官术网_书友最值得收藏!

Controlling administrative rights with RBAC and custom cmdlets

Lync Server 2013 administration uses Role-Based Access Control (RBAC) to assign different levels of access privileges to the users, and to enable them to perform specific administrative tasks. The idea behind RBAC in Lync 2013 is that adding a user to a specific group not only defines the features and administrative tasks they are able to manage but also limits the cmdlets they are able to use in the Lync Management Shell. There are some built-in administrative roles, and we are able to add custom groups for more granular control. Another operation we are able to perform is adding authorized cmdlets to both kinds of groups, expanding the allowed tasks for a specific RBAC role.

Getting ready

In our example, we will use both of the previously mentioned customizations, creating a new customized user group, CsUserModifier, based on the default group CsViewOnlyAdministrator, and adding access to the Set-CsUser cmdlet (to modify properties for existing user accounts).

How to do it...

  1. Create the CSUserModifier user group (with the scope as universal and type as security) in Active Directory.
  2. Open the Lync Server Management Shell and launch the following cmdlet:
    New-CsAdminRole -Identity CsUserModifier -Template CsViewOnlyAdministrator

    The cmdlet will clone the permissions of the CsViewOnlyAdministrator group to the custom group.

  3. Launch the following cmdlet to verify the list of administrative tasks delegated to the new group:
    Get-CsAdminRole CSUserModifier | Select-Object –ExpandProperty cmdlets | fl

    The output will be similar to what is shown in the following screenshot:

    How to do it...
  4. Now, we are able to use the cmdlet customization, adding the Set-CsUser cmdlet to the available tasks:
    Set-CsAdminRole -Identity CsUserModifier -Cmdlets @{add="Set-CsUser"}
  5. The same command, with an @{remove parameter, can be used to remove some administrative tasks that were previously available from a group:
    Set-CsAdminRole -Identity CsUserModifier –Cmdlets @{remove="Get-CSVoiceRoutingPolicy","Get-CSVoiceTestConfiguration"}
  6. Verification of the previously mentioned cmdlet is done using the same process we used in step 2, to verify the list of delegated tasks.
  7. The New-CSAdminRole cmdlet supports the –Cmdlets switch that we saw in step 5, so when defining a custom group role, we are able to add custom cmdlets. A command like the next one could achieve both role customization and cmdlet customization in a single step:
    New-CsAdminRole -Identity CSUserModifier -Template CsViewOnlyAdministrator -Cmdlets @{add="set-CsUser"}

There's more...

As important as it is for security, RBAC has a severe limitation because it is effective only for users that are working with Lync administrative tools from a remote workstation (http://technet.microsoft.com/en-us/library/gg425917.aspx). The controls are not enforced for users who are working locally on the Lync Server (or using a remote PowerShell session). Physical security of our servers is an important topic, and we should address it with all the available solutions (smart card access, doors, cameras, strong passwords, lights-out servers with no physical keyboard or monitor available, and so on).

主站蜘蛛池模板: 桦南县| 余干县| 沅江市| 白沙| 米林县| 仁怀市| 古丈县| 河池市| 罗田县| 泉州市| 家居| 尼木县| 长沙县| 南郑县| 舞阳县| 河西区| 项城市| 历史| 抚远县| 兴山县| 罗城| 诸暨市| 固始县| 济宁市| 瓮安县| 安远县| 开远市| 洛宁县| 合川市| 玉龙| 锡林郭勒盟| 会东县| 卓尼县| 五峰| 尖扎县| 秦安县| 镇雄县| 陇川县| 枝江市| 铜山县| 营口市|