In the Permisn sections you set the access rights for an object. Each object is specified by the entries Type, Object, and (optional) FileMask.
Each of the Permisn sections can have the following entries:
|
Type=Type |
|
|
Object=Object |
|
|
FileMask=File_mask |
optional |
|
AddToACL=Value |
optional |
|
Aace1=Account_name_1,Access_mask_1 |
optional |
|
: |
|
|
Aacen=Account_name_n,Access_mask_n |
optional |
|
Dace1=Account_name_1 |
optional |
|
: |
|
|
Dacen=Account_name_n |
optional |
|
|
|
Specifies the type of the object. The value of type can be one of the following:
|
File |
A file |
|
Dir |
A directory with files |
|
RDir |
A directory with files and subdirectories |
|
Key |
A key |
|
RKey |
A key and subkeys |
Specifies the object including its path name. The type of the object determines the structure of the object. The types and associated structures are listed following:
|
File |
A file path |
|
Dir |
A directory path |
|
RDir |
A directory path |
|
Key |
A root_key\key structure |
|
RKey |
A root_key\key structure |
Specifies a file mask. All files corresponding to this file_mask are assigned the access rights. The file_mask can be specified only if the object type is Dir or RDir. You can specify file extensions only, such as *.doc. No path details can be specified.
Specifies how to deal with the current access control list (ACL).
The access control elements (AAce and Dace) should be added to the object's access control list.
The access control elements (AAce and Dace) should replace the object's access control list.
Sets the access right (Allowed ACE) for the account_name specified in the line to the specified access mask.
Denies access (Denied ACE) for the account_name specified in the line. Note that deny entries take priority over allow entries. Use them very carefully!
Specifies the user or group name.
The account_name can be qualified by a domain prefix, such as domain\account. domain is the name of the Windows domain this system is part of or of a trusted domain.
If account_name is not qualified, it is mapped to the local account of the same name. If this local account does not exist, account_name is mapped to the domain account or any trusted domain account of the same name.
Examples:
|
MyAccount |
The given account name |
|
MySystem |
The name of the local system |
|
MyDomain |
The system is part of this Windows domain |
If MyAccount is an account defined on the local system, the access control is set for this account. If MyAccount is not an account of the local system, but it is an account of MyDomain, the access control is set for MyDomain\MyAccount.
There are several well-known security identifiers that map to predefined accounts, which are however localized.
For example, on an U.S. English system, the account of the local group of administrators is Administrators, whereas on a German system it is called Administratoren.
These accounts can be specified independent of their localization as follows:
Usd for a predefined Windows domain‑specific account. MyDomain is the Windows domain the system is part of. The domain-related RIDAlias can have one of the values listed under List of RIDAlias Values. Note that only a subset of these accounts may exist on a single system.
Used for a predefined built-in account or special account. SIDAlias can have one of the values listed under List of SIDAliassidalias Values.
Hint: You can use parameters when defining an account. For example, define the PrimaryDomain parameter as follows:
PrimaryDomain=&HKLM\software\microsoft\windows nt\CurrentVersion\Winlogon\CachePrimaryDomain
Will be resolved to the predefined global domain users account of the Windows domain the target computer is a part of.
Will be resolved to the target computer’s predefined local administrator account.
Specifies the access in hexadecimal format (eight positions). The critical values for the access masks are:
|
10000000 |
Full access |
|
20000000 |
Execute access |
|
40000000 |
Write access |
|
80000000 |
Read access |
|
00010000 |
Permission to delete |
|
00020000 |
Permission to read the Access Control List (ACL) |
|
00040000 |
Permission to read and write to the Access Control List (ACL) |
|
00080000 |
Permission to change the owner name |
For example, C0000000 specifies Read and Write access.
Specifies the name of key in the format SubKey1\ ...\SubKeyn
Specifies the root keys predefined by Windows NT Technology. You can assign the following root keys:
| Copyright © 2014 CA Technologies. All rights reserved. |
|