logo

Active Directory Delegation Overview

Understanding Active Directory (AD) permissions is vital for cybersecurity, compliance and business continuity. In this blog, we’ll be going over, at a high level, how Active Directory permission are applied in a domain and how to view them natively.

The most common way to apply Active Directory permissions is through the tool Active Directory Users and Computers (ADUC). There are two ways in ADUC to apply permissions:

  • Using the delegation wizard
  • Navigating to an object and applying permissions directly to the object or its descendants

This blog post will cover both of these options. More experienced administrators or those that are familiar with scripting may choose to apply and review delegated permissions with PowerShell, but we won’t be covering that in this blog.

Active Directory Delegation Wizard

The Active Directory Delegation wizard is an easy-to-use UI for granting permissions to a user or group to perform a certain task. Let’s walk through the steps we would take as an administrator who needs to enables the ‘Help Desk’ group to service password resets for all users in a specific OU.

1. Launch the wizard by right-clicking an OU or container and selecting ‘Delegate Control…’.

Active Directory Delegation 1

The Active Directory Delegation of Control wizard will open:

Active Directory Delegation 2

2. The first step in the wizard is to choose the users or groups we want to grant permissions to:

Active Directory Delegation 3

3. Next, we specify which tasks these objects should be able to perform. We can pick from a list of common tasks or create a custom task to delegate them access to perform. For this example, we’ll stick with the scenario we mentioned, resetting users’ passwords.

Active Directory Delegation 4

4. Finally, you need to confirm your selection by clicking Finish:

Active Directory Delegation 5

As you can see, we’ve granted the ‘Help Desk’ group the right to ‘Reset user passwords and force password change at next logon’ to all descendant users of the ‘SB Test Area’ OU.

Security Tab

Reviewing Permissions

To confirm the permissions we specified in the delegation wizard were applied correctly , we will check the Security tab the ‘SB Test Area’ OU.

1. To view the Security tab on an object, you need to enable Advanced Features in ADUC by choosing ‘Advanced Features’ from the View dropdown menu:

Active Directory Delegation 6

2. Next, right-click the SB Test Area OU and select ‘Properties’; then go to the Security tab:

Active Directory Delegation 7

3. This tab shows us the Access Control List (ACL) for the SB Test Area object, which comprises Access Control Entries (ACEs). If we look through the groups and user accounts that have been applied to the SB Test Area OU ACL, we can find the Help Desk group we added:

Active Directory Delegation 8

4. We can see that this account was granted ‘Special Permissions’, so to view the security permissions we applied, we’ll have to click Advanced. We can see in the screenshot below that the ACE for the ‘Help Desk’ principal is granting ‘Reset Password’ permissions on ‘Descendant User objects’ of the SB Test Area OU.

Active Directory Delegation 9

5. Clicking Edit here lets us review the ACE for the Help Desk principal on the SB Test Area OU.

Active Directory Delegation 10

We can see above that the permission we granted to the Help Desk account on the SB Test Area OU was just ‘Reset password’.

Applying Permissions Directly

Now that we’ve seen how to apply permissions using the delegation wizard, let’s cover how we can apply permissions directly from the Security tab.

Let’s say we want to grant my account the right to modify members of groups in a certain OU.

1. We right-click the desired OU (KevinJSandbox), go to Properties and then open the Security tab:

Active Directory Delegation 11

2. We scroll down and select our account name, Kevin Joyce:

Active Directory Delegation 12

3. Then we click ‘Add…’ As you can see, this granted my account ‘Read’ access rights to the KevinJSandbox OU, but we don’t have a way from this interface to granularly allow group modifications. To do this, we’ll have to click ‘Advanced’. Then we click ‘Edit’ on the ACE for the object we just granted access to:

Active Directory Delegation 13

4. We can see the default ACE that was created when we added my user account; it allows the listing of contents, reading of all properties, and reading of permissions on the KevinJSandbox object only. We’re going to modify this to allow us to also modify the membership of descendant groups in the KevinJSandbox OU. To do this, first, we’ll want to select ‘descendant group objects’ from the ‘Applies to’ dropdown:

Active Directory Delegation 14

The list of permissions allowed to be applied changes based on the object(s) selected in the Applies to field:

Active Directory Delegation 15

5. As you can see from the list above, there is no ‘Modify group membership’ permission under the Permissions entries. To grant the principal the capability to only modify group members of a group, we need to scroll down and select the ‘Write Members’ property as shown in the following screenshot:

Active Directory Delegation 16

Conclusion

As you can see, understanding, applying, analyzing and deleting Active Directory permissions can be very complex. However, there are tools that can help you with permissions management and auditing. In particular, be sure to check out the Netwrix Active Directory Security Solution.

FAQ

What is Active Directory delegation?

Delegating administrative rights enables you to grant users the permissions to perform tasks that require elevated permissions — without assigning them to highly privileged groups like Domain Admins and Account Operators.

How to delegate administrator privileges in Active Directory?

To delegate Active Directory permissions, open the Active Directory Users and Computers console and launch the AD Delegation wizard by right-clicking an organizational unit (OU) or container and selecting ‘Delegate Control…’

How do I check delegation in Active Directory?

In the Users and Computers console, go to the View menu and make sure ‘Advanced Features’ is ticked. Then right-click an OU, choose Properties and go to the Security tab to view the delegated permissions.

Senior Technical Product Manager at Netwrix. Kevin is passionate about cyber-security and holds a Bachelor of Science degree in Digital Forensics from Bloomsburg University of Pennsylvania.