This chapter outlines the following permissions and, where appropriate, how to grant them.
In This Topic
- General
Permissions
- Permissions for Common
Management Tasks
- Permissions for Client
Installations
- Permissions for Server
Properties
Caution To modify the registry settings that are described in this guide, use only the Windows Deployment Services management tools—you should not directly edit these settings and attributes.
General Permissions
To fully administer a Windows Deployment Services server, you need the following permissions:
- Local administrator of the Windows
Deployment Services server. This gives you the following
rights:
- File permissions and permissions to the
RemoteInstall folder (the management tools interact with the image
store using UNC paths).
- Registry hive permissions. Many settings for
the Windows Deployment Services server are stored in
HKEY_LOCAL_MACHINE\System, and you need appropriate permissions to
these locations to change them.
- File permissions and permissions to the
RemoteInstall folder (the management tools interact with the image
store using UNC paths).
- Domain administrator of the domain that
contains the Windows Deployment Services server. This gives you
permissions on the Service Control Point (SCP) in Active Directory
Domain Services (AD DS) for the Windows Deployment Services server.
Some configuration settings for the server are stored here.
- Enterprise administrator (optional).
This gives you Dynamic Host Configuration Protocol (DHCP)
authorization permissions. If DHCP authorization is enabled, the
Windows Deployment Services server must be authorized in AD DS
before it will be allowed to answer incoming client PXE requests.
DHCP authorization is stored in the Configuration container
in AD DS.
It is often useful to delegate the management of a Windows Deployment Services server to an account other than the domain administrator or enterprise administrator (and grant these general permissions to the delegated account). The delegated administrator account should be a local and domain administrator as specified above.
Permissions for Common Management Tasks
The following table contains common tasks and the permissions that are required for each.
Task | Permissions Needed | ||||
---|---|---|---|---|---|
Add or remove an image group |
Full control over C:RemoteInstall\Images\ImageGroup. |
||||
Add or remove an image |
Full control over C:RemoteInstall\Images\ImageGroup. |
||||
Disable an image |
Permission to read and write attributes for the associated image file. Disabling an image means hiding the Windows image (.wim) file associated with the image. |
||||
Add a boot image |
Read and write access to the following:
|
||||
Remove a boot image |
Read and write access to C:RemoteInstall\Boot. |
||||
Set properties on an image |
Read and write permissions to the .wim metadata file that represents the image. This file is located within the image group at: C:RemoteInstall\Images\ImageGroup. |
||||
Prestage a computer |
Permissions to create accounts in the domain, as well as write to the properties of a computer object. To grant permissions to prestage a computer
|
||||
Approve a pending computer |
Read and write permissions for the folder that contains the database file Binlsvcdb.mdb in the RemoteInstall share (for example, C:RemoteInstall\MGMT). The actual account of an approved pending computer is created by using the server’s authentication token, not the token of the administrator who is performing the approval. Therefore, in AD DS, you must grant rights to the Windows Deployment Services server’s account (WDSSERVER$) to create computer account objects for the containers and OUs where the approved pending computers will be created. To grant permissions to approve a pending computer
|
||||
Prestage a computer to join a domain |
The user account must have permissions to join the domain. The JoinRights registry setting determines the set of security privileges, and the User registry setting determines which users have the right to join the domain. To change the per server (per architecture) defaults, you need read and write permissions to these registry keys.
|
||||
Convert a RIPREP image |
|
||||
Create a discover or capture image |
|
||||
Create a multicast transmission |
|
||||
Modify a multicast transmission (for example, delete, deactivate, start, stop, disconnect, and so on) |
Full control over the following registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WDSServer\Providers\Multicast |
Permissions for Client Installations
In general, performing a client installation requires domain user rights. However, additional permissions may be required depending on the scenario. This section outlines the minimal set of permissions that are required to perform common installation tasks.
Task | Permissions Needed | ||||
---|---|---|---|---|---|
PXE boot a client computer |
No permissions are required to PXE boot a client, and no mechanism exists to secure the process of booting from the network. If security is the primary concern for you, we recommend that you use physical media (for example, that contains a discover image) to boot each computer. |
||||
Select a boot image |
No permissions are required to select a boot image and no mechanism exists to secure entries that are displayed in the list. The first authentication mechanism occurs using the Windows Deployment Services client running within Windows PE. |
||||
Select an install image |
The credentials provided in the user interface of the Windows Deployment Services client must be those of a domain account. After a client has been authenticated to the Windows Deployment Services server, the authenticated user must be able to read the install .wim file and Res.rwm file from the RemoteInstall folder. By default, authenticated users have permissions to do so. |
||||
Join a domain |
The JoinRights registry setting determines the set of security privileges, and the User registry setting control which users have the right to join the domain. For more information about these settings, see the Prestaged a computer to join a domain section in the previous table. If the computer is prestaged, then the user performing the installation (or the credentials in the Unattend file for the domain join) needs the appropriate JoinDomain rights. If the computer is not prestaged (meaning Windows Deployment Services will create a computer account in AD DS), the user performing the installation (or the credentials as specified in the Unattend file for the domain join) need rights to add a prestaged computer and the appropriate JoinRights. |
||||
Using /ResetBootProgram |
If the ResetBootProgram functionality is enabled, the user needs read and write permissions to the netbootMachineFilePath property on the prestaged computer object. If this permission is not granted and the user's boot program is set to pxeboot.n12, Windows Deployment Services will not be able to reset the NBP to pxeboot.com, forcing the computer into an infinite reboot loop. For more information, see Managing Network Boot Programs. |
||||
Disabling access to the command prompt during installations |
By default, users can gain access to a command prompt during Windows Deployment Services installations by:
You can disable this functionality by adding a DisableCmdRequest.tag to the image. To disable access for boot images
To disable access for install images
|
Permissions for Server Properties
The following section outlines the minimal set of permissions that are necessary to perform common management tasks using the server properties pages. To access these settings, open the Windows Deployment Services MMC snap-in, right click the server, and click Properties.
Tab | Settings that Require Permissions |
---|---|
PXE Response Settings |
|
Directory Services |
|
Boot |
Default boot program
Default boot image
|
Client |
Unattend file
Client account creation
|
DHCP |
|
Advanced |
|