windows-nt/Source/XPSP1/NT/ds/security/tools/dsacls/caclsmsg.mc

269 lines
9.5 KiB
MonkeyC
Raw Normal View History

2020-09-26 03:20:57 -05:00
;/*++
;
;Copyright (c) 1998-1998 Microsoft Corporation
;
;Module Name:
;
; dsaclsmsg.mc (will create dsaclsmsg.h when compiled)
;
;Abstract:
;
; This file contains the DSACLS messages.
;
;Author:
;
;
;Revision History:
;
;--*/
;//
;// These are simply resource indexes
;//
;#define MSG_TAG_SD 0x8001
;#define MSG_TAG_RC 0x8002
;#define MSG_TAG_WD 0x8003
;#define MSG_TAG_WO 0x8004
;#define MSG_TAG_CC 0x8005
;#define MSG_TAG_DC 0x8006
;#define MSG_TAG_LC 0x8007
;#define MSG_TAG_WS 0x8008
;#define MSG_TAG_WP 0x8009
;#define MSG_TAG_RP 0x800A
;#define MSG_TAG_DT 0x800B
;#define MSG_TAG_LO 0x800C
;#define MSG_TAG_IS 0x800E
;#define MSG_TAG_IT 0x800F
;#define MSG_TAG_IP 0x8010
;#define MSG_TAG_ID 0x8011
;#define MSG_TAG_AC 0x8012
;#define MSG_TAG_GR 0x8013
;#define MSG_TAG_GE 0x8014
;#define MSG_TAG_GW 0x8015
;#define MSG_TAG_GA 0x8016
;#define MSG_TAG_SD_EX 0x8018
;#define MSG_TAG_RC_EX 0x8019
;#define MSG_TAG_WD_EX 0x801A
;#define MSG_TAG_WO_EX 0x801B
;#define MSG_TAG_CC_EX 0x801C
;#define MSG_TAG_DC_EX 0x801D
;#define MSG_TAG_LC_EX 0x801E
;#define MSG_TAG_WS_EX 0x801F
;#define MSG_TAG_WP_EX 0x8020
;#define MSG_TAG_RP_EX 0x8021
;#define MSG_TAG_DT_EX 0x8022
;#define MSG_TAG_LO_EX 0x8023
;#define MSG_TAG_GR_EX 0x8024
;#define MSG_TAG_GE_EX 0x8025
;#define MSG_TAG_GW_EX 0x8026
;#define MSG_TAG_GA_EX 0x8027
;#define MSG_TAG_AC_EX 0x8028
;#define MSG_TAG_PY 0x8029
;#define MSG_TAG_PN 0x8030
;//
;// These values must be flags, since they are used as such during cmdline processing
;//
;#define MSG_TAG_CI 0x0001
;#define MSG_TAG_CN 0x0002
;#define MSG_TAG_CP 0x0004
;#define MSG_TAG_CG 0x0008
;#define MSG_TAG_CD 0x0010
;#define MSG_TAG_CR 0x0020
;#define MSG_TAG_CS 0x0040
;#define MSG_TAG_CT 0x0080
;#define MSG_TAG_CA 0x0100
;#define MSG_TAG_GETSDDL 0x0200
;#define MSG_TAG_SETSDDL 0x0400
;#define MSG_DSACLS_SUCCESS 8002
;#define MSG_DSACLS_FAILURE 8003
;#define MSG_DSACLS_NO_UA 8004
;#define MSG_DSACLS_PARAM_UNEXPECTED 8005
;#define MSG_DSACLS_ACCESS 8006
;#define MSG_DSACLS_AUDIT 8007
;#define MSG_DSACLS_OWNER 8008
;#define MSG_DSACLS_GROUP 8009
;#define MSG_DSACLS_PROTECTED 8010
;#define MSG_DSACLS_INHERIT_TO 8011
;#define MSG_DSACLS_PROPERTY 8012
;#define MSG_DSACLS_OBJECT 8013
;#define MSG_DSACLS_INHERIT 8014
;#define MSG_DSACLS_USER 8015
;#define MSG_DSACLS_RIGHT 8016
;#define MSG_DSACLS_PROCESSED 8017
;#define MSG_DSACLS_EFFECTIVE 8018
;#define MSG_DSACLS_INHERITED 8019
;#define MSG_DSACLS_INHERITED_ALL 8020
;#define MSG_DSACLS_INHERITED_SPECIFIC 8021
;#define MSG_DSACLS_ALLOW 8022
;#define MSG_DSACLS_DENY 8023
;#define MSG_DSACLS_INHERITED_FROM_PARENT 8024
;#define MSG_DSACLS_ACCESS_FOR 8025
;#define MSG_DSACLS_SPECIAL 8026
;#define MSG_DSACLS_NO_ACES 8027
;#define MSG_DSACLS_NO_MATCHING_SID 8028
;#define MSG_DSACLS_NO_MATCHING_GUID 8029
;#define MSG_DSACLS_PROPERTY_PERMISSION_MISMATCH 8030
;#define MSG_DSACLS_EXTENDED_RIGHTS_PERMISSION_MISMATCH 8031
;#define MSG_DSACLS_VALIDATED_RIGHTS_PERMISSION_MISMATCH 8032
;#define MSG_DSACLS_CHILD_OBJECT_PERMISSION_MISMATCH 8033
;#define MSG_DSACLS_INCORRECT_INHERIT 8034
;#define MSG_DSACLS_AUDIT_SUCCESS 8035
;#define MSG_DSACLS_AUDIT_FAILURE 8036
;#define MSG_DSACLS_AUDIT_ALL 8037
;#define MSG_INVALID_OBJECT_PATH 8038
MessageId=8001 SymbolicName=MSG_DSACLS_USAGE
Language=English
Displays or modifies permissions (ACLS) of an Active Directory (AD)
Object
DSACLS object [/I:TSP] [/N] [/P:YN] [/G <group/user>:<perms> [...]]
[/R <group/user> [...]] [/D <group/user>:<perms> [...]]
[/S] [/T] [/A]
object Path to the AD object for which to display or
manipulate the ACLs
Path is the RFC 1779 format of the name, as in
CN=John Doe,OU=Software,OU=Engineering,DC=Widget,DC=com
A specific Active Directory can be denoted by prepending \\server\
to the object, as in
\\ADSERVER\CN=John Doe,OU=Software,OU=Engineering,DC=Widget,DC=US
no options displays the security on the object.
/I Inheritance flags:
T: This object and sub objects
S: Sub objects only
P: Propagate inheritable permissions one level only.
/N Replaces the current access on the object, instead of
editing it.
/P Mark the object as protected
Y:Yes
N:No
If /P option is not present, current protection flag is
maintained.
/G <group/user>:<perms>
Grant specified group (or user) specified permissions.
See below for format of <group/user> and <perms>
/D <group/user>:<perms>
Deny specified group (or user) specified permissions.
See below for format of <group/user> and <perms>
/R <group/user> Remove all permissions for the specified group (or user).
See below for format of <group/user>
/S Restore the security on the object to the default for
that object class as defined in AD Schema.
/T Restore the security on the tree of objects to the
default for the object class.
This switch is valid only with the /S option.
/A When displaying the security on an Active Directory object,
display the ownership and auditing information as well as
the permissions
<user/group> should be in the following forms:
group@domain or domain\group
user@domain or domain\user
<perms> should be in the following form:
[Permission bits];[Object/Property];[Inherited Object Type]
Permission bits can have the following values concatenated together:
Generic Permissions
GR Generic Read
GE Generic Execute
GW Generic Write
GA Generic All
Specific Permissions
SD Delete
DT Delete an object and all of it's children
RC Read security information
WD Change security information
WO Change owner information
LC List the children of an object
CC Create child object
DC Delete a child object
For these two permissions, if [Object/Property] is
not specified to define a specific child object type,
they apply all types of child objects otherwise they
apply to that specific child object type.
WS Write to self object
Meaningful only on Group objects and when [Object/Property]
is filled in as "member"
WP Write property
RP Read property
For these two permissions, if [Object/Property] is not
specified to define a specific property, they apply to
all properties of the object otherwise they apply to that
specific property of the object.
CA Control access right
For this permission, if [Object/Property] is not specified
to define the specific "extended right" for control access,
it applies to all control accesses meaningful on the
object, otherwise it applies to the specific extended right
for that object.
LO List the object access. Can be used to grant
list access to a specific object if
List Children (LC) is not granted to the parent as
well can denied on specific objects to hide those objects
if the user/group has LC on the parent.
NOTE: Active Directory does NOT enforce this permission
by default, it has to be configured to start checking for
this permission.
[Object/Property]
must be the display name of the object type or the property.
for example "user" is the display name for user objects and
"telephone number" is the display name for telephone number property.
[Inherited Object Type]
must be the display name of the object type that the permissions
are expected to be inherited to. The permissions MUST be Inherit Only.
NOTE: This must only be used when defining object specific permissions
that override the default permissions defined in the AD schema for that
object type. USE THIS WITH CAUTION and ONLY IF YOU UNDERSTAND object
specific permissions.
Examples of a valid <perms> would be:
SDRCWDWO;;user
means:
Delete, Read security information, Change security information and
Change ownership permissions on objects of type "user".
CCDC;group;
means:
Create child and Delete child permissions to create/delete objects
of type group.
RPWP;telephonenumber;
means:
read property and write property permissions on telephone number
property
You can specify more than one user in a command.
.