Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Permissions Delete instead of DeleteChild #53

Closed
bastienperez opened this issue Aug 12, 2023 · 3 comments
Closed

Permissions Delete instead of DeleteChild #53

bastienperez opened this issue Aug 12, 2023 · 3 comments

Comments

@bastienperez
Copy link

Hello,
I found an issue and don't understand why.
If I set an object (ie an user) protected from deletion, the parent object gets ACE Deny with DeleteChild for Everyone.

Get-ACL -path "AD:$object" | select -ExpandProperty Access | ?{ $_.IdentityReference -eq "Everyone" }
ActiveDirectoryRights : DeleteChild
InheritanceType       : None
ObjectType            : 00000000-0000-0000-0000-000000000000
InheritedObjectType   : 00000000-0000-0000-0000-000000000000
ObjectFlags           : None
AccessControlType     : Deny
IdentityReference     : Everyone
IsInherited           : False
InheritanceFlags      : None
PropagationFlags      : None

But, with ADACLScan, I get the permissions Delete instead of DeleteChild:

Object            : xxx
ObjectClass       : organizationalUnit
IdentityReference : S-1-1-0
Trustee           : Everyone
Access            : Deny
Inherited         : False
Apply To          : This Object Only
Permission        : Delete
@bastienperez bastienperez changed the title Permissions Delete instead of DeleteTree Permissions Delete instead of DeleteChild Aug 12, 2023
@canix1
Copy link
Owner

canix1 commented Aug 12, 2023

Hi,

I agree that delete is a simplified output that could mislead.
I will fix that.
Until then, you can use -RAW flag that will produce the same access but without translation of schemaGuids's.

@canix1
Copy link
Owner

canix1 commented Aug 13, 2023

This was fixed in 7.8

@canix1 canix1 closed this as completed Aug 13, 2023
@bastienperez
Copy link
Author

Awesome, thanks!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants