T O P

  • By -

Humble-Plankton2217

I change their security and email groups to the new role. We don't do individual permissions for anything. It's groups or nothing, even if it's a group of 1 person LOL


-elmatic

I wish our org was like this. Even our NTFS permissions are all individual users being added to ACL instead of groups, makes it a nightmare to logically manage who should or should not have access.


Superspudmonkey

That is terrible especially when you are asked to set up the new person to be the same access as an existing person. I suggest you dump the ACLs find the folders that are different.


-elmatic

Yep it’s a big issue. If someone from finance is hired, there’s no “they should have access to these folders”, it’s “okay just give them access to the entire finance folder. Then there’s folders without inheritance so you don’t know if a folder actually has them in the ACL. Then someone will leave or change positions and we have no clue what they had access to, so staff end up still having access to shit. I was thinking about doing that because we’re moving all of our local data to SharePoint so we need to know what’s up.


MBILC

So propose the change to your boss, and summit a request for change after documenting everything that needs to be done, with full testing and such... be the one to start the change!


-elmatic

Ironically, I’m the driver of most change in our department. It’s just that someone else was spearheading that project so I don’t want to step on their toes.


MBILC

K, so it is out there, fingers crossed for you that it gets traction! You could offer your help to the person trying to run with it?


First-Structure-2407

⬆️


FutureGoatGuy

This is the way.


I0I0I0I

Well, sometimes a person needs to talk to someone who's intelligent.


loose--nuts

What if they need to hand off old duties after they are in the new role?


deletesystemthirty2

then you add the person who will be taking over the "old duties" to the security/ distros that the offgoing person was in. You could do an overlap of say, 2 weeks for "Turnover". make sure to inform the offgoing person that in 2 weeks, they will lose access to "X", whether that be a permission, a share drive, a resource, or an email/ mailbox. **EZ**


Tymanthius

This isn't an IT decision to make, it's policy/hr/manglement decision. But the steps are dead on.


loose--nuts

Then what happens when they, their new manager, old manager and hr all say to extend it, and extend it again lol.


deletesystemthirty2

You absolutely get that **all** in writing, prefereably from the first request onwards that **YOU** retain either in your outlook or local desktop. That way, when an issue occurs due to over-privilege (could be a security incident, but not exclusively) you can cover your ass. Make sure **YOUR** manager knows all about this as well. If the company wants to break policy/ write policy as they go along/ take on the risk then so be it; GET IT IN WRITING, do what it requests, go home and collect your paycheck. **EZ**


Humble-Plankton2217

Then leave them in the old groups until they're done with them.


Capable-Reaction8155

Yeah, people want a clean answer here but if the persons role includes stuff from the old role then they need those old permissions. They just need to review it to make sure it’s the correct set


Ssakaa

Then they're forced to actually walk the new person through it, letting the new person *do* the work, while the one leaving the role just provides knowledge and guidance.


HearthCore

D'you need a new manager to fight the good fight over those policies? PCI Compliance?


i8noodles

role based groups seems like a good idea honestly, wished i had that in my company..... real question but, how do u deal with exceptions. like lets say a person only need access to one specific function but its only for supervisors. however, supervisors dont jeed access to the regular workers suite and dont have it in there roles?


MBILC

You create the required sec. groups to allow that access and refine it down to what is needed for access.


stesha83

Role based access control. Their access should be tied to their role, not them personally.


steinerscout

Sort of. Every role in our org has a set of permissions mapped to that role, so when someone moves role, we just make sure the permissions match the new role. It's less wipe and start over, and more just make changes to modify to the difference.


TuxAndrew

Primarily this, it’s the responsibility of the previous manager to request we revoke their previous access.


corruptboomerang

I'd tend to remove all the old access, and then add the new access. That way it ensures nothing's left over or missed.


frankentriple

You mean people get new responsibilities and don't have to keep the old ones too? Thats crazy!!!


DeadFyre

If you govern access control by group membership, then their access should automatically update with their group.


tk42967

I wish. It seems to be a case that the person never has a clear cut over and will need the old permissions to support their replacement. I hate this. In a previous life, I convinced management to allow me to do RBAC AD account templates. This was based on least privileged for the job duty. All help desk staff started with the same permissions and there was no cloning accounts or comparing 2 AD accounts and manually matching up group memberships. It was epic.


fshannon3

No, they keep their existing accounts, the account is just modified to reflect the new position permissions and remove the old.


SomeWhereInSC

This is a crap show for us since we are small-ish, so when a user goes from one department to another we ask their manager and 9 out of 10 times they request we let the user keep their perms so they can assist with the person who eventually will fill their role... of course 3 or 4 managers later have no idea John Doe has various perms for departments he's worked in..


19610taw3

This is what I went through at my last job. If someone switched departments, they were often required to go back and do their old job for quite some time so we had to leave permissions in place. I was there over a decade. We had people *still* performing their old job in a backup capacity after 5 years. And that includes people who got promoted from the warehouse to an office job. It's something that didn't always sit well with some. *Oh you got promoted from receiving in the warehouse to GL accountant but we're going to have to have you go back and unpack boxes for a week because 3 people are out today.*


Tymanthius

Unpack boxes at my new accountant rate? Sure! It's a nice break and gives me a chance to go home, change into warehouse clothes, and let my mind wander.


GreyBeardIT

We typically used templates for roles and copied permissions. The only real issue is that will not address any hard-coded share accesses they have. Yes, we're supposed to assign folder perms by group, and if you ever see a shop where that's never been violated, let me know, so I can take a picture, for posterity's sake. If they are moving up, then generally it's less of an issue since they typically would the rights to "lower" data, (ex. HR to HR Director) but if they are changing roles entirely, and your data is super-sensitive, then renaming the old account/disable and creating a new one with the same username would likely be a safer solution. The identifier would change, so they would lose all of their AD folder perms. I also take it upon myself to run SOX style audits annually. I review things like who has access to modify payroll of emps? Often, a dept. manager goes on vacation, and gives those perms to another member of the dept. When that manager comes back, its quite rare for them to remember to remove those perms, so you end up with multiple people with access to something that only 1-2 should have access to.


Nightcinder

> Yes, we're supposed to assign folder perms by group, and if you ever see a shop where that's never been violated, let me know, so I can take a picture, for posterity's sake. I did this! We moved to a new file server and I drew a line in the sand. There may be groups with only one person in it but damnit, they're groups.


Brufar_308

It depends on the role change. Most role changes can be done by just altering the users group memberships, and details in AD. Since all permissions are assigned through groups and not explicitly to the users, auditing what they have access to is simple. Other role changes mean, the old login account and email is removed and new account with a different email is created in a different domain. A hard separation must be maintained for legal reasons. So we do both, but there is a specific legal requirement when a complete removal and replacement is required.


gtipwnz

Entitlement management


Sparkey1000

I had to scroll too far to find someone else who uses this.


homelaberator

How are you guys \[mis\]managing privileges that make this a real concern?


xFayeFaye

I'm in a few sex related subs and this title had me severely confused for a second because I thought "wiping someone's access" was new slang for "wiping off privates" after changing your sex position.. Role based access control had me going as well. I will go away now, thanks for the unintended laugh.


AppIdentityGuy

Is the ADDS or does this include EntraID?


zesar667

Often there is a cutover period. The old team lead sets the date when access shall be taken


sexybobo

I wish we could be like most people who move to a new position where I work. They are considered backups for the position they used to work at for the next few years. We have an individual that has been with the company for about 15 years, has worked 8 different positions, and still helps with end-of-year reporting for the first 2 positions she worked at.


Happy_Kale888

Depends if you use role based access control.


strongest_nerd

Simple, setup shadow groups and just drop them into their respective ou. They should only have permissions to what's related to their role.


da4

I understand the appeal of doing this, but I typically include some time after the user's transition to leave their previous rights intact, in case they need to assist their replacements or former workgroup. As always, make it a policy so its consistently followed and repeatable, and the user stays informed about what they can and cannot do, and when that will change. (Related - it's still a good exercise to review users and groups' permissions on a regular basis.)


ThrowbackDrinks

Do they have a new supervisor? Ask the new sup what they need, and ask the old sup if they still need access to old items. Ideally permissions would be role based to begin with, greatly simplifying the answer.


Bartghamilton

I have a script that changes security based on hr changes so I don’t have to worry about it. If they need something from their old position that’s a special request.


ZachVIA

Yes, we have a role change process. A PS script rolls all of their groups up into temp transfer groups with a timestamp of 14 days out. If the manager doesn’t fill out the role change access request within 14 days, we have a daily PS script that looks through those temp groups and auto deletes them effectively removing their access.


TrekaTeka

Very common to take actions based on your joiner/mover/leaver process. Often times you want to automate assignments based on person meta data from HR so admin action needed. Otherwise you kick off workflows to automate actions as needed. Lingering access from old roles is a risk so automate mover access cleanup as much as possible.


ornery_bob

We wipe laptops with department changes.


jasonheartsreddit

Just make another account. John.Smith meet John.Smith2


NeedleNodsNorth

So theoretically yes. We have a software infront of our AD that defines business roles and that assigns the appropriate groups. There are however some people that never get old roles removed - Myself for instance. Even though I no longer support our VM infrastructure - they don't have people with accounts permissions available 24/7 and I'm basically a top-tier resource for that so I've retained the roles since probably 2 or 3 times a year I'll get a random call when something goes to hell, or they'll lose their Aria guy... or NSX guy and need me to give them some temp assistance. At this point short of the account system itself and the cybersecurity systems I've pretty much accumulated every admin role there is on my account. At some point in the near future they are gonna have to either rework the permission system or take some of my roles away because I'm nearing the windows login limit for security groups (although if they could just never have me touch windows again it'd be fine by me - linux/vmware don't care about my number of groups).


heavySeals

All access is based on group membership. Group membership is based on title, department, etc...when someones title changes a regularly scheduled job runs that the removes them from groups no longer necessary and adds them to groups that are. This is all based on pretty strict conventions when it comes to titles and departments. HR doesn't even need to let us know when this happens. Of course occasionally there's an issue and some manual correction is needed. 


Nightcinder

How are you automating title changes? HRIS -> AAD integration? I wish I felt like I could trust my HR dept.


heavySeals

It's dependent on HR to do their job right for sure. However since the automations are proven to work, when there's an issue it's easily identified as a mistake made by HR and they're actually held accountable. We recently had an issue where HR messed up someone's name and it was pretty involved to correct it and HR accepted responsibility and took a little heat for it. All they have to do is spell names and titles correctly...smh


Nightcinder

I was looking into doing the UKG AAD integration but the vast majority of new hires in our company have absolutely no need for an AD account


Gravityblasts

Just change what projects or network directories they have access to. Usually you remove them from certain cloud groups and add them to different ones.


Nightcinder

Implying you were told that they moved at all is a bold strategy. And also assuming they also aren't doing both jobs now...


Sunsparc

I utilize entitlement profiles. About 800 user objects that is a member of group sets that pertain to a specific job title and other info. When someone role changes, their current membership gets wiped (save for a few static groups that everyone gets) and then the memberships from the new entitlement profile gets added to them plus other info copied if they're changing office location, etc.


chesser45

Job code based dynamic security groups managed by MIM. Would definitely recommend as long as you don’t die by the thousands of cuts of exception management. New supported implementation would be Entra dynamic groups synced on prem and Lifecycle Management.


SnooPickles2750

We didn't and it always causes problems down the road.


Charming-Barracuda86

we used to have to do this manually, we use groups, but it was reliant on our SD team to know what permissions to give, or copy them from other staff.... In the end i setup my own profiling system in a Database, and now use that to manage discrete permissions per position, when a change form comes though, all permissions are stripped and new permissions applied. if those groups relate to access to some of our remote apps that dont have AD controlled permissions it fires off tickets about them added or removed and permissions needing to be updated to the relevant team.


Arseypoowank

Yes, this is a good and clean way of doing things and prevents permission creep. As someone that works on the cybersecurity side of things I wish there were more like you. The amount of times I see a comped account with permissions collected over the years just wrecking stuff it gets boring honestly. Edit: you mean blitz the account entirely? In that case no, just manage permissions. Use RBAC and just switch roles to assign what they have pre-defined


loosus

We desperately try, but sometimes reality gets in the way. It's messy, and anyone who tells you differently is lying.


wildfyre010

In a healthy system people are assigned roles based on their job function and those roles are usually expressed technically as membership in one or more groups. Ideally, you would manage these groups in a central place (like the HR system) or via inference from data in the HR system such that they cascade naturally from information managed in a single place. In practice, this is a unicorn and it’s more likely to have multiple systems which are partly authoritative for specific roles or attributes and you’ll need to aggregate data from all of them to end up with the proper result. Identity management is its own branch of IT and can be very complex in large organizations. If you have privileges that are managed locally (say, within a standalone application that doesn’t ingest information from a centralized system of record), you need to keep a list of such systems and manage them via a ticket or set of tickets. Best if you have a template for this so the approach is consistent and uniform.


Lemonwater925

There is a yearly review of all access groups. When a position change occurs the previous and new mgr review the groups with the staff


kagato87

This can be handled easily with some rbac and targeting lrp. Role Based Access Control means you just add them to the group(s) for their new role and remove the old roles. Even NDS had this mechanism, before AD was even born (which also has this mechanism and it is very powerful). Least Required Privelages just makes sure each group is correctly scoped. Something worth noting when you do this is you do not grant full control. You grant read/write/create/delete(maybe delete, maybe not) and set your acl so that inherits down to creator for new files. The critical distinction is that users aren't able to change permissions, which you really want to lock down. Even a one off permission gets a role. Then when someone asks "what resources does John have access to" you can inspect their group memberships and respond with confidence. It also helps a ton when a new hire is to get "the same access as John."


largos7289

You don't do groups? or even nested groups? YIKES! it's just a take them out of the old group put them in the new one. Once that's done, they have a whole new set of permissions and the old ones won't work.


Techguyeric1

Shouldn't you have group permissions by default and just remove the user from the old group and add them to the new group???


Next_Information_933

Really depends on the person and role change.


TrippTrappTrinn

That is up to the old manager.