Computer authorization rules page
Last updated
Last updated
Access to computers is provided through authorization rules. An authorization rule defines a target (either a computer, group of computers, or a container), who is allowed to access that target, and what access type they can obtain.
You can add, edit and delete individual rules using the authorization rule editor.
There are several other helpful tools on this page. To determine the effective access a user has to a particular computer, use the Effective access tool.
You can build your authorization rule set by importing authorization rules from other sources where users already have permissions.
The Save permission report
tool allows you to export a list of all the principals that are granted access via the selected rules to a CSV file. Note, that any PowerShell based rules are not included in this report.
A target is a computer, group, or container that you want to grant access to. A target can be one of the following types of object
An Active Directory domain, organizational unit, or container
An Active Directory group
An Active Directory computer object
An Azure AD device
An Azure AD group
An AMS-registered device
An AMS-registered group
A target can be in any domain visible to AMS, including domains from forests that trust the forest where AMS resides, an Azure AD device or group, or an AMS-managed device or group.
When evaluating access, rules are evaluated in the following order;
Computer targets
Group targets
Container targets, in order of their distance to computer object (parent containers processed before grandparents, etc.)
If a user matches more than one authorization rule, the first matched target according to the order above will be used.
If a 'deny' ACL is encountered for a user, they will be denied access regardless of target order or type.
You can disable an authorization rule by selecting the disable rule
checkbox. You can also choose to expire the rule at a certain point, by checking the expire rule
checkbox and selecting the date and time the rule should expire.
AMS allows you to determine who is authorized to access a target, and what they can access. You can do this through the built-in permission editor or if you have complex authorization rules, you can use a PowerShell script to determine access.
Use in-built permissions
The first is the built-in permission editor. This is where you define an ACL that determines who can access a computer and what type of access they can get.
Add users and groups to this list and select the type of access they should be allowed or denied.
Use a PowerShell script
You can also use a PowerShell script to determine if a user should be allowed to access a computer. This allows you to call into an external system to make an authorization decision.
See the page on Authorization scripts for more information on the script format.
When a user accesses a role, you can prompt them to provide a reason for accessing the role. You can choose to make this prompt mandatory, optional, or not shown at all.
If at least one of your ACLs allows access to the local admin passwords of the specified targets, then you'll have an option that allows you to choose to expire the local admin password after it has been accessed.
This has the effect of setting the expiry date for the password in the directory to a new date based on the interval you specify. The password be rotated the next time the Microsoft LAPS or Lithnet Access Manager agents check in after this new time. Note, that the Microsoft LAPS client checks the password at group policy refresh time (every ~90 minutes) and the Lithnet Access Manager agent by default, checks every 60 minutes, so rotations may be delayed by these intervals.
When a computer is using Microsoft's Windows LAPS agent, and it is configured to store its password in Azure AD, then password rotation is not possible. Azure AD does not provide an API that AMS can use to indicate to the machine that the password should be rotated.
You can however use the built-in PostAuthenticationActions and PostAuthenticationResetDelay policy settings to trigger the password change after logon.
If at least one of your ACLs allows JIT access to computers matching in the target, then you'll need to specify the JIT group and expiry settings.
JIT group
Select the group that grants the user administrative access to the target. You can select a specific group from the directory, or provide a templated name that will be built at authorization time. You can use the following placeholders in the name, which will be substituted with the details from the computer the user was granted access to.
%computerName%
%computerDomain%
For example, using a templated name of %computerDomain%\JIT-%computerName%
will expand to DEV1\JIT-PC1
for a computer named PC1
in the domain DEV1
.
This functionality makes it very easy to ensure that each computer has an individual JIT group that provides access to only that computer. Use the same template in combination with the AMS feature to automatically create JIT groups, and use group policy preferences to add that group to the local admin group on each computer. See the setting up JIT guide for more details.
Expiry
Set the duration of time after which the user will be removed from the JIT access group.
Notifications
Set the audit notification channels you want to be notified on success or failure events for this rule. See the auditing help topic for information about creating notification channels.
Access to local admin password history is an Enterprise edition feature
PowerShell-based authorization scripts are an Enterprise edition feature