onto: drop-down list, click User objects.
 * 8) Click to select the Allow check box that is beside Read lockoutTime and Write lockoutTime.
 * 9) Click to select the Apply these permissions to objects and/or containers within this container only check box.

Note After you modify permissions for a given user, the modified permissions are not exposed in Active Directory Users and Computer in Windows 2000. However, the permissions are exposed in Windows Server 2003. To expose these properties on a Windows 2000 system, modify the DSSEC.DAT file. Set Read Lockout Time and Write Lockout Time =0 in the [USER] Section. For additional information, click the following article number to view the article in the Microsoft Knowledge Base:

296490 How to modify the filtered properties of an object

For more information about the DSACLS tool, refer to the Windows 2000 Support Tools online Help. For additional information about how to reveal an option in the Delegation Wizard, click the following article number to view the article in the Microsoft Knowledge Base:

294952 How to delegate the unlock account right

Keywords: kbenv kbhowto KB279723

-

[mailto:TECHNET@MICROSOFT.COM Send feedback to Microsoft]

© Microsoft Corporation. All rights reserved.