Introducing Delegation of Control Wizard

The Delegation of Control Wizard, found in Active Directory Users and Computers, shares the control of objects and roles among others in an organization. You can delegate control over objects to groups or individuals. For example, you might delegate the ability to reset user passwords to help-desk staff. You can also customize a complex delegation to meet your organization’s needs.
In the Delegation of Control Wizard, after you choose the user or group, selecting Create A Custom Task To Delegate on the Tasks to Delegate dialog box begins the process of customizing the delegation. Figure below shows this dialog box.

Delegation of Control Wizard 1

FIGURE: Choosing to create a custom task.

You next choose the objects to which this delegation will apply, as shown in Figure below.

Delegation of Control Wizard 2

FIGURE: Choosing the Active Directory Object Type for this delegation.


Finally, you choose the permissions that will be used for this delegation. Figure below shows this dialog box.

Delegation of Control Wizard 3

FIGURE: Choosing permissions for this delegation.


After you set up permissions, click Next to open a confirmation dialog box and create the delegation.




Articles in this course

  1. Migrating from Forefront UAG
  2. Deploying DirectAccess
  3. Configuring DirectAccess
  4. Domain rename
  5. Configuring a Kerberos realm trust
  6. Implementing a domain upgrade
  7. Implementing a domain migration
  8. Implementing a forest restructure
  9. Deploying and managing a test forest
  10. Understanding design considerations
  11. Using Windows Assessment and Deployment Kit
  12. Understanding virtual server deployment
  13. Configuring multicast deployment
  14. Configuring multisite topology and distribution points
  15. Configuring multi-server topology
  16. Configuring WDS
  17. Planning for role migration
  18. Migrating server roles
  19. Migrating servers across domains and forests
  20. Designing server consolidation strategy
  21. Planning for capacity and resource optimization
  22. Designing VMM service templates
  23. Defining operating system profiles
  24. Configuring hardware and capability profiles
  25. Managing services
  26. Configuring image and template libraries
  27. Managing logical networks
  28. Planning for file and storage service
  29. Configuring iSCSI Target Server
  30. Configuring Internet Storage Name Server
  31. Configuring Network File System
  32. Installing device-specific modules
  33. Designing highly available DHCP solution
  34. Design considerations for IP address management
  35. Configuring role-based access control
  36. Configuring IPAM auditing
  37. Migrating IP addresses
  38. Managing and monitoring multiple DHCP and DNS servers
  39. Configuring data collection
  40. VPN design considerations
  41. Security certificate deployment
  42. Firewall design considerations
  43. Client and site-to-site considerations
  44. VPN deployment configurations with CMAK
  45. Designing DirectAccess topology
  46. Using enterprise certificates
  47. Configuring site-to-site VPN
  48. Configuring packet filters
  49. Implementing packet tracing
  50. Implementing Multisite Remote Access
  51. Configuring Remote Access clustered with NLB
  52. Understanding network protection solutions
  53. Planning for capacity and server placement
  54. Planning for NPS and firewall access
  55. Remediation Network
  56. Implementing multiple RADIUS servers
  57. Configuring NAP enforcement for IPsec and 802.1X
  58. Deploying and configuring Endpoint Protection Client
  59. Setting up antimalware and firewall policies
  60. Monitoring compliance
  61. Multi-forest architecture
  62. Trusts
  63. Functional levels
  64. Domain upgrade
  65. Domain migration and forest restructure
  66. Hybrid cloud services
  67. Blocking inheritance
  68. Using enforced policies
  69. Using loopback processing
  70. Using Windows Management Instrumentation (WMI) filters
  71. Understanding site-linked GPOs
  72. Using slow link processing
  73. Understanding group strategies
  74. Understanding OU hierarchy
  75. Using Advanced Group Policy Management
  76. Understanding design considerations for Active Directory permissions
  77. Customizing tasks in Delegation of Control Wizard
  78. Deploying Remote Server Administrative Tools on client computer
  79. Delegating permissions on administrative users
  80. Configuring Kerberos delegation
  81. Understanding Active Directory topology design
  82. Monitoring and resolving Active Directory replication conflicts
  83. Global catalog and operations master roles
  84. Read-only domain controllers
  85. Partial attribute set
  86. Domain controller cloning
  87. Understanding branch office infrastructure design considerations
  88. Implementing confidential attributes
  89. Delegating administration
  90. Modifying filtered attribute set
  91. Configuring Password Replication Policy
  92. Configuring Hash Publication
  93. Implementing DHCP filtering
  94. Implementing and configuring a DHCP Management Pack
  95. Maintaining a DHCP database
  96. Designing name resolution strategy