Source code of Windows XP (NT5)
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

268 lines
9.5 KiB

  1. ;/*++
  2. ;
  3. ;Copyright (c) 1998-1998 Microsoft Corporation
  4. ;
  5. ;Module Name:
  6. ;
  7. ; dsaclsmsg.mc (will create dsaclsmsg.h when compiled)
  8. ;
  9. ;Abstract:
  10. ;
  11. ; This file contains the DSACLS messages.
  12. ;
  13. ;Author:
  14. ;
  15. ;
  16. ;Revision History:
  17. ;
  18. ;--*/
  19. ;//
  20. ;// These are simply resource indexes
  21. ;//
  22. ;#define MSG_TAG_SD 0x8001
  23. ;#define MSG_TAG_RC 0x8002
  24. ;#define MSG_TAG_WD 0x8003
  25. ;#define MSG_TAG_WO 0x8004
  26. ;#define MSG_TAG_CC 0x8005
  27. ;#define MSG_TAG_DC 0x8006
  28. ;#define MSG_TAG_LC 0x8007
  29. ;#define MSG_TAG_WS 0x8008
  30. ;#define MSG_TAG_WP 0x8009
  31. ;#define MSG_TAG_RP 0x800A
  32. ;#define MSG_TAG_DT 0x800B
  33. ;#define MSG_TAG_LO 0x800C
  34. ;#define MSG_TAG_IS 0x800E
  35. ;#define MSG_TAG_IT 0x800F
  36. ;#define MSG_TAG_IP 0x8010
  37. ;#define MSG_TAG_ID 0x8011
  38. ;#define MSG_TAG_AC 0x8012
  39. ;#define MSG_TAG_GR 0x8013
  40. ;#define MSG_TAG_GE 0x8014
  41. ;#define MSG_TAG_GW 0x8015
  42. ;#define MSG_TAG_GA 0x8016
  43. ;#define MSG_TAG_SD_EX 0x8018
  44. ;#define MSG_TAG_RC_EX 0x8019
  45. ;#define MSG_TAG_WD_EX 0x801A
  46. ;#define MSG_TAG_WO_EX 0x801B
  47. ;#define MSG_TAG_CC_EX 0x801C
  48. ;#define MSG_TAG_DC_EX 0x801D
  49. ;#define MSG_TAG_LC_EX 0x801E
  50. ;#define MSG_TAG_WS_EX 0x801F
  51. ;#define MSG_TAG_WP_EX 0x8020
  52. ;#define MSG_TAG_RP_EX 0x8021
  53. ;#define MSG_TAG_DT_EX 0x8022
  54. ;#define MSG_TAG_LO_EX 0x8023
  55. ;#define MSG_TAG_GR_EX 0x8024
  56. ;#define MSG_TAG_GE_EX 0x8025
  57. ;#define MSG_TAG_GW_EX 0x8026
  58. ;#define MSG_TAG_GA_EX 0x8027
  59. ;#define MSG_TAG_AC_EX 0x8028
  60. ;#define MSG_TAG_PY 0x8029
  61. ;#define MSG_TAG_PN 0x8030
  62. ;//
  63. ;// These values must be flags, since they are used as such during cmdline processing
  64. ;//
  65. ;#define MSG_TAG_CI 0x0001
  66. ;#define MSG_TAG_CN 0x0002
  67. ;#define MSG_TAG_CP 0x0004
  68. ;#define MSG_TAG_CG 0x0008
  69. ;#define MSG_TAG_CD 0x0010
  70. ;#define MSG_TAG_CR 0x0020
  71. ;#define MSG_TAG_CS 0x0040
  72. ;#define MSG_TAG_CT 0x0080
  73. ;#define MSG_TAG_CA 0x0100
  74. ;#define MSG_TAG_GETSDDL 0x0200
  75. ;#define MSG_TAG_SETSDDL 0x0400
  76. ;#define MSG_DSACLS_SUCCESS 8002
  77. ;#define MSG_DSACLS_FAILURE 8003
  78. ;#define MSG_DSACLS_NO_UA 8004
  79. ;#define MSG_DSACLS_PARAM_UNEXPECTED 8005
  80. ;#define MSG_DSACLS_ACCESS 8006
  81. ;#define MSG_DSACLS_AUDIT 8007
  82. ;#define MSG_DSACLS_OWNER 8008
  83. ;#define MSG_DSACLS_GROUP 8009
  84. ;#define MSG_DSACLS_PROTECTED 8010
  85. ;#define MSG_DSACLS_INHERIT_TO 8011
  86. ;#define MSG_DSACLS_PROPERTY 8012
  87. ;#define MSG_DSACLS_OBJECT 8013
  88. ;#define MSG_DSACLS_INHERIT 8014
  89. ;#define MSG_DSACLS_USER 8015
  90. ;#define MSG_DSACLS_RIGHT 8016
  91. ;#define MSG_DSACLS_PROCESSED 8017
  92. ;#define MSG_DSACLS_EFFECTIVE 8018
  93. ;#define MSG_DSACLS_INHERITED 8019
  94. ;#define MSG_DSACLS_INHERITED_ALL 8020
  95. ;#define MSG_DSACLS_INHERITED_SPECIFIC 8021
  96. ;#define MSG_DSACLS_ALLOW 8022
  97. ;#define MSG_DSACLS_DENY 8023
  98. ;#define MSG_DSACLS_INHERITED_FROM_PARENT 8024
  99. ;#define MSG_DSACLS_ACCESS_FOR 8025
  100. ;#define MSG_DSACLS_SPECIAL 8026
  101. ;#define MSG_DSACLS_NO_ACES 8027
  102. ;#define MSG_DSACLS_NO_MATCHING_SID 8028
  103. ;#define MSG_DSACLS_NO_MATCHING_GUID 8029
  104. ;#define MSG_DSACLS_PROPERTY_PERMISSION_MISMATCH 8030
  105. ;#define MSG_DSACLS_EXTENDED_RIGHTS_PERMISSION_MISMATCH 8031
  106. ;#define MSG_DSACLS_VALIDATED_RIGHTS_PERMISSION_MISMATCH 8032
  107. ;#define MSG_DSACLS_CHILD_OBJECT_PERMISSION_MISMATCH 8033
  108. ;#define MSG_DSACLS_INCORRECT_INHERIT 8034
  109. ;#define MSG_DSACLS_AUDIT_SUCCESS 8035
  110. ;#define MSG_DSACLS_AUDIT_FAILURE 8036
  111. ;#define MSG_DSACLS_AUDIT_ALL 8037
  112. ;#define MSG_INVALID_OBJECT_PATH 8038
  113. MessageId=8001 SymbolicName=MSG_DSACLS_USAGE
  114. Language=English
  115. Displays or modifies permissions (ACLS) of an Active Directory (AD)
  116. Object
  117. DSACLS object [/I:TSP] [/N] [/P:YN] [/G <group/user>:<perms> [...]]
  118. [/R <group/user> [...]] [/D <group/user>:<perms> [...]]
  119. [/S] [/T] [/A]
  120. object Path to the AD object for which to display or
  121. manipulate the ACLs
  122. Path is the RFC 1779 format of the name, as in
  123. CN=John Doe,OU=Software,OU=Engineering,DC=Widget,DC=com
  124. A specific Active Directory can be denoted by prepending \\server\
  125. to the object, as in
  126. \\ADSERVER\CN=John Doe,OU=Software,OU=Engineering,DC=Widget,DC=US
  127. no options displays the security on the object.
  128. /I Inheritance flags:
  129. T: This object and sub objects
  130. S: Sub objects only
  131. P: Propagate inheritable permissions one level only.
  132. /N Replaces the current access on the object, instead of
  133. editing it.
  134. /P Mark the object as protected
  135. Y:Yes
  136. N:No
  137. If /P option is not present, current protection flag is
  138. maintained.
  139. /G <group/user>:<perms>
  140. Grant specified group (or user) specified permissions.
  141. See below for format of <group/user> and <perms>
  142. /D <group/user>:<perms>
  143. Deny specified group (or user) specified permissions.
  144. See below for format of <group/user> and <perms>
  145. /R <group/user> Remove all permissions for the specified group (or user).
  146. See below for format of <group/user>
  147. /S Restore the security on the object to the default for
  148. that object class as defined in AD Schema.
  149. /T Restore the security on the tree of objects to the
  150. default for the object class.
  151. This switch is valid only with the /S option.
  152. /A When displaying the security on an Active Directory object,
  153. display the ownership and auditing information as well as
  154. the permissions
  155. <user/group> should be in the following forms:
  156. group@domain or domain\group
  157. user@domain or domain\user
  158. <perms> should be in the following form:
  159. [Permission bits];[Object/Property];[Inherited Object Type]
  160. Permission bits can have the following values concatenated together:
  161. Generic Permissions
  162. GR Generic Read
  163. GE Generic Execute
  164. GW Generic Write
  165. GA Generic All
  166. Specific Permissions
  167. SD Delete
  168. DT Delete an object and all of it's children
  169. RC Read security information
  170. WD Change security information
  171. WO Change owner information
  172. LC List the children of an object
  173. CC Create child object
  174. DC Delete a child object
  175. For these two permissions, if [Object/Property] is
  176. not specified to define a specific child object type,
  177. they apply all types of child objects otherwise they
  178. apply to that specific child object type.
  179. WS Write to self object
  180. Meaningful only on Group objects and when [Object/Property]
  181. is filled in as "member"
  182. WP Write property
  183. RP Read property
  184. For these two permissions, if [Object/Property] is not
  185. specified to define a specific property, they apply to
  186. all properties of the object otherwise they apply to that
  187. specific property of the object.
  188. CA Control access right
  189. For this permission, if [Object/Property] is not specified
  190. to define the specific "extended right" for control access,
  191. it applies to all control accesses meaningful on the
  192. object, otherwise it applies to the specific extended right
  193. for that object.
  194. LO List the object access. Can be used to grant
  195. list access to a specific object if
  196. List Children (LC) is not granted to the parent as
  197. well can denied on specific objects to hide those objects
  198. if the user/group has LC on the parent.
  199. NOTE: Active Directory does NOT enforce this permission
  200. by default, it has to be configured to start checking for
  201. this permission.
  202. [Object/Property]
  203. must be the display name of the object type or the property.
  204. for example "user" is the display name for user objects and
  205. "telephone number" is the display name for telephone number property.
  206. [Inherited Object Type]
  207. must be the display name of the object type that the permissions
  208. are expected to be inherited to. The permissions MUST be Inherit Only.
  209. NOTE: This must only be used when defining object specific permissions
  210. that override the default permissions defined in the AD schema for that
  211. object type. USE THIS WITH CAUTION and ONLY IF YOU UNDERSTAND object
  212. specific permissions.
  213. Examples of a valid <perms> would be:
  214. SDRCWDWO;;user
  215. means:
  216. Delete, Read security information, Change security information and
  217. Change ownership permissions on objects of type "user".
  218. CCDC;group;
  219. means:
  220. Create child and Delete child permissions to create/delete objects
  221. of type group.
  222. RPWP;telephonenumber;
  223. means:
  224. read property and write property permissions on telephone number
  225. property
  226. You can specify more than one user in a command.
  227. .