Hey Joe, I couldn't pass it up . . .
Joe Richards said:
I agree with Steve in that if you are in native mode, you can use either domain
local or global.
Unlike Steve, possibly, I prefer the domain local in a multidomain environment.
I prefer to put groups as close to resources as possible though and am not a big
fan of role based ACLing; instead preferring resource based ACLing.
These are not mutually exclusive but are IMO best only when used together
Then you
place the users into the domain local groups directly. The person who manages
that group then has better control over the folks accessing the resource. If you
do the global into local nesting, the power of who can manage a resource may
accidently be usurped from the person who should be managing that access.
That is a different case than the poster's question.
Of course one can nest DLGs in DLGs.
For instance, say you have a GG from Dom1 and a DLG from Dom2. The DLG controls
access to a file share. Barb controls the access to the file share and has the
ability to manage Dom2\DLG. Someone tells her to do the old User into Global,
Global into Local strategy. She does it, not realizing fully that she doesn't
control the membership of GG but it looks good right now. Someone else who
controls GG later adds someone else for the other purpose GG has which is to
grant access to something else. This person also now has access to the resource
granted to DLG and Barb knows nothing about it...
I would argue that
1. the so-called role GG is not correctly understood and
applied here.
If it were there would be no using it for "other purpose"
that should not be a conjoined resource access/right of
those role members. This is an administrative failing,
not a failing inherent in only the role/resource adm model.
2. if control over access to a resource is to be delegated
then that delegatee should have control over all means
of membership the resource access granting group.
When this is not to be so, then it should be due to some
mandated accesses which are supposed to be outside of
the control of that delegatee. If such mandated access is
abused/misused, this is not a failing of the delegatee,
nor is it a failing of the resource/role model usage but
would likely have happened with a different administrative
control model as well.
Also, your scenario has exampled for the poster an appropriate
use of GGs, to cross domain boundaries. I also agree that for an
entirely single domain forest, or for use solely within a single
domain (and especially when one intentionally wants to force
that intradomain limitation) then DLGs can be used. There are
a few scattered references in Group Policy docs of the need to
use GGs but I have always been left uncertain of the reasoning
when the GPOs of solely intradomain, and I have not experience
the "issues" GG usage is said to avoid, again when GPO use is
constrained within a domain of multi-domain forest. There is also
fact that the size of a user token can accommodate more groups if
GGs are used instead of DLGs, but it is a rather high limit for
most deployments no matter which is used.