읽기 사용자가 암호를 변경할 수 없음(LDAP 공급자)
사용자가 암호를 변경할 수 있는 권한은 부여되거나 거부될 수 있는 권한입니다.
암호 변경 권한이 부여되거나 거부되었는지 확인하려면
사용자 개체에 바인딩합니다.
사용자 개체의 ntSecurityDescriptor 속성에서 IADsSecurityDescriptor 개체를 가져옵니다.
IADsSecurityDescriptor.DiscretionaryAcl 속성에서 보안 설명자에 대한 IADsAccessControlList 인터페이스를 가져옵니다.
개체에 대한 ACE(액세스 제어 항목)를 열거하고 변경 암호 GUID({AB721A53-1E2F-11D0-9819-00AA00405)가 있는 ACE를 검색합니다. IADsAccessControlEntry.ObjectType 속성 및 IADsAccessControlEntry.Trustee 속성의 "Everyone" 또는 "NT AUTHORITY\SELF" 잘 알려진 보안 주체에 대한 29B})
참고
"Everyone" 및 "NT AUTHORITY\SELF" 문자열은 도메인에서 첫 번째 도메인 컨트롤러의 언어에 따라 지역화됩니다. 따라서 문자열을 직접 사용하면 안 됩니다. 계정 이름은 런타임에 "Everyone"("S-1-1-0") 및 "NT AUTHORITY\SELF"("S-1-5-10")에 대한 SID를 사용하여 LookupAccountSid 함수를 호출하여 가져와야 합니다. 다음 C++ GetSidAccountName, GetSidAccountName_Everyone 및 GetSidAccountName_Self 코드 예제에서는 이 작업을 수행하는 방법을 보여 줍니다.
"Everyone" 및 "NT AUTHORITY\SELF" ACE가 모두 IADsAccessControlEntry.AceType 속성에 대한 ADS_ACETYPE_ACCESS_DENIED_OBJECT 값을 가지면 사용 권한이 거부됩니다.
코드 예
다음 코드 예제에서는 사용자가 LDAP 공급자를 사용하여 암호 권한을 변경할 수 없는지 확인하는 방법을 보여 드립니다.
/***************************************************************************
GetSidAccountName()
Retrieves the account name for the specified SID.
pSid - Pointer to the SID that the account name should be retrieved for.
pbstrAccountName - Pointer to a BSTR that receives the account name. The
caller must free this with SysFreeString when it is no longer required.
***************************************************************************/
HRESULT GetSidAccountName(PSID pSid, BSTR *pbstrAccountName)
{
if(!pbstrAccountName)
{
return E_INVALIDARG;
}
HRESULT hr = E_FAIL;
BOOL fReturn;
WCHAR wszAccountName[MAX_PATH];
DWORD dwAccountName;
WCHAR wszDomainName[MAX_PATH];
DWORD dwDomainName;
SID_NAME_USE SidNameUse;
DWORD dwSidSize;
dwAccountName = MAX_PATH;
dwDomainName = MAX_PATH;
dwSidSize = SECURITY_MAX_SID_SIZE;
/*
Get the account name for the specified SID.
*/
fReturn = LookupAccountSidW(
NULL,
pSid,
wszAccountName,
&dwAccountName,
wszDomainName,
&dwDomainName,
&SidNameUse);
if(fReturn)
{
CComBSTR sbstrReturn;
if(lstrlenW(wszDomainName) > 0)
{
sbstrReturn = wszDomainName;
sbstrReturn += "\\";
sbstrReturn += wszAccountName;
}
else
{
sbstrReturn = wszAccountName;
}
*pbstrAccountName = sbstrReturn.Detach();
hr = S_OK;
}
return hr;
}
/***************************************************************************
GetSidAccountName_Everyone()
Retrieves the local account name for the "World", also known as
"Everyone", account.
pbstrAccountName - Pointer to a BSTR that receives the account name. The
caller must free this with SysFreeString when it is no longer required.
***************************************************************************/
HRESULT GetSidAccountName_Everyone(BSTR *pbstrAccountName)
{
if(!pbstrAccountName)
{
return E_INVALIDARG;
}
HRESULT hr = E_FAIL;
BOOL fReturn;
PSID psidAlloc;
// Create the SID for "Everyone".
SID_IDENTIFIER_AUTHORITY SidAuth = SECURITY_WORLD_SID_AUTHORITY;
fReturn = AllocateAndInitializeSid(
&SidAuth,
1,
SECURITY_WORLD_RID,
0, 0, 0, 0, 0, 0, 0,
&psidAlloc);
if(fReturn)
{
hr = GetSidAccountName(psidAlloc, pbstrAccountName);
LocalFree(psidAlloc);
}
return hr;
}
/***************************************************************************
GetSidAccountName_Self()
Retrieves the local account name for the "NT AUTHORITY\SELF" account.
pbstrAccountName - Pointer to a BSTR that receives the account name. The
caller must free this with SysFreeString when it is no longer required.
***************************************************************************/
HRESULT GetSidAccountName_Self(BSTR *pbstrAccountName)
{
HRESULT hr = E_FAIL;
BOOL fReturn;
PSID psidAlloc;
// Create the SID for "Everyone".
SID_IDENTIFIER_AUTHORITY SidAuth = SECURITY_NT_AUTHORITY;
fReturn = AllocateAndInitializeSid(
&SidAuth,
1,
SECURITY_PRINCIPAL_SELF_RID,
0, 0, 0, 0, 0, 0, 0,
&psidAlloc);
if(fReturn)
{
hr = GetSidAccountName(psidAlloc, pbstrAccountName);
LocalFree(psidAlloc);
}
return hr;
}
#define CHANGE_PASSWORD_GUID_W L"{AB721A53-1E2F-11D0-9819-00AA0040529B}"
/***************************************************************************
GetObjectACE()
Retrieves the IADsAccessControlEntry for the ACE that matches the
specified object type and trustee in the specified IADsAccessControlList.
Returns a value other than S_OK if the ACE is not found.
pACL - Pointer to an IADsAccessControlList object that will be searched.
pwszObject - Pointer to a null-terminated Unicode string that contains
the object type to find.
pwszTrustee - Pointer to a null-terminated Unicode string that contains
the trustee to find.
ppACE - Pointer to an IADsAccessControlEntry pointer that receives the
ACE if successful. This receives NULL if not successful.
***************************************************************************/
HRESULT GetObjectACE(IADsAccessControlList* pACL,
LPCWSTR pwszObject,
LPCWSTR pwszTrustee,
IADsAccessControlEntry** ppACE)
{
if(NULL == pACL || NULL == pwszObject)
{
return E_INVALIDARG;
}
*ppACE = NULL;
HRESULT hr;
IUnknown *pUnk;
hr = pACL->get__NewEnum(&pUnk);
if(FAILED(hr))
{
return hr;
}
IEnumVARIANT *pEnum;
hr = pUnk->QueryInterface(IID_IEnumVARIANT, (LPVOID*)&pEnum);
if(SUCCEEDED(hr))
{
ULONG ulFetched;
BOOL fEveryone = FALSE;
BOOL fSelf = FALSE;
CComVariant svarACE;
for(hr = pEnum->Next(1, &svarACE, &ulFetched);
S_OK == hr && 1 == ulFetched;
hr = pEnum->Next(1, &svarACE, &ulFetched))
{
if(VT_DISPATCH == svarACE.vt)
{
IADsAccessControlEntry *pACE;
hr = svarACE.pdispVal->QueryInterface(IID_IADsAccessControlEntry, (void**)&pACE);
if(SUCCEEDED(hr))
{
CComBSTR sbstrObjectType;
hr = pACE->get_ObjectType(&sbstrObjectType);
if(SUCCEEDED(hr))
{
if(0 == lstrcmpiW(pwszObject, sbstrObjectType))
{
CComBSTR sbstrTrustee;
hr = pACE->get_Trustee(&sbstrTrustee);
if(SUCCEEDED(hr) && (0 == lstrcmpiW(sbstrTrustee, pwszTrustee)))
{
*ppACE = pACE;
break;
}
}
}
pACE->Release();
}
}
}
pEnum->Release();
}
return hr;
}
/***************************************************************************
UserCannotChangePassword()
Retrieves the "User Cannot Change Password" privilege using the LDAP
provider. This is determined by the presence and value of the change
password GUID ACE for the Everyone and Self trustees. The default result
of this function is that the user can change their password unless the
two ACEs specifically deny the privilege.
pwszUserDN - A null-terminated Unicode string that contains the LDAP
ADsPath of the user object to verify.
pwszUsername - A null-terminated Unicode string that contains the user
name to use for authorization. If this is NULL, the credentials of the
current user are used.
pwszPassword - A null-terminated Unicode string that contains the
password to use for authorization. This is ignored if pwszUsername is
NULL.
pfCannotChangePassword - Receives the setting for the privilege.
Receives nonzero if the user cannot change their password or zero if
the can change their password.
***************************************************************************/
HRESULT UserCannotChangePassword(LPCWSTR pwszUserDN,
LPCWSTR pwszUsername,
LPCWSTR pwszPassword,
BOOL *pfCannotChangePassword)
{
HRESULT hr;
CComBSTR sbstrEveryone;
hr = GetSidAccountName_Everyone(&sbstrEveryone);
if(FAILED(hr))
{
return hr;
}
CComBSTR sbstrSelf;
hr = GetSidAccountName_Self(&sbstrSelf);
if(FAILED(hr))
{
return hr;
}
if(NULL == pwszUserDN)
{
return E_INVALIDARG;
}
IADs *pads;
*pfCannotChangePassword = FALSE;
hr = ADsOpenObject( pwszUserDN,
pwszUsername,
pwszPassword,
ADS_SECURE_AUTHENTICATION,
IID_IADs,
(LPVOID*)&pads);
if(SUCCEEDED(hr))
{
CComVariant svar;
hr = pads->Get(CComBSTR("ntSecurityDescriptor"), &svar);
if(SUCCEEDED(hr))
{
IADsSecurityDescriptor *psd;
hr = svar.pdispVal->QueryInterface(IID_IADsSecurityDescriptor, (LPVOID*)&psd);
if(SUCCEEDED(hr))
{
IDispatch *pDisp;
hr = psd->get_DiscretionaryAcl(&pDisp);
if(SUCCEEDED(hr))
{
IADsAccessControlList *pACL;
hr = pDisp->QueryInterface(IID_IADsAccessControlList, (void**)&pACL);
if(SUCCEEDED(hr))
{
BOOL fEveryone = FALSE;
BOOL fSelf = FALSE;
IADsAccessControlEntry *pACEEveryone = NULL;
IADsAccessControlEntry *pACESelf = NULL;
// Get the ACE for everyone.
hr = GetObjectACE(pACL, CHANGE_PASSWORD_GUID_W, sbstrEveryone, &pACEEveryone);
// Get the ACE for self.
hr = GetObjectACE(pACL, CHANGE_PASSWORD_GUID_W, sbstrSelf, &pACESelf);
if(pACEEveryone && pACESelf)
{
LONG lAceType;
hr = pACEEveryone->get_AceType(&lAceType);
if(SUCCEEDED(hr) && (ADS_ACETYPE_ACCESS_DENIED_OBJECT == lAceType))
{
fEveryone = TRUE;
}
hr = pACESelf->get_AceType(&lAceType);
if(SUCCEEDED(hr) && (ADS_ACETYPE_ACCESS_DENIED_OBJECT == lAceType))
{
fSelf = TRUE;
}
}
if(fEveryone && fSelf)
{
*pfCannotChangePassword = TRUE;
}
else
{
*pfCannotChangePassword = FALSE;
}
}
pDisp->Release();
}
psd->Release();
}
}
pads->Release();
}
return hr;
}
다음 코드 예제에서는 LDAP 공급자를 사용하여 사용자가 암호 권한을 변경할 수 없음을 확인하는 방법을 보여줍니다.
참고
다음 코드 예제는 "모든 사람" 및 "NT AUTHORITY\SELF" 문자열이 도메인에서 첫 번째 도메인 컨트롤러의 언어에 따라 지역화되므로 기본 언어가 영어인 도메인에서만 작동합니다. Visual Basic에서는 LookupAccountSid 함수를 호출하지 않고도 잘 알려진 보안 주체의 계정 이름을 가져올 수 없습니다. Visual Basic을 사용하는 경우 WinNT 공급자를 사용하여 사용자가 암호를 변경할 수 없음 (WinNT 공급자)을 읽는 것과 같이 사용자가 암호 권한을 변경할 수 없음을 확인하는 것이 좋습니다.
Const CHANGE_PASSWORD_GUID = "{AB721A53-1E2F-11D0-9819-00AA0040529B}"
Const ADS_ACETYPE_ACCESS_DENIED_OBJECT = &H6
Function UserCannotChangePassword(strUserDN As String, strUsername As String, strPassword As String) As Boolean
UserCannotChangePassword = False
Dim oUser As IADs
Dim oSecDesc As IADsSecurityDescriptor
Dim oACL As IADsAccessControlList
Dim oACE As IADsAccessControlEntry
Dim fEveryone As Boolean
Dim fSelf As Boolean
fEveryone = False
fSelf = False
If "" <> strUsername Then
Dim dso As IADsOpenDSObject
' Bind to the group with the specified user name and password.
Set dso = GetObject("LDAP:")
Set oUser = dso.OpenDSObject(strUserDN, strUsername, strPassword, 1)
Else
' Bind to the group with the current credentials.
Set oUser = GetObject(strUserDN)
End If
Set oSecDesc = oUser.Get("ntSecurityDescriptor")
Set oACL = oSecDesc.DiscretionaryAcl
For Each oACE In oACL
If UCase(oACE.ObjectType) = UCase(CHANGE_PASSWORD_GUID) Then
If oACE.Trustee = "Everyone" And oACE.AceType = ADS_ACETYPE_ACCESS_DENIED_OBJECT Then
fEveryone = True
End If
If oACE.Trustee = "NT AUTHORITY\SELF" And oACE.AceType = ADS_ACETYPE_ACCESS_DENIED_OBJECT Then
fSelf = True
End If
End If
Next
If fSelf And fEveryone Then
UserCannotChangePassword = True
Else
UserCannotChangePassword = False
End If
End Function