Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow application of applicable user rights assignments for non-domain and disconnected systems #718

Closed
General-Fault opened this issue Aug 18, 2020 · 3 comments · Fixed by #719
Assignees
Labels
bug Something isn't working
Milestone

Comments

@General-Fault
Copy link

Is your feature request related to a problem? Please describe.
Previous to 4.4.0, one could create and apply user rights assignment rules to non-domain joined systems (see issue #362) . Several rules depended on users that would only exist for domain joined systems (see rules V-63871, V-63877, V-63879, V-63873 and V-63875). For these rules it was previously easy to overcome the problem by creating an exception that omitted the domain and forest users. With PR #643, all user rights assignment rules are skipped if the Domain or Forest names are not specified (both must be supplied contrary to the comment in the code) this despite that only 5 out of the 26 user rights assignment rules could not be fully applied for Win10Client (I have not done the analysis for the server rulesets).

Describe the solution you'd like
The windows.UserRightsAssignment resource should be more granular in excluding rules based on whether the value contains a username that requires a domain or forest name. Ideally the rules that included domain and forest level users would still be applied with those users omitted and a warning generated.

Describe alternatives you've considered
The workaround is to continue to use exceptions and a bogus DomainName and ForestName.

Additional context
Our company creates kiosks that are often deployed to DoD sites that are either not part of the domain or are completely disconnected from the network. Despite being disconnected, the Authorization To Operate still requires applying all of the user rights assignment rules including those that are directly related to network access. These machines are provisioned and configured in the factory prior to shipment and necessarily prior to joining a domain. It is our view that the current implementation of the Windows10Client rule in regards to user rights assignment makes this more complicated than it needs to be.

@erjenkin erjenkin self-assigned this Aug 18, 2020
@erjenkin erjenkin added this to the 4.5.0 milestone Aug 18, 2020
@erjenkin erjenkin added the bug Something isn't working label Aug 18, 2020
@erjenkin
Copy link
Member

Hey @General-Fault ,

Good Catch, thanks for the issue. I have updated the composite to handle lack of Domain/Forest and still compile the rules that call for guests and other non-domain/forest identities. Let me know what you think.

Thanks,

Eric

@General-Fault
Copy link
Author

I believe #719 will prevent the issue. One change that I might suggest is that the test for $DomainName be done separately from $domainTranslation.Contains, and similarly for the ForestName, so that you can generate a warning. I found the old warning useful for discovering the problem in my configuration.

@erjenkin
Copy link
Member

Hello @General-Fault,

Closing out this issue as #719 remediated the issue. If you would like to create an issue around adding verbose warnings please do so.

Thanks,

Eric

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working
Projects
None yet
2 participants