Come and Check our BETA Alpha version of Powershellcenter.net
Send me your comment to Powershell@powershellcenter.com

Synopsis

Use the Add-ADPermission cmdlet to add permissions to an Active Directory object.

Syntax

Add-ADPermission -Identity <ADRawEntryIdParameter> -User <SecurityPrincipalIdParameter> [-AccessRights <ActiveDirectoryRights[]>] [-ChildObjectTypes <ADSchemaObjectIdParameter[]>] [-Confirm [<SwitchParameter>]] [-Deny <SwitchParameter>] [-DomainController <Fqdn>] [-ExtendedRights <ExtendedRightIdParameter[]>] [-InheritanceType <None | All | Descendents | SelfAndChildren | Children>] [-InheritedObjectType <ADSchemaObjectIdParameter>] [-Properties <ADSchemaObjectIdParameter[]>] [-WhatIf [<SwitchParameter>]] [<CommonParameters>]

Add-ADPermission -Identity <ADRawEntryIdParameter> -Owner <SecurityPrincipalIdParameter> [-Confirm [<SwitchParameter>]] [-DomainController <Fqdn>] [-WhatIf [<SwitchParameter>]] [<CommonParameters>]

Add-ADPermission [-Identity <ADRawEntryIdParameter>] -Instance <ADAcePresentationObject> [-AccessRights <ActiveDirectoryRights[]>] [-ChildObjectTypes <ADSchemaObjectIdParameter[]>] [-Confirm [<SwitchParameter>]] [-Deny <SwitchParameter>] [-DomainController <Fqdn>] [-ExtendedRights <ExtendedRightIdParameter[]>] [-InheritanceType <None | All | Descendents | SelfAndChildren | Children>] [-InheritedObjectType <ADSchemaObjectIdParameter>] [-Properties <ADSchemaObjectIdParameter[]>] [-User <SecurityPrincipalIdParameter>] [-WhatIf [<SwitchParameter>]] [<CommonParameters>]

Detailed Description

The ADPermission cmdlets can be used to directly modify Active Directory access control lists (ACLs). Although some Microsoft Exchange Server 2010 features may continue to use the ADPermission cmdlets to manage permissions, for example transport Send and Receive connectors, Exchange 2010 no longer uses customized ACLs to manage administrative permissions. If you want to grant or deny administrative permissions in Exchange 2010, you must use the Role Based Access Control (RBAC) management cmdlets. For more information about RBAC, see Understanding Role Based Access Control. You need to be assigned permissions before you can run this cmdlet. Although all parameters for this cmdlet are listed in this topic, you may not have access to some parameters if they're not included in the permissions assigned to you. To see what permissions you need, see the "Legacy permissions" entry in the Role Management Permissions topic.

Parameters

-Identity [<ADRawEntryIdParameter>]

The Identity parameter specifies the identity of the object that's getting permissions added. You can specify either the distinguished name (DN) of the object or the object's name if it's unique. If the DN or name contains spaces, enclose the name in quotation marks (").

Required?   True
Position?   1
Default value?    
Accept pipeline input?   True
Accept wildcard characters?   False

-Instance [<ADAcePresentationObject>]

The Instance parameter enables you to pass an entire object to the command to be processed. It's mainly used in scripts where an entire object must be passed to the command.

Required?   True
Position?   Named
Default value?    
Accept pipeline input?   True
Accept wildcard characters?   False

-Owner [<SecurityPrincipalIdParameter>]

The Owner parameter specifies the owner of the Active Directory object. If the name of the owner contains spaces, enclose the name in quotation marks (").

The Owner parameter can only be used with the Identity parameter and no other parameters.

Required?   True
Position?   Named
Default value?    
Accept pipeline input?   False
Accept wildcard characters?   False

-User [<SecurityPrincipalIdParameter>]

The User parameter specifies the user that the permissions are being granted to on the object. If the name contains spaces, enclose the name in quotation marks (").

Required?   True
Position?   Named
Default value?    
Accept pipeline input?   False
Accept wildcard characters?   False

-AccessRights [<ActiveDirectoryRights[]>]

The AccessRights parameter specifies the rights needed to perform the operation. Valid values include:

* CreateChild

* DeleteChild

* ListChildren

* Self

* ReadProperty

* WriteProperty

* DeleteTree

* ListObject

* ExtendedRight

* Delete

* ReadControl

* GenericExecute

* GenericWrite

* GenericRead

* WriteDacl

* WriteOwner

* GenericAll

* Synchronize

* AccessSystemSecurity

Required?   False
Position?   Named
Default value?    
Accept pipeline input?   False
Accept wildcard characters?   False

-ChildObjectTypes [<ADSchemaObjectIdParameter[]>]

The ChildObjectTypes parameter specifies what type of object the permission should be applied to.

The ChildObjectTypes parameter can only be used if the AccessRights parameter is set to CreateChild or DeleteChild.

Required?   False
Position?   Named
Default value?    
Accept pipeline input?   False
Accept wildcard characters?   False

-Confirm [<SwitchParameter>]

The Confirm switch causes the command to pause processing and requires you to acknowledge what the command will do before processing continues. You don't have to specify a value with the Confirm switch.

Required?   False
Position?   Named
Default value?    
Accept pipeline input?   False
Accept wildcard characters?   False

-Deny [<SwitchParameter>]

The Deny switch specifies whether to deny permissions to the user on the Active Directory object.

Required?   False
Position?   Named
Default value?    
Accept pipeline input?   False
Accept wildcard characters?   False

-DomainController [<Fqdn>]

The DomainController parameter specifies the fully qualified domain name (FQDN) of the domain controller that writes this configuration change to Active Directory.

Required?   False
Position?   Named
Default value?    
Accept pipeline input?   False
Accept wildcard characters?   False

-ExtendedRights [<ExtendedRightIdParameter[]>]

The ExtendedRights parameter specifies the extended rights needed to perform the operation.

Required?   False
Position?   Named
Default value?    
Accept pipeline input?   False
Accept wildcard characters?   False

-InheritanceType [<None | All | Descendents | SelfAndChildren | Children>]

The InheritanceType parameter specifies whether permissions are inherited.

Required?   False
Position?   Named
Default value?    
Accept pipeline input?   False
Accept wildcard characters?   False

-InheritedObjectType [<ADSchemaObjectIdParameter>]

The InheritedObjectType parameter specifies what kind of object inherits this access control entry (ACE).

Required?   False
Position?   Named
Default value?    
Accept pipeline input?   False
Accept wildcard characters?   False

-Properties [<ADSchemaObjectIdParameter[]>]

The Properties parameter specifies what properties the object contains.

The Properties parameter can only be used if the AccessRights parameter is set to ReadProperty, WriteProperty or Self.

Required?   False
Position?   Named
Default value?    
Accept pipeline input?   False
Accept wildcard characters?   False

-WhatIf [<SwitchParameter>]

The WhatIf switch instructs the command to simulate the actions that it would take on the object. By using the WhatIf switch, you can view what changes would occur without having to apply any of those changes. You don't have to specify a value with the WhatIf switch.

Required?   False
Position?   Named
Default value?    
Accept pipeline input?   False
Accept wildcard characters?   False

Input Type

To see the input types that this cmdlet accepts, see Cmdlet Input and Output Types (http://go.microsoft.com/fwlink/?LinkId=217198). If the Input Type field for a cmdlet is blank, the cmdlet doesn't accept input data.

Return Type

To see the return types, which are also known as output types, that this cmdlet accepts, see Cmdlet Input and Output Types (http://go.microsoft.com/fwlink/?LinkId=217198). If the Output Type field is blank, the cmdlet doesn't return data.

Notes

Examples

EXAMPLE 1

PS> 

 

This example grants Send As permissions for Aaron Painter to Ellen Adams's mailbox.

Add-ADPermission -Identity "Ellen Adams" -User AaronPainter -AccessRights ExtendedRight -ExtendedRights "send as"

EXAMPLE 2

PS> 

 

This example configures the IP Secured Inbound Receive connector to accept anonymous SMTP messages.

This example assumes that another security mechanism is used to ensure the Receive connector can't be used to send unsolicited commercial e-mail messages. We recommend that you don't allow external clients to send messages anonymously through a Receive connector.

Add-AdPermission "IP Secured Inbound" -User "NT AUTHORITY\ANONYMOUS LOGON" -ExtendedRights ms-Exch-SMTP-Submit,ms-Exch-SMTP-Accept-Any-Recipient,ms-Exch-Bypass-Anti-Spam