P
plawlor
Hi
I am so confused why this is happening.
So, I login to my ActiveDirectory Domain Controller via RDP, as domain\administrator.
I have scripts in perl/powershell to automatically create accounts which works great.
When someone who logs in with their own account via RDP, that is part of the domain admin group, runs this script, he gets access denied, but if I open script as "administrator" the script works fine.
Now, one of the powershell scripts is get users UID's (so when creating a new account, it chooses +1); administrator this works.
When running the script as a domain-admin group member, only gets list of uid's from domain admin group and not the whole AD.
Is there some setting, to allow all members of the domain-admin group, to have 100% administrative rights.
Also, on the files themselves, unable to edit files, unless opening as "administrator" and all the file permissions are "administrators" group full control, and domain admins group is in the administrators group.
Thanks
Continue reading...
I am so confused why this is happening.
So, I login to my ActiveDirectory Domain Controller via RDP, as domain\administrator.
I have scripts in perl/powershell to automatically create accounts which works great.
When someone who logs in with their own account via RDP, that is part of the domain admin group, runs this script, he gets access denied, but if I open script as "administrator" the script works fine.
Now, one of the powershell scripts is get users UID's (so when creating a new account, it chooses +1); administrator this works.
When running the script as a domain-admin group member, only gets list of uid's from domain admin group and not the whole AD.
Is there some setting, to allow all members of the domain-admin group, to have 100% administrative rights.
Also, on the files themselves, unable to edit files, unless opening as "administrator" and all the file permissions are "administrators" group full control, and domain admins group is in the administrators group.
Thanks
Continue reading...