Question for the SDMB Technology Advisory Council

I’m posting this here as a last resort. All other wells are dry. I’m out of ideas.

Attention SDMB Techies! I’ve got a problem to solve at work and resolution is eluding me. I’ve scoured Micro$oft’s tech pages and Googled until my fingers were raw, but I can’t find a way to do what I want to do. First a bit of background…

[GeekSpeak]

I have implemented a web-based tool which allows users to reset their password or unlock their account (Win2K Active Directory, XP Clients). I’ve got an AD account I’m using as a service account - users can log on anywhere, including their own machine, using this account. I’ve applied a Used-Defined Group Policy to this account which, upon logon, launches the Password Reset Page in Kiosk mode, prevents users from closing IE, and only allows Log Off when they CTRL+ALT+DEL. I’ve applied several other sundry security measures to this account which are not directly relevent to this problem I’m presenting. Suffice it to say - if you worked here and locked your account or forgot your network password, you’d be able to log on to your own machine using this account and unlock or reset your password - but other than that you’d only be able to log out again (to subsequently log on using your own credentials). The credentials/instructions to do this are displayed on the security screen after the CTRL+ALT+DEL, so if you’ve locked yourself out the solution will be right there for you. (Cool, eh?).

Anyways, the logon, the page, the process works a treat, but I have one minor problem.

If a user passes a bad password with this account 3 times, the account gets locked out - that’s the default domain policy and with all other accounts it’s a good thing. However, I want this account, and only this account, to never lock. Unfortunately, this particular bit of policy is a Computer-Defined Group Policy in AD, and since I want users to be able to log on anywhere using this account I can’t override the lock out policy on every machine (Catch-22). I was hoping I’d find a solution within the net user command (I used net user to allow a blank password on this account contrary to domain policy), or in ADSI Edit, but I haven’t found a solution. I thought perhaps this could be done through LDAP, but my searches have revealed nothing.

The best solution I can come up with, lacking a conventional solution, is to implement a script that runs constantly setting the badPwdCount (via ADSI Edit) back to ZERO. This is sloppy, though - I consider this only a bridge to a better solution.

[/GS]

A solution would be fantastic (will you do my homework for me, please :slight_smile: ), but I’d settle for a decent Windows Systems Administrator Forum (that’s not filled with little trolls asking how to hack their school network) if you can recommend one.

Lemme move this to GQ for you. You should find a quicker answer in that forum.

The way I would set something like this up would be to put the service account in its own OU, block inheritance to that OU, and set whatever lockout policy you want on the service account OU.

I’m pretty sure that would work but you’ll need to test it.

Unfortunately, that won’t work. The lockout policy is Computer-oriented, so I would need to apply it to every workstation that people would log on to using the service account, but I can’t because I still want the policy applied to peoples regular accounts. I’d like people to be able to log onto their own machines to unlock their passwords.

If, for instance, I set up dedicated machines specifically for this password utility and nothing else, then I could configure it per your recommendation.

This is a tough one.

We’re touched!

Did you try it? The “computer configuration” section of the user policy should be applied after the “computer configuration” section of the machine’s policy and override it.

If it doesn’t, you can try turning off the asynchronous processing by enabling “Always wait for the network at computer startup and logon to the computer”. This setting is located under Computer Configuration\Administrative Templates\System\Logon.

Of course I tried it! I’ve already got the “computer configuration” bit you’re referring to defined in the Group Policy. It didn’t work, but I left it in thinking perhaps there might be some way to make it stick later. That being said, I had not tried enabling the “Always wait for the network…” as you suggested, so I just tried that.

No dice. I appreciate your feedback, though, just the same.

And I got ragged on at a Windows Administrator forum I found regarding the 3 attempts then lockout policy here. :rolleyes:

The guy breaking my balls about that, however, had nothing to add regarding my actual problem. I’m going to call him out on it.

Heh. I know, I know. This isn’t a tech support forum, though, and this (obviously) is a highly technical question. I didn’t want anyone thinking I was misusing the boards.

:cool: