Learn about Permission and Role Based Access Control - RBAC part 2

TipsMake.com - In the previous part of the article, we have shown you how to set up, configure the level of decentralization with RBAC - Role Based Access Control by deploying Predefined Role Groups through the graphical interface of Exchange Control Panel . However, when it comes to the need to set more decentralization levels than Predefined Role Groups can support, this is the time we should use Exchange Management Shell to handle.

Check RBAC settings via Exchange Management Shell:

In this section, we will show you how to view technical information in the Exchange Management Shell as well as in the Exchange Control Panel.

For example, we can apply the Exchange Control Panel mode (screenshot below) to check the Assigned Roles that belong to the role group Recipient Management:

Learn about Permission and Role Based Access Control - RBAC part 2 Picture 1

And if you want to do so in the Exchange Management Shell, then type the command:

Get-RoleGroup 'Recipient Management' | fl

Learn about Permission and Role Based Access Control - RBAC part 2 Picture 2

This is the system result displayed when we press Enter. Note that the Assigned Roles information (in the red box) will display correctly with the above 2 screenshots. Besides the role, you can also see the brief description - Description of the corresponding Recipient Management and member role group (at this time is empty) and many other information:

Learn about Permission and Role Based Access Control - RBAC part 2 Picture 3

However, what we have seen here has not shown any advantages of the Exchange Management Shell compared to the Exchange Control Panel.

To find out more, we will have to refer to the sample model as shown below. For example, your company has decided to hire a few administrators to practice, your task is to assign them certain levels of authority to set up and configure related components. such as Office, Phone no., Mobile no., Department and Managers.

As mentioned in Part 1 of the article, we can easily do this by assigning each Admin account to the full Mail Recipients role. However, doing so will also trigger their full access to other parts of the system - this element is not included in the plan nor required. Let's take a look at the level of risk in this situation if the administrator assigns full authority to the Mail Recipients role, Role Entries objects ( cmdlets and parameters ) related to that specific role.

First, open the Exchange Management Shell and type the command:

Get-ManagementRoleEntry 'Mail Recipients *'

The system will display some information as shown below:

Learn about Permission and Role Based Access Control - RBAC part 2 Picture 4

We can easily recognize a lot of role records. Surely no one wants to assign the full Admin rights to the interns ever. The solution is to create a small role within the system of the Mail Recipients role and assign the necessary permissions to them.

Plan with RBAC and learn about Cmdlet:

Before embarking on the process of learning about Exchange Management Shell and executing Cmdlet , we need to prepare and plan specifically. Please refer to the RBAC here.

Scope - Where:

The first is that you need to identify the Scope object or Where . Normally, we need to use the New-ManagementScope cmdlet to create a new scope. However, since the administrator skipped the role parent role, the new management roles will inherit the role and scope role of the role at the higher level. Therefore, there is no need to initialize a scope, nor do you need to use the New-ManagementScope cmdlet. Instead, like the higher-level role, the newly created roles provide Read-Write functionality for the object to receive information, data, and configuration, set up for the entire system.

Role - What:

The next component is mentioned here as Role , because of the Mail Recipients role - we want the new role to be inherited, assigned to many objects that are not really needed. Which way to do it here will include:

- Use the cmdlet New-ManagementRole cmdlet to assign a new name to the management role (eg Exinterns) and specify the upper role to inherit the new role (eg Mail Recipients).

- Remove all objects inherited from the Mail Recipients role, then rearrange everything with the Get-ManagementRoleEntry, Remove-ManagementRoleEntry, and Add-ManagementRoleEntry cmdlets .

Role Group - Who:

The last thing to do here is to initialize the Role Group , or the Who using the New-RoleGroup cmdlet. At the same time, this is also the process of connecting different steps above ( Where and What ) into a complete Role Assignment .

Configuration, set RBAC via Exchange Management Shell:

To create a role named Exinterns that can inherit the functionality of the Mail Recipients role , type the command:

New-ManagementRole -Name 'ExInterns' -Parent 'Mail Recipients'

After pressing Enter, the system will display the results as shown below:

Learn about Permission and Role Based Access Control - RBAC part 2 Picture 5
This means we have successfully created the ExInterns role

Next, you need to collect all of the ExInterns management role objects and remove them, except for one component. That's because the system always requires at least 1 role. Therefore, we will retain the Get-User cmdlet because we want the ExInterns role to take advantage of the Set-User cmdlet - which can only work effectively when applied in conjunction with Get-User . Type the command:

Get-ManagementRoleEntry 'ExInterns *' | Where {$ _. Name -ne 'GetUser'} | RemoveManagemRoleEntry

Basically, Set-User will activate the Interns to set up mailboxes. As soon as you press Enter, we will see the message panel shown below:

Learn about Permission and Role Based Access Control - RBAC part 2 Picture 6

And then there is a lot of display confirmation information, press A corresponding to Yes to All , Y is Yes , N is No and L is No to All . Then, type the command:

Get-ManagementRoleEntry 'ExInterns *'

Learn about Permission and Role Based Access Control - RBAC part 2 Picture 7

We can easily see that, unlike the first time we implemented the cmdlet, the new ExInterns role will no longer contain any role that is inherited from the same high-level role. And at this point, we are ready to assign a new role to enable Exchange Interns to configure, set up Office, Phone no., Mobile no., Department and Managers as required. To do that, type the command:

Add-ManagementRoleEntry 'ExInternsSet-User' -Parameters Office, Phone, Mobilephone, Department, Manager

Learn about Permission and Role Based Access Control - RBAC part 2 Picture 8

Besides, if you skip the components such as Parameters Office, Phone, Mobilephone, Department, Manager, Exchange Interns will be able to access all parameters of Set-User cmdlet . Therefore, we have not only limited the ability of Interns to receive the cmdlets of Get-User and Set-User , but also become special compared to Set-, Phone, Mobilephone, Department, and Manager parameters of Set- User


And finally, we create the Role Group ( ExInterns example) and specify the role to be assigned to ( ExInterns for example) by typing the command:

New-RoleGroup 'ExInterns' -Roles 'ExInterns'

Learn about Permission and Role Based Access Control - RBAC part 2 Picture 9

The next action to be taken here is to create Role Assignment - ExInterns-ExInterns . To verify this, we can list all the current role groups using Get-RoleGroup . The results displayed will look like the picture below:

Learn about Permission and Role Based Access Control - RBAC part 2 Picture 10

After that, you will be able to assign the Interns to the ExInterns role group.

Assign a User account to the role group:

Although we can assign User accounts to the role group using the Exchange Management Shell, this will become simpler if using the Exchange Control Panel. So, go back to the Exchange Control Panel and select the Administrator Roles tab, click the Refresh button several times to check the newly assigned role groups:

Learn about Permission and Role Based Access Control - RBAC part 2 Picture 11

Next, find the ExInters role group and double-click on it:

Learn about Permission and Role Based Access Control - RBAC part 2 Picture 12

The setup group of the role group will be displayed, click the Add button to assign a new member:

Learn about Permission and Role Based Access Control - RBAC part 2 Picture 13

We can choose 1 or more user accounts to assign here, each selected member will be displayed in the text box. Click OK when done:

Learn about Permission and Role Based Access Control - RBAC part 2 Picture 14

And when we return to the role group's main window, we will see the newly assigned members displayed here. Click Save :

Learn about Permission and Role Based Access Control - RBAC part 2 Picture 15

While older versions of Exchange have only a few Administrator groups to choose from, the new RBAC authorization model in Exchange 2010 allows users to set up, initiate more modes, improve and improve flexibility. The role assignment was given by Role Based Access Control , which supports administrators in setting up roles and authorities more precisely and more specifically than before. Good luck!

4.6 ★ | 9 Vote

May be interested

  • Learn about the Security Configuration Wizard in Exchange Server 2007 - Part 1Photo of Learn about the Security Configuration Wizard in Exchange Server 2007 - Part 1
    in the following article, we will introduce you some basic characteristics of security configuration wizard - scw of exchange server 2007, with the main purpose of minimizing the possibility of attack on the system. exchange server by turning off services, ports, features and programs is not really necessary ...
  • Manage the Event Log with the command linePhoto of Manage the Event Log with the command line
    for many of us, using the command line - command line to control and use some of the functions in the windows system will cause them to have headaches and problems. however, if you have to set up an automatic function system in windows and other server operating systems, the command line is an irreplaceable tool ...
  • Install Hyper-V Virtualization on Windows Server 2008 R2Photo of Install Hyper-V Virtualization on Windows Server 2008 R2
    in the following article, we will introduce and guide you a few basic steps to install and deploy the technology platform that supports virtualization of hyper-v on windows server 2008 r2.
  • Use PowerShell to create EventLogPhoto of Use PowerShell to create EventLog
    in the following article, i will show you how to use powershell to create log records on the system, namely the write-eventlog cmdlet command. the basic syntax of this command takes the form ...
  • Learn about Intel Platform Administration Technology - IPAT part 1Photo of Learn about Intel Platform Administration Technology - IPAT part 1
    in the following article, we will introduce you some characteristics, how to implement and apply the intel platform administration technology platform - ipat.
  • Add or remove user accounts for Windows Home Server 2011Photo of Add or remove user accounts for Windows Home Server 2011
    after installing windows home server 2011 you need to start configuring it. part of the configuration work is adding users on the network. this article will show you how to implement and manage their access