Access Control Model
Tags:Active-Directorycrtp
Related to:hackingbug-bountyTCMcrtposcpenumeration
See also:
Index: 🗂️ Index of CRTP
Summary
A brief overview of what the content is
Access Control Model
- Enables control on the ability of a process to access resources and objects in AD based on
-
Access Tokens (of process)
- Consists of Identity and
- Privilages of user
-
Security Descriptors (of object)
- SID of owner
- Discretionary ACL (DACL) - Who has access
- System ACL (SACL) - Controls logging of success and failure etc
-
Structure of ACL
- Every object in AD has a security descriptor which consists of SACL DACL and Owner info
- Every DACL contains set of Access Control Entries (ACE) which is known as Access Control List (ACL)
Important Properties
- ObjectDN - Object Distinguished name
- Identity reference - Which users have permissions on the object?
- ActiveDirectoryRights - What permissions do they have?
- InheritedObjectType
- AccessControlType
- InheritanceFlags
- ObjectID - SID of Object