2009-10-02 17:21:17 +04:00
# Add default primary groups (domain users, domain guests, domain computers &
# domain controllers) - needed for the users to find valid primary groups
# (samldb module)
2009-08-26 05:51:45 +04:00
dn: CN=Domain Users,CN=Users,${DOMAINDN}
objectClass: top
objectClass: group
description: All domain users
objectSid: ${DOMAINSID}-513
sAMAccountName: Domain Users
isCriticalSystemObject: TRUE
dn: CN=Domain Guests,CN=Users,${DOMAINDN}
objectClass: top
objectClass: group
description: All domain guests
objectSid: ${DOMAINSID}-514
sAMAccountName: Domain Guests
isCriticalSystemObject: TRUE
2009-10-02 17:21:17 +04:00
dn: CN=Domain Computers,CN=Users,${DOMAINDN}
objectClass: top
objectClass: group
description: All workstations and servers joined to the domain
objectSid: ${DOMAINSID}-515
sAMAccountName: Domain Computers
isCriticalSystemObject: TRUE
dn: CN=Domain Controllers,CN=Users,${DOMAINDN}
objectClass: top
objectClass: group
description: All domain controllers in the domain
objectSid: ${DOMAINSID}-516
adminCount: 1
sAMAccountName: Domain Controllers
isCriticalSystemObject: TRUE
2009-08-26 05:51:45 +04:00
# Add users
2007-01-05 20:40:43 +03:00
dn: CN=Administrator,CN=Users,${DOMAINDN}
2005-07-27 04:23:09 +04:00
objectClass: user
description: Built-in account for administering the computer/domain
2006-06-13 00:00:18 +04:00
userAccountControl: 66048
2005-07-27 04:23:09 +04:00
objectSid: ${DOMAINSID}-500
adminCount: 1
2008-03-06 14:56:49 +03:00
accountExpires: 9223372036854775807
2005-07-27 04:23:09 +04:00
sAMAccountName: Administrator
2008-07-12 09:26:42 +04:00
userPassword:: ${ADMINPASS_B64}
2009-07-10 14:48:18 +04:00
isCriticalSystemObject: TRUE
2005-07-27 04:23:09 +04:00
2007-01-05 20:40:43 +03:00
dn: CN=Guest,CN=Users,${DOMAINDN}
2005-07-27 04:23:09 +04:00
objectClass: user
description: Built-in account for guest access to the computer/domain
2006-06-13 00:00:18 +04:00
userAccountControl: 66082
2005-07-27 04:23:09 +04:00
primaryGroupID: 514
objectSid: ${DOMAINSID}-501
sAMAccountName: Guest
isCriticalSystemObject: TRUE
2007-11-07 07:35:16 +03:00
dn: CN=krbtgt,CN=Users,${DOMAINDN}
objectClass: top
objectClass: person
objectClass: organizationalPerson
objectClass: user
description: Key Distribution Center Service Account
showInAdvancedViewOnly: TRUE
userAccountControl: 514
objectSid: ${DOMAINSID}-502
adminCount: 1
accountExpires: 9223372036854775807
sAMAccountName: krbtgt
servicePrincipalName: kadmin/changepw
2008-07-12 09:26:42 +04:00
userPassword:: ${KRBTGTPASS_B64}
2009-07-10 14:48:18 +04:00
isCriticalSystemObject: TRUE
2007-11-07 07:35:16 +03:00
2009-08-26 05:51:45 +04:00
# Add other groups
dn: CN=Enterprise Admins,CN=Users,${DOMAINDN}
objectClass: top
objectClass: group
description: Designated administrators of the enterprise
member: CN=Administrator,CN=Users,${DOMAINDN}
objectSid: ${DOMAINSID}-519
adminCount: 1
sAMAccountName: Enterprise Admins
isCriticalSystemObject: TRUE
2007-11-07 07:35:16 +03:00
dn: CN=Schema Admins,CN=Users,${DOMAINDN}
objectClass: top
objectClass: group
description: Designated administrators of the schema
member: CN=Administrator,CN=Users,${DOMAINDN}
objectSid: ${DOMAINSID}-518
adminCount: 1
sAMAccountName: Schema Admins
isCriticalSystemObject: TRUE
dn: CN=Cert Publishers,CN=Users,${DOMAINDN}
objectClass: top
objectClass: group
description: Members of this group are permitted to publish certificates to the Active Directory
2008-08-22 15:26:32 +04:00
groupType: -2147483644
2007-11-07 07:35:16 +03:00
objectSid: ${DOMAINSID}-517
sAMAccountName: Cert Publishers
isCriticalSystemObject: TRUE
dn: CN=Domain Admins,CN=Users,${DOMAINDN}
objectClass: top
objectClass: group
description: Designated administrators of the domain
member: CN=Administrator,CN=Users,${DOMAINDN}
objectSid: ${DOMAINSID}-512
adminCount: 1
sAMAccountName: Domain Admins
isCriticalSystemObject: TRUE
dn: CN=Group Policy Creator Owners,CN=Users,${DOMAINDN}
objectClass: top
objectClass: group
description: Members in this group can modify group policy for the domain
member: CN=Administrator,CN=Users,${DOMAINDN}
objectSid: ${DOMAINSID}-520
sAMAccountName: Group Policy Creator Owners
isCriticalSystemObject: TRUE
dn: CN=RAS and IAS Servers,CN=Users,${DOMAINDN}
objectClass: top
objectClass: group
description: Servers in this group can access remote access properties of users
objectSid: ${DOMAINSID}-553
sAMAccountName: RAS and IAS Servers
2008-08-22 15:26:32 +04:00
groupType: -2147483644
2007-11-07 07:35:16 +03:00
isCriticalSystemObject: TRUE
2008-09-30 03:01:07 +04:00
dn: CN=Read-Only Domain Controllers,CN=Users,${DOMAINDN}
objectClass: top
objectClass: group
2009-11-17 21:46:59 +03:00
description: Read-only domain controllers
2008-09-30 03:01:07 +04:00
objectSid: ${DOMAINSID}-521
sAMAccountName: Read-Only Domain Controllers
groupType: -2147483644
isCriticalSystemObject: TRUE
dn: CN=Enterprise Read-Only Domain Controllers,CN=Users,${DOMAINDN}
objectClass: top
objectClass: group
2009-11-17 21:46:59 +03:00
description: Enterprise read-only domain controllers
2008-09-30 03:01:07 +04:00
objectSid: ${DOMAINSID}-498
sAMAccountName: Enterprise Read-Only Domain Controllers
groupType: -2147483644
isCriticalSystemObject: TRUE
dn: CN=Certificate Service DCOM Access,CN=Users,${DOMAINDN}
objectClass: top
objectClass: group
description: Certificate Service DCOM Access
objectSid: ${DOMAINSID}-574
sAMAccountName: Certificate Service DCOM Access
groupType: -2147483644
isCriticalSystemObject: TRUE
dn: CN=Cryptographic Operators,CN=Users,${DOMAINDN}
objectClass: top
objectClass: group
description: Cryptographic Operators
objectSid: ${DOMAINSID}-569
sAMAccountName: Cryptographic Operators
groupType: -2147483644
isCriticalSystemObject: TRUE
dn: CN=Event Log Readers,CN=Users,${DOMAINDN}
objectClass: top
objectClass: group
description: Event Log Readers
objectSid: ${DOMAINSID}-573
sAMAccountName: Event Log Readers
groupType: -2147483644
isCriticalSystemObject: TRUE
2009-09-06 21:57:50 +04:00
# Add foreign security principals
dn: CN=S-1-5-4,CN=ForeignSecurityPrincipals,${DOMAINDN}
objectClass: top
objectClass: foreignSecurityPrincipal
objectSid: S-1-5-4
dn: CN=S-1-5-9,CN=ForeignSecurityPrincipals,${DOMAINDN}
objectClass: top
objectClass: foreignSecurityPrincipal
objectSid: S-1-5-9
dn: CN=S-1-5-11,CN=ForeignSecurityPrincipals,${DOMAINDN}
objectClass: top
objectClass: foreignSecurityPrincipal
objectSid: S-1-5-11
dn: CN=S-1-5-20,CN=ForeignSecurityPrincipals,${DOMAINDN}
objectClass: top
objectClass: foreignSecurityPrincipal
objectSid: S-1-5-20
# Add builtin objects
2007-01-05 20:40:43 +03:00
dn: CN=Administrators,CN=Builtin,${DOMAINDN}
2005-07-27 04:23:09 +04:00
objectClass: top
objectClass: group
description: Administrators have complete and unrestricted access to the computer/domain
2007-01-05 20:40:43 +03:00
member: CN=Domain Admins,CN=Users,${DOMAINDN}
member: CN=Enterprise Admins,CN=Users,${DOMAINDN}
member: CN=Administrator,CN=Users,${DOMAINDN}
2005-07-27 04:23:09 +04:00
objectSid: S-1-5-32-544
adminCount: 1
sAMAccountName: Administrators
2009-06-30 15:54:45 +04:00
systemFlags: -1946157056
2008-08-22 15:26:32 +04:00
groupType: -2147483643
2009-07-10 14:48:18 +04:00
isCriticalSystemObject: TRUE
2005-07-27 04:23:09 +04:00
2007-01-05 20:40:43 +03:00
dn: CN=Users,CN=Builtin,${DOMAINDN}
2005-07-27 04:23:09 +04:00
objectClass: top
objectClass: group
description: Users are prevented from making accidental or intentional system-wide changes. Thus, Users can run certified applications, but not most legacy applications
2007-01-05 20:40:43 +03:00
member: CN=Domain Users,CN=Users,${DOMAINDN}
2009-09-06 21:57:50 +04:00
member: CN=S-1-5-4,CN=ForeignSecurityPrincipals,${DOMAINDN}
member: CN=S-1-5-11,CN=ForeignSecurityPrincipals,${DOMAINDN}
2005-07-27 04:23:09 +04:00
objectSid: S-1-5-32-545
sAMAccountName: Users
2009-06-30 15:54:45 +04:00
systemFlags: -1946157056
2008-08-22 15:26:32 +04:00
groupType: -2147483643
2005-07-27 04:23:09 +04:00
isCriticalSystemObject: TRUE
2007-01-05 20:40:43 +03:00
dn: CN=Guests,CN=Builtin,${DOMAINDN}
2005-07-27 04:23:09 +04:00
objectClass: top
objectClass: group
description: Guests have the same access as members of the Users group by default, except for the Guest account which is further restricted
2007-01-05 20:40:43 +03:00
member: CN=Domain Guests,CN=Users,${DOMAINDN}
member: CN=Guest,CN=Users,${DOMAINDN}
2005-07-27 04:23:09 +04:00
objectSid: S-1-5-32-546
sAMAccountName: Guests
2009-06-30 15:54:45 +04:00
systemFlags: -1946157056
2008-08-22 15:26:32 +04:00
groupType: -2147483643
2005-07-27 04:23:09 +04:00
isCriticalSystemObject: TRUE
2007-01-05 20:40:43 +03:00
dn: CN=Print Operators,CN=Builtin,${DOMAINDN}
2005-07-27 04:23:09 +04:00
objectClass: top
objectClass: group
description: Members can administer domain printers
objectSid: S-1-5-32-550
adminCount: 1
sAMAccountName: Print Operators
2009-06-30 15:54:45 +04:00
systemFlags: -1946157056
2008-08-22 15:26:32 +04:00
groupType: -2147483643
2009-07-10 14:48:18 +04:00
isCriticalSystemObject: TRUE
2005-07-27 04:23:09 +04:00
2007-01-05 20:40:43 +03:00
dn: CN=Backup Operators,CN=Builtin,${DOMAINDN}
2005-07-27 04:23:09 +04:00
objectClass: top
objectClass: group
description: Backup Operators can override security restrictions for the sole purpose of backing up or restoring files
objectSid: S-1-5-32-551
adminCount: 1
sAMAccountName: Backup Operators
2009-06-30 15:54:45 +04:00
systemFlags: -1946157056
2008-08-22 15:26:32 +04:00
groupType: -2147483643
2009-07-10 14:48:18 +04:00
isCriticalSystemObject: TRUE
2005-07-27 04:23:09 +04:00
2007-01-05 20:40:43 +03:00
dn: CN=Replicator,CN=Builtin,${DOMAINDN}
2005-07-27 04:23:09 +04:00
objectClass: top
objectClass: group
description: Supports file replication in a domain
objectSid: S-1-5-32-552
adminCount: 1
sAMAccountName: Replicator
2009-06-30 15:54:45 +04:00
systemFlags: -1946157056
2008-08-22 15:26:32 +04:00
groupType: -2147483643
2005-07-27 04:23:09 +04:00
isCriticalSystemObject: TRUE
2007-01-05 20:40:43 +03:00
dn: CN=Remote Desktop Users,CN=Builtin,${DOMAINDN}
2005-07-27 04:23:09 +04:00
objectClass: top
objectClass: group
description: Members in this group are granted the right to logon remotely
objectSid: S-1-5-32-555
sAMAccountName: Remote Desktop Users
2009-06-30 15:54:45 +04:00
systemFlags: -1946157056
2008-08-22 15:26:32 +04:00
groupType: -2147483643
2005-07-27 04:23:09 +04:00
isCriticalSystemObject: TRUE
2007-01-05 20:40:43 +03:00
dn: CN=Network Configuration Operators,CN=Builtin,${DOMAINDN}
2005-07-27 04:23:09 +04:00
objectClass: top
objectClass: group
description: Members in this group can have some administrative privileges to manage configuration of networking features
objectSid: S-1-5-32-556
sAMAccountName: Network Configuration Operators
2009-06-30 15:54:45 +04:00
systemFlags: -1946157056
2008-08-22 15:26:32 +04:00
groupType: -2147483643
2005-07-27 04:23:09 +04:00
isCriticalSystemObject: TRUE
2007-01-05 20:40:43 +03:00
dn: CN=Performance Monitor Users,CN=Builtin,${DOMAINDN}
2005-07-27 04:23:09 +04:00
objectClass: top
objectClass: group
description: Members of this group have remote access to monitor this computer
objectSid: S-1-5-32-558
sAMAccountName: Performance Monitor Users
2009-06-30 15:54:45 +04:00
systemFlags: -1946157056
2008-08-22 15:26:32 +04:00
groupType: -2147483643
2005-07-27 04:23:09 +04:00
isCriticalSystemObject: TRUE
2007-01-05 20:40:43 +03:00
dn: CN=Performance Log Users,CN=Builtin,${DOMAINDN}
2005-07-27 04:23:09 +04:00
objectClass: top
objectClass: group
description: Members of this group have remote access to schedule logging of performance counters on this computer
2009-09-06 21:57:50 +04:00
member: CN=S-1-5-20,CN=ForeignSecurityPrincipals,${DOMAINDN}
2005-07-27 04:23:09 +04:00
objectSid: S-1-5-32-559
sAMAccountName: Performance Log Users
2009-06-30 15:54:45 +04:00
systemFlags: -1946157056
2008-08-22 15:26:32 +04:00
groupType: -2147483643
2005-07-27 04:23:09 +04:00
isCriticalSystemObject: TRUE
2007-01-05 20:40:43 +03:00
dn: CN=Server Operators,CN=Builtin,${DOMAINDN}
2005-07-27 04:23:09 +04:00
objectClass: top
objectClass: group
description: Members can administer domain servers
objectSid: S-1-5-32-549
adminCount: 1
sAMAccountName: Server Operators
2009-06-30 15:54:45 +04:00
systemFlags: -1946157056
2008-08-22 15:26:32 +04:00
groupType: -2147483643
2009-07-10 14:48:18 +04:00
isCriticalSystemObject: TRUE
2005-07-27 04:23:09 +04:00
2007-01-05 20:40:43 +03:00
dn: CN=Account Operators,CN=Builtin,${DOMAINDN}
2005-07-27 04:23:09 +04:00
objectClass: top
objectClass: group
description: Members can administer domain user and group accounts
objectSid: S-1-5-32-548
adminCount: 1
sAMAccountName: Account Operators
2009-06-30 15:54:45 +04:00
systemFlags: -1946157056
2008-08-22 15:26:32 +04:00
groupType: -2147483643
2009-07-10 14:48:18 +04:00
isCriticalSystemObject: TRUE
2005-07-27 04:23:09 +04:00
2007-08-27 06:26:24 +04:00
dn: CN=Pre-Windows 2000 Compatible Access,CN=Builtin,${DOMAINDN}
objectClass: top
objectClass: group
description: A backward compatibility group which allows read access on all users and groups in the domain
2009-09-06 21:57:50 +04:00
member: CN=S-1-5-11,CN=ForeignSecurityPrincipals,${DOMAINDN}
2007-08-27 06:26:24 +04:00
objectSid: S-1-5-32-554
sAMAccountName: Pre-Windows 2000 Compatible Access
2009-06-30 15:54:45 +04:00
systemFlags: -1946157056
2008-08-22 15:26:32 +04:00
groupType: -2147483643
2009-07-10 14:48:18 +04:00
isCriticalSystemObject: TRUE
2007-08-27 06:26:24 +04:00
dn: CN=Incoming Forest Trust Builders,CN=Builtin,${DOMAINDN}
objectClass: top
objectClass: group
description: Members of this group can create incoming, one-way trusts to this forest
objectSid: S-1-5-32-557
sAMAccountName: Incoming Forest Trust Builders
2009-06-30 15:54:45 +04:00
systemFlags: -1946157056
2008-08-22 15:26:32 +04:00
groupType: -2147483643
2007-08-27 06:26:24 +04:00
isCriticalSystemObject: TRUE
dn: CN=Windows Authorization Access Group,CN=Builtin,${DOMAINDN}
objectClass: top
objectClass: group
description: Members of this group have access to the computed tokenGroupsGlobalAndUniversal attribute on User objects
2009-09-06 21:57:50 +04:00
member: CN=S-1-5-9,CN=ForeignSecurityPrincipals,${DOMAINDN}
2007-08-27 06:26:24 +04:00
objectSid: S-1-5-32-560
sAMAccountName: Windows Authorization Access Group
2009-06-30 15:54:45 +04:00
systemFlags: -1946157056
2008-08-22 15:26:32 +04:00
groupType: -2147483643
2007-08-27 06:26:24 +04:00
isCriticalSystemObject: TRUE
dn: CN=Terminal Server License Servers,CN=Builtin,${DOMAINDN}
objectClass: top
objectClass: group
description: Terminal Server License Servers
objectSid: S-1-5-32-561
sAMAccountName: Terminal Server License Servers
2009-06-30 15:54:45 +04:00
systemFlags: -1946157056
2008-08-22 15:26:32 +04:00
groupType: -2147483643
2007-08-27 06:26:24 +04:00
isCriticalSystemObject: TRUE
dn: CN=Distributed COM Users,CN=Builtin,${DOMAINDN}
objectClass: top
objectClass: group
description: Members are allowed to launch, activate and use Distributed COM objects on this machine.
objectSid: S-1-5-32-562
sAMAccountName: Distributed COM Users
2009-06-30 15:54:45 +04:00
systemFlags: -1946157056
2008-08-22 15:26:32 +04:00
groupType: -2147483643
2007-08-27 06:26:24 +04:00
isCriticalSystemObject: TRUE
2009-08-26 05:51:45 +04:00
# Add well known security principals
2007-08-27 06:26:24 +04:00
dn: CN=WellKnown Security Principals,${CONFIGDN}
objectClass: top
objectClass: container
2009-06-30 15:54:45 +04:00
systemFlags: -2147483648
2007-08-27 06:26:24 +04:00
dn: CN=Anonymous Logon,CN=WellKnown Security Principals,${CONFIGDN}
objectClass: top
objectClass: foreignSecurityPrincipal
objectSid: S-1-5-7
dn: CN=Authenticated Users,CN=WellKnown Security Principals,${CONFIGDN}
objectClass: top
objectClass: foreignSecurityPrincipal
objectSid: S-1-5-11
dn: CN=Batch,CN=WellKnown Security Principals,${CONFIGDN}
objectClass: top
objectClass: foreignSecurityPrincipal
objectSid: S-1-5-3
dn: CN=Creator Group,CN=WellKnown Security Principals,${CONFIGDN}
objectClass: top
objectClass: foreignSecurityPrincipal
objectSid: S-1-3-1
dn: CN=Creator Owner,CN=WellKnown Security Principals,${CONFIGDN}
objectClass: top
objectClass: foreignSecurityPrincipal
objectSid: S-1-3-0
dn: CN=Dialup,CN=WellKnown Security Principals,${CONFIGDN}
objectClass: top
objectClass: foreignSecurityPrincipal
objectSid: S-1-5-1
dn: CN=Digest Authentication,CN=WellKnown Security Principals,${CONFIGDN}
objectClass: top
objectClass: foreignSecurityPrincipal
objectSid: S-1-5-64-21
dn: CN=Enterprise Domain Controllers,CN=WellKnown Security Principals,${CONFIGDN}
objectClass: top
objectClass: foreignSecurityPrincipal
objectSid: S-1-5-9
dn: CN=Everyone,CN=WellKnown Security Principals,${CONFIGDN}
objectClass: top
objectClass: foreignSecurityPrincipal
objectSid: S-1-1-0
dn: CN=Interactive,CN=WellKnown Security Principals,${CONFIGDN}
objectClass: top
objectClass: foreignSecurityPrincipal
objectSid: S-1-5-4
dn: CN=Local Service,CN=WellKnown Security Principals,${CONFIGDN}
objectClass: top
objectClass: foreignSecurityPrincipal
objectSid: S-1-5-19
dn: CN=Network,CN=WellKnown Security Principals,${CONFIGDN}
objectClass: top
objectClass: foreignSecurityPrincipal
objectSid: S-1-5-2
dn: CN=Network Service,CN=WellKnown Security Principals,${CONFIGDN}
objectClass: top
objectClass: foreignSecurityPrincipal
objectSid: S-1-5-20
dn: CN=NTLM Authentication,CN=WellKnown Security Principals,${CONFIGDN}
objectClass: top
objectClass: foreignSecurityPrincipal
objectSid: S-1-5-64-10
dn: CN=Other Organization,CN=WellKnown Security Principals,${CONFIGDN}
objectClass: top
objectClass: foreignSecurityPrincipal
objectSid: S-1-5-1000
dn: CN=Proxy,CN=WellKnown Security Principals,${CONFIGDN}
objectClass: top
objectClass: foreignSecurityPrincipal
objectSid: S-1-5-8
dn: CN=Remote Interactive Logon,CN=WellKnown Security Principals,${CONFIGDN}
objectClass: top
objectClass: foreignSecurityPrincipal
objectSid: S-1-5-14
dn: CN=Restricted,CN=WellKnown Security Principals,${CONFIGDN}
objectClass: top
objectClass: foreignSecurityPrincipal
objectSid: S-1-5-12
dn: CN=SChannel Authentication,CN=WellKnown Security Principals,${CONFIGDN}
objectClass: top
objectClass: foreignSecurityPrincipal
objectSid: S-1-5-64-14
dn: CN=Self,CN=WellKnown Security Principals,${CONFIGDN}
objectClass: top
objectClass: foreignSecurityPrincipal
objectSid: S-1-5-10
dn: CN=Service,CN=WellKnown Security Principals,${CONFIGDN}
objectClass: top
objectClass: foreignSecurityPrincipal
objectSid: S-1-5-6
dn: CN=Terminal Server User,CN=WellKnown Security Principals,${CONFIGDN}
objectClass: top
objectClass: foreignSecurityPrincipal
objectSid: S-1-5-13
dn: CN=This Organization,CN=WellKnown Security Principals,${CONFIGDN}
objectClass: top
objectClass: foreignSecurityPrincipal
objectSid: S-1-5-15
dn: CN=Well-Known-Security-Id-System,CN=WellKnown Security Principals,${CONFIGDN}
objectClass: top
objectClass: foreignSecurityPrincipal
objectSid: S-1-5-18