ALL >> System-Network-Administration >> View Article
Permissions Set For The Parent Objects Can Be Inherited By Child Objects

After you set permissions on a parent object, child objects created in the parent object can inherit these Network+ certification permissions. There are three indicators of inherited permissions:
Shaded permissions check boxes These check boxes are located in the Security tab in the Properties dialog box for an object, shown previously in Figure 9-6, and in the Permission Entry dialog box for an object, shown previously in Figure 9-7.
If a permission is inherited, a permissions check box is shaded. However, shaded special permissions check boxes do not indicate inherited permissions. These shaded check boxes merely indicate that a special permission exists.
The Inherited From column This column is located in the Permission Entries list in the Advanced Security Settings dialog box for an object, shown in Figure 9-9-If a permission is inherited, the distinguished name of the parent object is displayed. This is a new feature in Windows Server 2003.
Unavailable Remove button for a permission This button is located in the Advanced Security Settings dialog box, ...
... shown in Figure 9-9. If a permission is inherited, the Remove button is unavailable, because the Network+ exam permission must be removed at the parent object.
Effective Permissions
Effective permissions are the overall permissions that a security principal has for an object, including group membership and inheritance from parent objects. A new fea-ture in Windows Server 2003 enables you to view the effective permissions granted to a selected security principal for an object.
To view effective permissions granted to a security principal for an object, complete the following steps:
1. Click Start, point to Administrative Tools, and then click Active Directory Users And Computers. On the View menu, ensure that Advanced Features is selected. Right-click the object for which you want to view effective permissions and click Properties.
2.In the Properties dialog box for the object, click the Security tab, and then click Advanced.
3.In the Advanced Security Settings dialog box for the object, click the Effective Permissions tab. Click Select.
In the Select User, Computer, Or Group dialog box, type the name of a user or group in the Enter The Object Name To Select box, and then click OK. The
selected check boxes indicate the effective permissions of the user or group for the object, as shown in Figure 9-10.
The information displayed in the Effective Permissions tab is read-only. Therefore, you cannot change a CCNA certification user's permissions by selecting or clearing permission check boxes in this tab.
Add Comment
System/Network Administration Articles
1. Fiber Optic Polishing Machines: Types, Applications, And When They Are NeededAuthor: Ryan
2. Fiber Optic Pigtails: Types, Specifications, And Applications Explained
Author: Ryan
3. Fiber Curing Oven: Working Principles, Features, And Applications
Author: Ryan
4. From Struggling Pipelines To Sustainable Growth: The Real Benefits Of Outsourcing Lead Generation
Author: Sophia
5. Smart Print Automation: Transforming The Way Print Shops Work
Author: Printstore
6. Reasons To Try Aura Scanning For Inner Healing
Author: vidhi vidhanya
7. Fiber Polishing Machines: Precision Technology For High-performance Optical Networks
Author: Ryan
8. Mtp Cables Are Meant For High-performance Fibre Optic Communication
Author: Ryan
9. The Rising Importance Of Email Security In A Digital-first World
Author: Impaakt Magazine
10. Arbeitszeit Berechnen Mit Arbeitszeitrechner-24.de
Author: Steffen Stahl
11. Can Your Cloud Voip Provider Troubleshoot The Common Problems Associated With This Service?
Author: Julian Serle
12. An Optical Cable Production Line For Powering Global Connectivity
Author: Ryan
13. Why Does Your Business Need Optical Booster Amplifier?
Author: Ryan
14. The Latest In Cloud Technology And What It Means For Your Business
Author: TechFacto Global Services
15. Achieve Nis2 Compliance With Confidence
Author: Tushar Pansare