20. Container Permissions

This section will show you how to configure OVERLAPS' granular container permissions.

OVERLAPS uses an ACL-like permissions system where each user or group can be granted permissions to individual containers in your Active Directory structure.

The Permissions section is split vertically into two parts: A navigation tree for finding the container you want to edit, and a list of the Users/Groups who have permission to the currently selected container.

It is important to note that any changes made here are set in OVERLAPS only. No changes are made to your Active Directory structure or permissions.

Organizational Unit Permissions Interface
Organizational Unit Permissions Interface

With a valid container selected, you can add or remove users using the relevant buttons, and change their permissions (see below) accordingly, but the permissions are only saved when you click the Save Changes button.

20.1 Container Permission Icons

The permissions available to each user are split into sections:

20.1.1 Computer Information Permissions

IconPermissionDescription
Read Computer Information Read Computer Information Allows the user to bring up the Computer Information window for computers in this container. Computer Information includes common attributes from Active Directory, such as Operating System information.
Write Computer Information Write Computer Information (Requires the Read Computer Information permission) This allows the user to edit the description of the computer from the Computer Information window. This requires OVERLAPS to have write permission to the Description property.

20.1.2 Computer Management Tools

This list of permissions require Computer Management Tools to be enabled and configured (see Computer Management Settings for information on enabling the tools, and Computer Management Tool Permissions for information on the required permissions setup.)

IconPermissionDescription
Trigger Group Policy Update Trigger Group Policy Update Allows the user to run a Group Policy Update Computer Management Tool on the selected computers in this container.
Ping Computer Ping Computer Permits the user to run an ICMP Ping on any computers selected in this container.
Restart Computer Restart Computer Permits the user to remotely restart any computers in this container.
Shutdown Computer Shutdown Computer Permits the user to remotely shutdown computers in this container.

20.1.3 Read Password Permissions

IconPermissionDescription
Read Passwords Read Passwords With this option checked, the user/group can read the password of any computer in this Organizational Unit.
Read Passwords with Authorisation Read Passwords with Authorisation Alternatively, checking this option will allow the user/group to read the password of any computer in this Organizational Unit, but they will need to submit an Authorisation Request first which must be authorised by one or more nominated Authorisers.
Read Passwords with Justificaton Read Passwords with Justificaton This option acts much like the "Read Passwords with Authorisation" setting, but instead of going through an entire authorisation process, the user must simply provide some information about why they needed access to the password, which is recorded in the History Log.

20.1.4 Reset/Expire Password Permissions

IconPermissionDescription
Expire Passwords Expire Passwords With this option checked, the user/group can expire the password of any computer in this Organizational Unit. This will trigger the computer to reset its password when it next runs a Group Policy update.
Expire Passwords with Authorisation Expire Passwords with Authorisation As with the Read Password permissions, this also allows users to expire passwords, but will require them to submit an Authorisation Request first.

20.1.5 Authorisation Request Authoriser Permissions

IconPermissionDescription
Authoriser for Normal User Requests Authoriser for Normal User Requests Checking this option nominates this user/group as an Authoriser for normal user requests. When a user who requires authorisation attempts to perform a relevant action, these users will be notified by email and must login to OVERLAPS to authorise the action. In order to have users who require authorisation to read or expire passwords, the container must also have at least one Authoriser.
Authorise Self-Service Requests Authorise Self-Service Requests As with the regular Authoriser permissions, except this user has permission to authorise Self-Service users to read computer passwords.

20.2 Rules for Permissions

There are a few rules to consider when settings permissions on a container:

  1. Users can either have "Read" permission or "Read with Authorisation" permission, you cannot check both.
  2. Users cannot have both "Read with Authorisation" and "Read with Justification" permissions.
  3. Similarly, users can only have "Expire" or "Expire with Authorisation" permissions.
  4. In order to add users who require authorisation, the container must have at least one nominated Authoriser user.

20.3 Permission Inheritance

To simplify the process, OVERLAPS does not support traditional permission inheritance. Instead, you can opt when saving permissions to overwrite the permissions for all child OU’s with the ones being saved for the current container.

Save Permissions - Recursion
Save Permissions - Recursion

The options presented are:

Do not apply

The permissions will be applied to this container only.

Add permissions

Will add the permissions of this container to the ones below it. This merges permissions with existing users, adds users to containers that they were not previously given permission to, and will not remove any existing permissions.

Replace permissions

This option completely replaces the permissions of child containers with the ones of this container.

20.4 Renaming a Container

Renaming a Container
Renaming a Container

Often Active Directory containers are named in a utilitarian way which may make sense from an Administration point of view but may be confusing of unclear to regular users. For this purpose, OVERLAPS supports the ability to give containers an alternative name which will show in OVERLAPS only.

This does not affect the container itself and does not make any change to Active Directory, it is purely cosmetic and only visible within OVERLAPS.

To “rename” a container, select it from the tree view, then click the Rename button next to its Distinguished Name.

An Example Renamed Container
An Example Renamed Container

Renamed containers will show as blue in OVERLAPS, and hovering over it will reveal its original name.

20.5 Permissions Snapshots

Permissions Snapshots
Permissions Snapshots

You can take a quick snapshot of all of your permissions using the Permissions Snapshots feature. This will take a full copy of the permissions on every container and store it using a name of your choice. Then if you need to restore to this stage you can simply find it in the snapshot list and click the "Restore" button.

This can be useful when you are first learning to setup OVERLAPS permissions and you want to save a working state before making changes.

Note that if no permissions have been created yet then attempting to create a snapshot will show an error.

By default, OVERLAPS will also take an automatic snapshot of your permissions every night for backup purposes, which will be kept for 7 days. Both of these settings are configurable under Config -> Active Directory -> Permissions Snapshot Settings.