IF YOU WOULD LIKE TO GET AN ACCOUNT, please write an
email to Administrator. User accounts are meant only to access repo
and report issues and/or generate pull requests.
This is a purpose-specific Git hosting for
BaseALT
projects. Thank you for your understanding!
Только зарегистрированные пользователи имеют доступ к сервису!
Для получения аккаунта, обратитесь к администратору.
Empty authentication data f-n SMBC_get_auth_data() is set to context
in smbc_new_context(). Then this context is set, so there is no need
in smbc_init() anymore.
- Add custom permissions to security tab: create/delete child objects
and read/write properties.
- Add delegation tasks to security tab. Delegation tasks represent
common tasks from RSAT's delegation dialog.
- Extended rights are placed in a separate permissions tab.
- Generic and standard permissions are placed in the common permissions
tab. Common permissions are supplemented by following: list contents,
read/write all properties, delete, delete subtree, read permissions,
modify permissions, modify owner, all validated writes and all extended
rights.
- Add permissions scope selection to the security tab. Corresponding
permissions can be applied to the target object, target and child objects,
only to the child objects or to the child object with specific class.
Delegation tasks are appliable only to target object.
- Changed permissions unsetting behavior: superior permission unsetting
unsets all subordinate permissions too. For example, "Full control"
unsetting unsets all other permissions.
- Fixed test fails, which were caused by arbitrary invalid domain controller
selection.
- Add "Set/unset all" and "Edit" actions to the links tab in the policy OU
widget. "Set/unset all" actions set/unset state (enforced/disabled, depending
on column) for all linked policies. "Edit" action opens GPUI for policy editing.
These actions can be triggered via context menu.
These actions are available for "Enforced" and "Disable" columns
and set/unset corresponding state for all policies. Actions are
triggered via context menu.
Add ACE matching flags, that allows to configure ACE matching.
Depending on which flags are set, ACEs will match inherited ACEs
or ACEs with certain object type. Inheritance matching is necessary
for inherited permissions display, object matching provides correct
ACE search.