Apologies, I misread your message and thought you were attempting to deny access to administrators, not grant it!
You cannot use a deny only SID to grant access, only to deny access. (Anyone can label a deny only SID on their token regardless of whether they are a part of that group, but once labeled, the SID cannot typically be removed from the SID group list.)
The non-admin side of a split token is -not- an administrator and you shouldn’t grant access to it as though it were an administrator. As George M. Garner mentioned, the caller needs to elevate to benefit from their admin permissions rather than that happening automatically (which loses the entire point of a split token).
-----Original Message-----
From: xxxxx@lists.osr.com [mailto:xxxxx@lists.osr.com] On Behalf Of Skywing
Sent: Monday, March 25, 2013 11:46 PM
To: Windows File Systems Devs Interest List
Subject: RE: RE:[ntfsd] SeAccessCheck with UAC
Split tokens where the user is really an admin will have the administrators group present as a deny only SID (i.e. matches deny but not allow ACEs).
Have you structured your access checked DACL to *grant* access to administrators and then you refuse access if the access check passes, or to *deny* access to administrators and then you refuse access if the access check fails? The latter should cover you in this particular scenario.
-----Original Message-----
From: xxxxx@lists.osr.com [mailto:xxxxx@lists.osr.com] On Behalf Of xxxxx@gmail.com
Sent: Monday, March 25, 2013 9:30 AM
To: Windows File Systems Devs Interest List
Subject: RE:[ntfsd] SeAccessCheck with UAC
… our driver is used to restrict access to removable media such as USB sticks.
If the user is an administrator and our policy says “allow administrators to access USB sticks” then what we are finding is that in a UAC environment, when the user clicks on the USB drive in the explorer navigation pane, our driver denies access to the USB as it performs the access check with explorer.exe’s token which is unelevated (SeAccessCheck does not consider us to be in the Administrators group).
I am not interested in using the extra privs of the other part of the split token, i just want SeAccessCheck to consider me a full member of the administrators group when i do the access check.
If i run explorer.exe elevated ( kill explorer.exe and restart from elevated command prompt ) then access is granted.
NTFSD is sponsored by OSR
OSR is hiring!! Info at http://www.osr.com/careers
For our schedule of debugging and file system seminars visit:
http://www.osr.com/seminars
To unsubscribe, visit the List Server section of OSR Online at http://www.osronline.com/page.cfm?name=ListServer
NTFSD is sponsored by OSR
OSR is hiring!! Info at http://www.osr.com/careers
For our schedule of debugging and file system seminars visit:
http://www.osr.com/seminars
To unsubscribe, visit the List Server section of OSR Online at http://www.osronline.com/page.cfm?name=ListServer