I've read a number of the walkthroughs- all suggest using a domain account for NST. All also suggest using least privileges. Is there a document (accessible to a customer not a partner) that describes the minimum AD permissions required?
When setup as a domain user, the web service will not start. When setup as a domain admin, surprise, it will.
Thanks in advance for your help.
"There are only two truly infinite things: the universe and stupidity. And I am unsure about the universe." - Albert Einstein
Corollary- Build and idiot proof system and nature will build a better idiot.
0
Answers
MVP - Dynamics NAV
My BLOG
NAVERTICA a.s.
I know I should leave these things to people who are AD masters, but those folks bill by the hour.
Corollary- Build and idiot proof system and nature will build a better idiot.
I would think this would fall under the MS Secure Computing initiative- giving customers the resources they need to easily setup NAV 2009 securely.
Corollary- Build and idiot proof system and nature will build a better idiot.
PaulWH has a nice tool to inspect URL ACLs here: http://blogs.msdn.com/paulwh/archive/2007/05/04/addressaccessdeniedexception-http-could-not-register-url-http-8080.aspx
Otherwise you can use netsh at the command line on Server 2008, you need a command like netsh http add urlacl url=http://+:<ws port number>/DynamicsNAV user=<domain\user>, where you replace <ws port number> with 7047 or whatever port you use, and <domain\user> with the domain user account. On 2003 you need to use httpconfig - the syntax is too complicated for me to remember. If you need it I can find it for you.
Returning to your original question, I believe the minimal AD privilege required for the service account is for it to be a member of domain users. If you have installed 3 tiers on 3 computers, the service account must have permission to present delegated credentials to SQL Server. The service account must also have a suitable SPN; but this is an attribute of the account rather than a permission.
If we expand the scope beyond AD, then the service account must also have a SQL Server login, a database login for the NAV database, and select permission on the object tracking table. The logon as a service right will be granted when you set the service to run as the domain account. I think this automatically grants the required local security policy and filesystem permissions on the host. There are, of course, some features of NAV which require more security configuration, but to use RTC this list is pretty complete.
In the documentation, when using least privilege is suggested, I would interpret that as granting only the permissions that are described (this is my opinion rather than a definitive answer). Unfortunately there is no single page with a list, but it is there if you read all the walkthroughs. The URL ACL is an omission we are fixing in the next doc update. I'll also push for getting a better description of what is required for different features/configurations.
Alex