Hi Jason.
Thanks so much for posting back your results. I find it helpful info to know. If don't know how often you have to unlock accounts, but if you want to move some of that burden from domain admins you might want to consider giving some users a second user account that could be delegated the right to unlock accounts without being in all the different groups that are causing the problem you experience. Then you might end up with just a few users that can not unlock each others accounts. --- Steve
Roger , Steven, thanks both of you for your valuable input which do help us in further troubleshoot our Unlock User account issue.
After conducting more than 50 tests and validation ,, we finally found out what exactly is the problem , described below :
First , the MS Article Q294952 is a bit tricky, after going through it a third time ,the fact is that , from the original article :
"Any user or group that has been given permission to read and write the LockoutTime attribute for an OU or other container can unlock user accounts that reside in that container. The user or group that has been given this permission does not have to reside in the container over which they have permission."
1) The hidden implemenation is that you cannot expect the delegated permission will be inherite by the sub-level OU or container beneath it - it has to be delegated to the specific OU and each and every OU where you have users who are also peer group members and who want to be able to Unlock each other's account.
In other words, if you have peer group member users but they reside in different OUs, then make sure you delegate to each Ou respectively with the required delegated group memebership.
2) When it come to delegation ( to Unlock each other's account ) and since we are talking about peer group members, we discover the following scnario:
If :
- user John is member of group A,B,C,D,
- user Mary is member of group A,B,C,D,E,J,K
- user George is member of group A,B,X,Y,
and if you delegate group A,B,C,D the read+write permission to the lockout time attribute in OU "test"
then , User Mary will be able to Unlock John's account , but john will not be able to unlock Mary's. In, addition , neither John or Mary will be able to Unlock George's account or vice versa . The reason is, they only have some common membership in some groups, they are not exactly peer to each other as their " total " membership is not the same in nature as explained in the above example.
Worse case is even delegating all groups A.B,C,D,E,J,K,X,Y the right to R+W the lockout time doesn't necessary guarantee that these three people can unlock eah other 's accounts .
Added to the complication will be if these three users reside in different OUs than it will be a total mess in terms of delegation effort required . And in any day if one of them be added to another group than your effort will be in vain again.
So in the end , we decided to give up this delegation and rather have Domain Admin to Unlock users accounts. Howver, I need to take a further note that, the above case only happens to users/ groups who have already been granted some sort of User account management permission within the AD already ( e.g, create acount, manage acount, manage groups etc.).
They will definitely be able to unlock other users account but not peer's which is the topic of this discussion.
Finally, the previleged group membership, based on our own test case , have no impact as long as the R+W to lockout time has been delegated.
Regards,
Jason