2005-07-27 04:23:09 +04:00
dn: CN=Administrator,CN=Users,${BASEDN}
objectClass: user
cn: Administrator
description: Built-in account for administering the computer/domain
memberOf: CN=Group Policy Creator Owners,CN=Users,${BASEDN}
memberOf: CN=Domain Admins,CN=Users,${BASEDN}
memberOf: CN=Enterprise Admins,CN=Users,${BASEDN}
memberOf: CN=Schema Admins,CN=Users,${BASEDN}
memberOf: CN=Administrators,CN=Builtin,${BASEDN}
2006-06-13 00:00:18 +04:00
userAccountControl: 66048
2005-07-27 04:23:09 +04:00
objectSid: ${DOMAINSID}-500
adminCount: 1
accountExpires: -1
sAMAccountName: Administrator
isCriticalSystemObject: TRUE
2006-01-05 09:53:39 +03:00
sambaPassword: ${ADMINPASS}
2005-07-27 04:23:09 +04:00
dn: CN=Guest,CN=Users,${BASEDN}
objectClass: user
cn: Guest
description: Built-in account for guest access to the computer/domain
memberOf: CN=Guests,CN=Builtin,${BASEDN}
2006-06-13 00:00:18 +04:00
userAccountControl: 66082
2005-07-27 04:23:09 +04:00
primaryGroupID: 514
objectSid: ${DOMAINSID}-501
sAMAccountName: Guest
isCriticalSystemObject: TRUE
dn: CN=Administrators,CN=Builtin,${BASEDN}
objectClass: top
objectClass: group
cn: Administrators
description: Administrators have complete and unrestricted access to the computer/domain
member: CN=Domain Admins,CN=Users,${BASEDN}
member: CN=Enterprise Admins,CN=Users,${BASEDN}
member: CN=Administrator,CN=Users,${BASEDN}
objectSid: S-1-5-32-544
adminCount: 1
sAMAccountName: Administrators
2006-06-13 00:00:18 +04:00
sAMAccountType: 536870912
systemFlags: 2348810240
groupType: 2147483653
2007-01-05 19:12:30 +03:00
objectCategory: CN=Group,${SCHEMADN}
2005-07-27 04:23:09 +04:00
isCriticalSystemObject: TRUE
privilege: SeSecurityPrivilege
privilege: SeBackupPrivilege
privilege: SeRestorePrivilege
privilege: SeSystemtimePrivilege
privilege: SeShutdownPrivilege
privilege: SeRemoteShutdownPrivilege
privilege: SeTakeOwnershipPrivilege
privilege: SeDebugPrivilege
privilege: SeSystemEnvironmentPrivilege
privilege: SeSystemProfilePrivilege
privilege: SeProfileSingleProcessPrivilege
privilege: SeIncreaseBasePriorityPrivilege
privilege: SeLoadDriverPrivilege
privilege: SeCreatePagefilePrivilege
privilege: SeIncreaseQuotaPrivilege
privilege: SeChangeNotifyPrivilege
privilege: SeUndockPrivilege
privilege: SeManageVolumePrivilege
privilege: SeImpersonatePrivilege
privilege: SeCreateGlobalPrivilege
privilege: SeEnableDelegationPrivilege
privilege: SeInteractiveLogonRight
privilege: SeNetworkLogonRight
privilege: SeRemoteInteractiveLogonRight
r16264: Add, but do not yet enable, the partitions module.
This required changes to the rootDSE module, to allow registration of
partitions. In doing so I renamed the 'register' operation to
'register_control' and 'register_partition', which changed a few more
modules.
Due to the behaviour of certain LDAP servers, we create the baseDN
entry in two parts: Firstly, we allow the admin to export a simple
LDIF file to add to their server. Then we perform a modify to add the
remaining attributes.
To delete all users in partitions, we must now search and delete all
objects in the partition, rather than a simple search from the root.
Against LDAP, this might not delete all objects, so we allow this to
fail.
In testing, we found that the 'Domain Controllers' container was
misnamed, and should be 'CN=', rather than 'OU='.
To avoid the Templates being found in default searches, they have been
moved to CN=Templates from CN=Templates,${BASEDN}.
Andrew Bartlett
(This used to be commit b49a4fbb57f10726bd288fdc9fc95c0cbbe9094a)
2006-06-15 22:04:24 +04:00
dn: CN=${NETBIOSNAME},CN=Domain Controllers,${BASEDN}
2005-07-27 04:23:09 +04:00
objectClass: computer
cn: ${NETBIOSNAME}
userAccountControl: 532480
localPolicyFlags: 0
primaryGroupID: 516
accountExpires: 9223372036854775807
sAMAccountName: ${NETBIOSNAME}$
sAMAccountType: 805306369
operatingSystem: Samba
operatingSystemVersion: 4.0
dNSHostName: ${DNSNAME}
isCriticalSystemObject: TRUE
2006-01-05 09:53:39 +03:00
sambaPassword: ${MACHINEPASS}
2005-07-27 04:23:09 +04:00
servicePrincipalName: HOST/${DNSNAME}
servicePrincipalName: HOST/${NETBIOSNAME}
2005-10-28 09:16:25 +04:00
servicePrincipalName: HOST/${DNSNAME}/${REALM}
servicePrincipalName: HOST/${NETBIOSNAME}/${REALM}
servicePrincipalName: HOST/${DNSNAME}/${DOMAIN}
servicePrincipalName: HOST/${NETBIOSNAME}/${DOMAIN}
2006-08-28 09:26:42 +04:00
${HOSTGUID_ADD}
2005-07-27 04:23:09 +04:00
dn: CN=Users,CN=Builtin,${BASEDN}
objectClass: top
objectClass: group
cn: Users
description: Users are prevented from making accidental or intentional system-wide changes. Thus, Users can run certified applications, but not most legacy applications
member: CN=Domain Users,CN=Users,${BASEDN}
objectSid: S-1-5-32-545
sAMAccountName: Users
2006-06-13 00:00:18 +04:00
sAMAccountType: 536870912
systemFlags: 2348810240
groupType: 2147483653
2007-01-05 19:12:30 +03:00
objectCategory: CN=Group,${SCHEMADN}
2005-07-27 04:23:09 +04:00
isCriticalSystemObject: TRUE
dn: CN=Guests,CN=Builtin,${BASEDN}
objectClass: top
objectClass: group
cn: Guests
description: Guests have the same access as members of the Users group by default, except for the Guest account which is further restricted
member: CN=Domain Guests,CN=Users,${BASEDN}
member: CN=Guest,CN=Users,${BASEDN}
objectSid: S-1-5-32-546
sAMAccountName: Guests
2006-06-13 00:00:18 +04:00
sAMAccountType: 536870912
systemFlags: 2348810240
groupType: 2147483653
2007-01-05 19:12:30 +03:00
objectCategory: CN=Group,${SCHEMADN}
2005-07-27 04:23:09 +04:00
isCriticalSystemObject: TRUE
dn: CN=Print Operators,CN=Builtin,${BASEDN}
objectClass: top
objectClass: group
cn: Print Operators
description: Members can administer domain printers
objectSid: S-1-5-32-550
adminCount: 1
sAMAccountName: Print Operators
2006-06-13 00:00:18 +04:00
sAMAccountType: 536870912
systemFlags: 2348810240
groupType: 2147483653
2007-01-05 19:12:30 +03:00
objectCategory: CN=Group,${SCHEMADN}
2005-07-27 04:23:09 +04:00
isCriticalSystemObject: TRUE
privilege: SeLoadDriverPrivilege
privilege: SeShutdownPrivilege
privilege: SeInteractiveLogonRight
dn: CN=Backup Operators,CN=Builtin,${BASEDN}
objectClass: top
objectClass: group
cn: Backup Operators
description: Backup Operators can override security restrictions for the sole purpose of backing up or restoring files
objectSid: S-1-5-32-551
adminCount: 1
sAMAccountName: Backup Operators
2006-06-13 00:00:18 +04:00
sAMAccountType: 536870912
systemFlags: 2348810240
groupType: 2147483653
2007-01-05 19:12:30 +03:00
objectCategory: CN=Group,${SCHEMADN}
2005-07-27 04:23:09 +04:00
isCriticalSystemObject: TRUE
privilege: SeBackupPrivilege
privilege: SeRestorePrivilege
privilege: SeShutdownPrivilege
privilege: SeInteractiveLogonRight
dn: CN=Replicator,CN=Builtin,${BASEDN}
objectClass: top
objectClass: group
cn: Replicator
description: Supports file replication in a domain
objectSid: S-1-5-32-552
adminCount: 1
sAMAccountName: Replicator
2006-06-13 00:00:18 +04:00
sAMAccountType: 536870912
systemFlags: 2348810240
groupType: 2147483653
2007-01-05 19:12:30 +03:00
objectCategory: CN=Group,${SCHEMADN}
2005-07-27 04:23:09 +04:00
isCriticalSystemObject: TRUE
dn: CN=Remote Desktop Users,CN=Builtin,${BASEDN}
objectClass: top
objectClass: group
cn: Remote Desktop Users
description: Members in this group are granted the right to logon remotely
objectSid: S-1-5-32-555
sAMAccountName: Remote Desktop Users
2006-06-13 00:00:18 +04:00
sAMAccountType: 536870912
systemFlags: 2348810240
groupType: 2147483653
2007-01-05 19:12:30 +03:00
objectCategory: CN=Group,${SCHEMADN}
2005-07-27 04:23:09 +04:00
isCriticalSystemObject: TRUE
dn: CN=Network Configuration Operators,CN=Builtin,${BASEDN}
objectClass: top
objectClass: group
cn: Network Configuration Operators
description: Members in this group can have some administrative privileges to manage configuration of networking features
objectSid: S-1-5-32-556
sAMAccountName: Network Configuration Operators
2006-06-13 00:00:18 +04:00
sAMAccountType: 536870912
systemFlags: 2348810240
groupType: 2147483653
2007-01-05 19:12:30 +03:00
objectCategory: CN=Group,${SCHEMADN}
2005-07-27 04:23:09 +04:00
isCriticalSystemObject: TRUE
dn: CN=Performance Monitor Users,CN=Builtin,${BASEDN}
objectClass: top
objectClass: group
cn: Performance Monitor Users
description: Members of this group have remote access to monitor this computer
objectSid: S-1-5-32-558
sAMAccountName: Performance Monitor Users
2006-06-13 00:00:18 +04:00
sAMAccountType: 536870912
systemFlags: 2348810240
groupType: 2147483653
2007-01-05 19:12:30 +03:00
objectCategory: CN=Group,${SCHEMADN}
2005-07-27 04:23:09 +04:00
isCriticalSystemObject: TRUE
dn: CN=Performance Log Users,CN=Builtin,${BASEDN}
objectClass: top
objectClass: group
cn: Performance Log Users
description: Members of this group have remote access to schedule logging of performance counters on this computer
objectSid: S-1-5-32-559
sAMAccountName: Performance Log Users
2006-06-13 00:00:18 +04:00
sAMAccountType: 536870912
systemFlags: 2348810240
groupType: 2147483653
2007-01-05 19:12:30 +03:00
objectCategory: CN=Group,${SCHEMADN}
2005-07-27 04:23:09 +04:00
isCriticalSystemObject: TRUE
dn: CN=krbtgt,CN=Users,${BASEDN}
objectClass: top
objectClass: person
objectClass: organizationalPerson
objectClass: user
cn: krbtgt
description: Key Distribution Center Service Account
showInAdvancedViewOnly: TRUE
userAccountControl: 514
objectSid: ${DOMAINSID}-502
adminCount: 1
accountExpires: 9223372036854775807
sAMAccountName: krbtgt
sAMAccountType: 805306368
servicePrincipalName: kadmin/changepw
isCriticalSystemObject: TRUE
2006-01-05 09:53:39 +03:00
sambaPassword: ${KRBTGTPASS}
2005-07-27 04:23:09 +04:00
dn: CN=Domain Computers,CN=Users,${BASEDN}
objectClass: top
objectClass: group
cn: Domain Computers
description: All workstations and servers joined to the domain
objectSid: ${DOMAINSID}-515
sAMAccountName: Domain Computers
2007-01-05 19:12:30 +03:00
objectCategory: CN=Group,${SCHEMADN}
2005-07-27 04:23:09 +04:00
isCriticalSystemObject: TRUE
dn: CN=Domain Controllers,CN=Users,${BASEDN}
objectClass: top
objectClass: group
cn: Domain Controllers
description: All domain controllers in the domain
objectSid: ${DOMAINSID}-516
adminCount: 1
sAMAccountName: Domain Controllers
isCriticalSystemObject: TRUE
dn: CN=Schema Admins,CN=Users,${BASEDN}
objectClass: top
objectClass: group
cn: Schema Admins
description: Designated administrators of the schema
member: CN=Administrator,CN=Users,${BASEDN}
objectSid: ${DOMAINSID}-518
adminCount: 1
sAMAccountName: Schema Admins
isCriticalSystemObject: TRUE
dn: CN=Enterprise Admins,CN=Users,${BASEDN}
objectClass: top
objectClass: group
cn: Enterprise Admins
description: Designated administrators of the enterprise
member: CN=Administrator,CN=Users,${BASEDN}
memberOf: CN=Administrators,CN=Builtin,${BASEDN}
objectSid: ${DOMAINSID}-519
adminCount: 1
sAMAccountName: Enterprise Admins
isCriticalSystemObject: TRUE
dn: CN=Cert Publishers,CN=Users,${BASEDN}
objectClass: top
objectClass: group
cn: Cert Publishers
description: Members of this group are permitted to publish certificates to the Active Directory
2006-06-13 00:00:18 +04:00
groupType: 2147483652
sAMAccountType: 536870912
2005-07-27 04:23:09 +04:00
objectSid: ${DOMAINSID}-517
sAMAccountName: Cert Publishers
2007-01-05 19:12:30 +03:00
objectCategory: CN=Group,${SCHEMADN}
2005-07-27 04:23:09 +04:00
isCriticalSystemObject: TRUE
dn: CN=Domain Admins,CN=Users,${BASEDN}
objectClass: top
objectClass: group
cn: Domain Admins
description: Designated administrators of the domain
member: CN=Administrator,CN=Users,${BASEDN}
memberOf: CN=Administrators,CN=Builtin,${BASEDN}
objectSid: ${DOMAINSID}-512
adminCount: 1
sAMAccountName: Domain Admins
isCriticalSystemObject: TRUE
dn: CN=Domain Users,CN=Users,${BASEDN}
objectClass: top
objectClass: group
cn: Domain Users
description: All domain users
memberOf: CN=Users,CN=Builtin,${BASEDN}
objectSid: ${DOMAINSID}-513
sAMAccountName: Domain Users
isCriticalSystemObject: TRUE
dn: CN=Domain Guests,CN=Users,${BASEDN}
objectClass: top
objectClass: group
cn: Domain Guests
description: All domain guests
memberOf: CN=Guests,CN=Builtin,${BASEDN}
objectSid: ${DOMAINSID}-514
sAMAccountName: Domain Guests
isCriticalSystemObject: TRUE
dn: CN=Group Policy Creator Owners,CN=Users,${BASEDN}
objectClass: top
objectClass: group
cn: Group Policy Creator Owners
description: Members in this group can modify group policy for the domain
member: CN=Administrator,CN=Users,${BASEDN}
objectSid: ${DOMAINSID}-520
sAMAccountName: Group Policy Creator Owners
2007-01-05 19:12:30 +03:00
objectCategory: CN=Group,${SCHEMADN}
2005-07-27 04:23:09 +04:00
isCriticalSystemObject: TRUE
dn: CN=RAS and IAS Servers,CN=Users,${BASEDN}
objectClass: top
objectClass: group
cn: RAS and IAS Servers
description: Servers in this group can access remote access properties of users
instanceType: 4
objectSid: ${DOMAINSID}-553
sAMAccountName: RAS and IAS Servers
2006-06-13 00:00:18 +04:00
sAMAccountType: 536870912
groupType: 2147483652
2007-01-05 19:12:30 +03:00
objectCategory: CN=Group,${SCHEMADN}
2005-07-27 04:23:09 +04:00
isCriticalSystemObject: TRUE
dn: CN=Server Operators,CN=Builtin,${BASEDN}
objectClass: top
objectClass: group
cn: Server Operators
description: Members can administer domain servers
instanceType: 4
objectSid: S-1-5-32-549
adminCount: 1
sAMAccountName: Server Operators
2006-06-13 00:00:18 +04:00
sAMAccountType: 536870912
systemFlags: 2348810240
groupType: 2147483653
2007-01-05 19:12:30 +03:00
objectCategory: CN=Group,${SCHEMADN}
2005-07-27 04:23:09 +04:00
isCriticalSystemObject: TRUE
privilege: SeBackupPrivilege
privilege: SeSystemtimePrivilege
privilege: SeRemoteShutdownPrivilege
privilege: SeRestorePrivilege
privilege: SeShutdownPrivilege
privilege: SeInteractiveLogonRight
dn: CN=Account Operators,CN=Builtin,${BASEDN}
objectClass: top
objectClass: group
cn: Account Operators
description: Members can administer domain user and group accounts
instanceType: 4
objectSid: S-1-5-32-548
adminCount: 1
sAMAccountName: Account Operators
2006-06-13 00:00:18 +04:00
sAMAccountType: 536870912
systemFlags: 2348810240
groupType: 2147483653
2007-01-05 19:12:30 +03:00
objectCategory: CN=Group,${SCHEMADN}
2005-07-27 04:23:09 +04:00
isCriticalSystemObject: TRUE
privilege: SeInteractiveLogonRight