Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ADOrganizationalUnit: Add DomainController parameter #563

Closed
jacob-h1 opened this issue Feb 6, 2020 · 5 comments · Fixed by #666
Closed

ADOrganizationalUnit: Add DomainController parameter #563

jacob-h1 opened this issue Feb 6, 2020 · 5 comments · Fixed by #666
Labels
enhancement The issue is an enhancement request.

Comments

@jacob-h1
Copy link

jacob-h1 commented Feb 6, 2020

Description

The ADOrganizationUnit DSC resource has a 'Credential' parameter but does not have the 'DomainController' parameter. Therefore it is not possible to create an OU if the computer is not member of the domain.
The *-ADOrganizationalUnit CmdLets in the ActiveDirectory module all supports the 'Server' parameter so it should be possible to add this the 'DomainController' parameter to the resource.

Proposed properties

DomainController: Specifies the Active Directory Domain Services instance to connect to perform the task.

Special considerations or limitations

N/A

@X-Guardian
Copy link
Contributor

Hi @jacob-h1, none of the resources in this module have been written or tested to work successfully when run from a non-domain joined computer. I'm not sure it is a scenario that we would want to support.

@jacob-h1
Copy link
Author

jacob-h1 commented Feb 7, 2020

Hi @jacob-h1, none of the resources in this module have been written or tested to work successfully when run from a non-domain joined computer. I'm not sure it is a scenario that we would want to support.

It is fully supported by the underlying *-ADOrganizationalUnit CmdLets used by the resource (using the 'Server' parameter). Most of the other resources in this module have the 'DomainController' parameter. So why not add it to the ADOrganizationalUnit resource as well?

@X-Guardian
Copy link
Contributor

Happy to accept a PR if you want to raise one, but just warning you that you are likely to come across a lot of issues with other ActiveDirectoryDsc resources running them from a non-domain joined machine.

@X-Guardian X-Guardian added enhancement The issue is an enhancement request. help wanted The issue is up for grabs for anyone in the community. labels Feb 7, 2020
@Clebam
Copy link

Clebam commented Oct 5, 2020

Hi, there might be a use foreach of the ActiveDirectoryDsc Resources in a scenario where you have 2 domains, say:

  • contoso.com
  • child.contoso.com

You may have a server used to administrate both domain (using specified credentials), with the server being on consoto.com domain. This scenario prevents to expose directly AD DC.

@matt2005
Copy link
Contributor

matt2005 commented Nov 8, 2021

This is also useful when working with trusted domains. I'm working on a PR to add support

matt2005 added a commit to matt2005/ActiveDirectoryDsc that referenced this issue Nov 9, 2021
matt2005 added a commit to matt2005/ActiveDirectoryDsc that referenced this issue Nov 14, 2021
matt2005 added a commit to matt2005/ActiveDirectoryDsc that referenced this issue May 11, 2022
matt2005 added a commit to matt2005/ActiveDirectoryDsc that referenced this issue May 24, 2022
matt2005 added a commit to matt2005/ActiveDirectoryDsc that referenced this issue May 24, 2022
@johlju johlju removed the help wanted The issue is up for grabs for anyone in the community. label May 26, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement The issue is an enhancement request.
Projects
None yet
5 participants