Securing MS Exchange 2010: Role Based Access Control (RBAC) Simplified


Written by Samuel Drey, a Premier Field Engineer based in Canada.


1. An introduction to the RBAC permissions model

Exchange 2010 introduces a brand new permissions model named “RBAC”, meaning Role Based Access Control.  There’s plenty of documentation about RBAC since this is a new and important feature of Exchange 2010, but I did not find anything with simple and concise explanations that will help everybody understand how to manage permissions using RBAC at a glance.

Here’s a simple definition of RBAC:

  • RBAC enables grouping sets of actions (e.g. cmdlets, features from the graphical management console, as well as features from the Exchange Control Panel – the management console brought through an http connection) into different roles (e.g. a Mail Recipient creation role to manage Mailboxes, that is to create, modify or delete mail objects – mailboxes, mail-enabled users, mail-enabled contact, etc.).
  • Several roles can be combined into Management Groups where you can place Administrators or these roles can be directly assigned to end users using Management Role Policies.

2. Defining and using Role Groups: the RBAC permissions model for Administrators and Specialized Users

2.1 General Model

Management Role Entries are different sets of authorized actions called command-lets or functions with various parameters that are grouped into Management Roles.  For example, Create-Mailbox and Delete-Mailbox are 2 command-lets included into the “Mail Recipient creation” role.

Note: You can also create your own roles! Imagine the possibilities as we have 599 Exchange commands in Powershell, each command with 5 to 15 parameters, for an average total of 6,000 parameters and tremendous possibilities of granularity!

That’s why Microsoft gave built-in Management Roles and Management Role groups that are more than enough to secure your Exchange Server 2010 infrastructure objects and configuration items.

Use Get-RoleGroup to list the available built-in Management Role groups.

Use Get-ManagementRole to list the available built-in Management Roles.

Use add-RoleGroupMember / remove-RoleGroupMember in powershell to add or remove Administrators names from the desired role group.

 

2.2 Example/Illustration

Here is a simple representation that will help you understand how Management Role Entries and Management Roles fit together:

  • First you have the authorized cmdlets called Management Role Entries:

Management Role Entries

  • These cmdlets are grouped into Management Roles

Management Role

  • Management Roles are linked to Management Role Groups by Management role Assignments:

Graphical representation of the Role Group RBAC architecture

Figure: Graphical representation of the Role Group RBAC architecture

2.3 An important note on Role Assignments

 

Management Role Assignment

Role Assignments are the links between Roles and Role Groups. These will always be identified in the form of “Management Role name – Management Role Group name” or “Management Role name – Management Role Group name - Delegating”, e.g. Mail Recipient Creation-Organization Management.

These also exist in the RBAC model to define the scope of actions. Scopes are defined in the Role Assigment level, either by a parameter of the New-ManagementRoleAssignment cmdlet (RecipientOrganizationalUnitScope) for OU Scopes, or by using the New/Set-ManagementScope for the Recipient and Configuration scopes.

The purpose of these is to limit the objects that an administrator can manipulate or to direct where administrators can perform their administration, and so these are split into 3 categories :

  • OU scope: introduced above, these are the simplest custom scopes, in which OU the group member can operate
  • Recipient scopes: the Exchange related AD objects a group member can manipulate
  • Configuration scopes: the servers and databases that group members can manipulate

There is one recipient scope and one configuration scope per Role Assignment.

Last important feature of the Management Role Assignment: the Exclusive Scope for explicit Management Scopes – these can limit the access to an AD object to these Role assignees only.

In the example illustration below, the “Recipient Administrators” in Ottawa can administer Bob, Peter and Kevin, but cannot administer David, Sharon, Henry, Jenny, Frank or Eric. The VIP Administrators can administer David, Sharon, Frank and Eric. The Executive Administrators can administer Henry, Jenny, Frank and Eric.

Figure. Scopes illustration with Exclusive vs Regular scopes, with example filters (by City, by Title, by Department)

Figure. Scopes illustration with Exclusive vs Regular scopes, with example filters (by City, by Title, by Department)

2.4 Management Role Assignment Policies, the “cousins” of management role groups

2.4.1 General model

Role Assignment Policies are different from Role Groups in the fact that these are only used at the user mailbox level.  These are intended to enable end-users to manage their mailbox and distribution group configuration.  Here is the Role Assignment Policy as defined by the Technet :

  • Mailbox are assigned a single role assignment policy, to which management roles (containing management role entries, as referred above) are linked by management role assignments.
2.4.2 Illustration

We notice some commonalities between Role Groups and Role Assignment Policies such as:

  • The management role entries (the authorized cmdlets or actions)

Management Role Entries

  • The management roles (defined by a set of cmdlets or actions – the management role entries)

Management Role Entries

  • The Management Role Assignments

 Management Role Assignment
Here’s the first difference: the scope of management role assignments for assignment policies are either

  • SELF : the role can read (if present in the recipient read scope) or modify (if present on the recipient write scope) only the properties of its current mailbox
  • or MYGAL : used with “Recipient Read Scopes” only - the role can view the properties of any recipient within the current user's global address list (GAL)

And as the Role groups were used for Exchange administration, the Management Role Assignment Policies are used for user rights assignments on their mailbox and distribution lists.

Management Role Assignment Policy

Here’s how all these pieces fit together:

Graphical representation of the RBAC Management Policy architecture

 

Figure: Graphical representation of the RBAC Management Policy architecture

2.5 For your reference: the RBAC permissions model CommandLets

As introduced above,these are ALL the commandlets of powershell functions used to manage RBAC permissions components in Exchange Server 2010 SP1:

Manage Roles

Get-ManagementRole

New-ManagementRole

Remove-ManagementRole

Manage Role Assignments

Get-ManagementRoleAssignment

New-ManagementRoleAssignment

Remove-ManagementRoleAssignment

Set-ManagementRoleAssignment

Manage Role Entries

Add-ManagementRoleEntry

Get-ManagementRoleEntry

Remove-ManagementRoleEntry

Set-ManagementRoleEntry

Manage Scopes

Get-ManagementScope

New-ManagementScope

Remove-ManagementScope

Set-ManagementScope

Manage Role Assignment Policies

Get-RoleAssignmentPolicy

New-RoleAssignmentPolicy

Remove-RoleAssignmentPolicy

Set-RoleAssignmentPolicy

Manage Role Groups

Get-RoleGroup

New-RoleGroup

Remove-RoleGroup

Set-RoleGroup

Manage Role group members

Add-RoleGroupMember

Get-RoleGroupMember

Remove-RoleGroupMember

Update-RoleGroupMember

ADVICE : Use this table along with the PowerShell “Get-Help” cmdlet, and along with the above schemas to have a clear view of what you are doing and what you want to do to secure your Exchange Server 2010 infrastructure!

2.5.1 Common actions we then can do using the Exchange Management Shell, the Exchange Control Panel, or the Exchange Management Console

Here’s a list of commands, given as examples to apply the above concepts in your environment, all taken from various places on TechNet and tested on a test lab environment:

Giving User1 permission: add them to the RBAC Management Role Groups

General:

Add-RoleGroupMember <role group name> -Member <User or Group name>

 

Real Life:

Add-RoleGroupMember “Recipient Management” -Member User1

 

Giving end-users permissions: assign an RBAC Management Role Assignment Policies

General:

Set-Mailbox <UserName> -RoleAssignmentPolicy <Policy name>

Real Life :

Set-Mailbox User1 -RoleAssignmentPolicy “Limit Mailbox configuration”

 

Adding management roles to a policy

General :

New-ManagementRoleAssignment -Name <role assignment name> -Role <role name> -Policy <assignment policy name>

 

See the roles on a Management Role Policy :

General and Real Life:

Get-RoleAssignmentPolicy # see all assignment policies in the organization

 

 General : 

 

 Get-ManagementRoleAssignment -RoleAssignee <assignment policy name>

 

Real Life :

Get-ManagementRoleAssignment -RoleAssignee "Default Role Assignment Policy"

 

Creating a new Role Assignment Policy:

General:

New-RoleAssignmentPolicy <assignment policy name> -Roles <roles to assign>

 

Real life:

New-RoleAssignmentPolicy "Limited Mailbox Configuration" -Roles MyBaseOptions, MyAddressInformation, MyDisplayName

 

“Defaulting” a custom Management Role Assignment Policy for newly created mailboxes:

General:

Set-RoleAssignmentPolicy <assignment policy name> -IsDefault

 

Real life :

Set-RoleAssignmentPolicy “Limited Mailbox Configuration” -IsDefault

 

List all users that are granted the permissions provided by a specific management role :

Get-ManagementRoleAssignment -Role <role name> -GetEffectiveUsers

 

2.5.2 SAVING The best for LAST: Manage your RBAC groups with the Exchange Control PaneL (ECP)

The reason why I put this section at the end is that some RBAC management features are only available by using PowerShell.  Understanding the RBAC schema and the associated PowerShell functions will help you manage every aspect of your Exchange Server 2010 security.

Also, there are many things you cannot do in the ECP, so you will need to use the Exchange Management Shell (PowerShell with the Exchange extensions). The only RBAC management tasks you can do in ECP are modifying the memberships of role groups and adding or removing roles from role assignment policies.

You must use the Exchange Management Shell to manage every other aspects of RBAC, such as:

  • Create, delete or modify custom roles
  • Create or delete Role Groups
  • Assign roles to Role Groups
  • Modify the scope or Role Assignment
  • Assign a role directly to a user account

So here are screenshots of ECP regarding RBAC management:

  • Use the Exchange Management console to access the ECP RBAC editor:

Exchange Management Console

 

  • You can see the built-in management roles with the assigned roles (these will all use the default scopes) :

Administrator Roles

  • Example of the Organization Management role group configuration in the ECP:

Organization Management role group configuration in the ECP

3. Conclusion

With Exchange Server 2010, permission management is much clearer, granular, and manageable. You can always have a clear view of who has the access to what and where.

The Get-ManagementRoleAssignment commandlet is a good monitoring PowerShell command with which you can audit your permissions assigned to administrators.

Note: to audit all users and groups in your organization to understand their effective permissions, you can use PowerShell piping, like Get-ManagementRole | Get-ManagementRoleAssignment.

Finally, use the Exchange Management Shell to administer and manage your Exchange Server 2010 permissions using the RBAC functions, and the Exchange Control Panel once you understand the concepts of the RBAC model and the ECP RBAC management limitations.

4. Appendix – Examples of an existing default RBAC infrastructure

Get-rolegroup

Name AssignedRoles RoleAssignments ManagedBy

---- ------------- --------------- ---------

Organization Management {Active Directory Permissi... {Active Directory Permissi... {CONTOSO.COM/Microsoft Exc...

Public Folder Management {Mail Enabled Public Folde... {Mail Enabled Public Folde... {CONTOSO.COM/Microsoft Exc...

Recipient Management {Distribution Groups, Mail... {Distribution Groups-Recip... {CONTOSO.COM/Microsoft Exc...

View-Only Organization Man... {Monitoring, View-Only Con... {Monitoring-View-Only Orga... {CONTOSO.COM/Microsoft Exc...

UM Management {UM Mailboxes, UM Prompts,... {UM Mailboxes-UM Managemen... {CONTOSO.COM/Microsoft Exc...

Help Desk {User Options, View-Only R... {User Options-Help Desk, V... {CONTOSO.COM/Microsoft Exc...

Records Management {Audit Logs, Journaling, M... {Audit Logs-Records Manage... {CONTOSO.COM/Microsoft Exc...

Discovery Management {Legal Hold, Mailbox Search} {Legal Hold-Discovery Mana... {CONTOSO.COM/Microsoft Exc...

Server Management {Database Copies, Database... {Database Copies-Server Ma... {CONTOSO.COM/Microsoft Exc...

Delegated Setup {View-Only Configuration} {View-Only Configuration-D... {CONTOSO.COM/Microsoft Exc...

Hygiene Management {ApplicationImpersonation,... {ApplicationImpersonation-... {CONTOSO.COM/Microsoft Exc...

 

Get-RoleGroup “Recipient Management”

RunspaceId : e32249be-3e2a-4748-a9fb-346b0c3a776f

ManagedBy : {CONTOSO.COM/Microsoft Exchange Security Groups/Organization Management}

RoleAssignments : {Distribution Groups-Recipient Management, Mail Enabled Public Folders-Recipient Manageme

                              nt, Mail Recipient Creation-Recipient Management, Mail Recipients-Recipient Management, M

                              essage Tracking-Recipient Management, Migration-Recipient Management, Move Mailboxes-Reci

                              pient Management, Recipient Policies-Recipient Management}

Roles : {Distribution Groups, Mail Enabled Public Folders, Mail Recipient Creation, Mail Recipien

                              ts, Message Tracking, Migration, Move Mailboxes, Recipient Policies}

DisplayName :

ExternalDirectoryObjectId :

Members : {}

SamAccountName : Recipient Management

Description : Members of this management role group have rights to create, manage, and remove Exchange

                              recipient objects in the Exchange organization.

RoleGroupType : Standard

LinkedGroup :

Capabilities : {}

LinkedPartnerGroupId :

LinkedPartnerOrganizationId :

IsValid : True

ExchangeVersion : 0.10 (14.0.100.0)

Name : Recipient Management

DistinguishedName : CN=Recipient Management,OU=Microsoft Exchange Security Groups,DC=CONTOSO,DC=COM

Identity : CONTOSO.COM/Microsoft Exchange Security Groups/Recipient Management

Guid : bb51dda2-5d38-4f18-8e1c-68c6f9775526

ObjectCategory : CONTOSO.COM/Configuration/Schema/Group

ObjectClass : {top, group}

WhenChanged : 11/11/2010 3:07:45 PM

WhenCreated : 11/11/2010 3:07:45 PM

WhenChangedUTC : 11/11/2010 8:07:45 PM

WhenCreatedUTC : 11/11/2010 8:07:45 PM

OrganizationId :

OriginatingServer : dc2003.CONTOSO.COM

 

Get-ManagementRoleEntry "Mail recipient creation\*" | ft

 

Name Role Parameters

---- ---- ----------

Write-AdminAuditLog Mail Recipient Creation {Comment, Confirm, Debug, DomainController, ErrorAction, Er...

Set-MailboxFolderPermission Mail Recipient Creation {AccessRights, Confirm, Debug, DomainController, ErrorActio...

Set-ADServerSettings Mail Recipient Creation {ConfigurationDomainController, Confirm, Debug, ErrorAction...

Remove-RemoteMailbox Mail Recipient Creation {Confirm, Debug, DomainController, ErrorAction, ErrorVariab...

Remove-Mailbox Mail Recipient Creation {Arbitration, Confirm, Database, Debug, DomainController, E...

Remove-MailUser Mail Recipient Creation {Confirm, Debug, DomainController, ErrorAction, ErrorVariab...

Remove-MailContact Mail Recipient Creation {Confirm, Debug, DomainController, ErrorAction, ErrorVariab...

New-RemoteMailbox Mail Recipient Creation {AccountDisabled, Alias, Archive, Confirm, Debug, DisplayNa...

New-Mailbox Mail Recipient Creation {AccountDisabled, ActiveSyncMailboxPolicy, Alias, Arbitrati...

New-MailUser Mail Recipient Creation {Alias, ArbitrationMailbox, Confirm, Debug, DisplayName, Do...

New-MailContact Mail Recipient Creation {Alias, ArbitrationMailbox, Confirm, Debug, DisplayName, Do...

Get-User Mail Recipient Creation {Anr, Arbitration, Credential, Debug, DomainController, Err...

Get-ThrottlingPolicyAssocia... Mail Recipient Creation {Anr, Debug, DomainController, ErrorAction, ErrorVariable, ...

Get-ThrottlingPolicy Mail Recipient Creation {Debug, DomainController, ErrorAction, ErrorVariable, Ident...

Get-SharingPolicy Mail Recipient Creation {Debug, DomainController, ErrorAction, ErrorVariable, Ident...

Get-RoleAssignmentPolicy Mail Recipient Creation {Debug, DomainController, ErrorAction, ErrorVariable, Ident...

Get-ResourceConfig Mail Recipient Creation {Debug, DomainController, ErrorAction, ErrorVariable, Ident...

Get-RemoteMailbox Mail Recipient Creation {Anr, Credential, Debug, DomainController, ErrorAction, Err...

Get-Recipient Mail Recipient Creation {Anr, BookmarkDisplayName, ErrorAction, ErrorVariable, Filt...

Get-OrganizationalUnit Mail Recipient Creation {Debug, DomainController, ErrorAction, ErrorVariable, Ident...

Get-ManagementRoleAssignment Mail Recipient Creation {AssignmentMethod, ConfigWriteScope, CustomConfigWriteScope...

Get-ManagedFolderMailboxPolicy Mail Recipient Creation {Debug, DomainController, ErrorAction, ErrorVariable, Ident...

Get-MailboxDatabase Mail Recipient Creation {Debug, DomainController, DumpsterStatistics, ErrorAction, ...

Get-Mailbox Mail Recipient Creation {Anr, Arbitration, Archive, Credential, Database, Debug, Do...

Get-MailUser Mail Recipient Creation {Anr, Credential, Debug, DomainController, ErrorAction, Err...

Get-MailContact Mail Recipient Creation {Anr, Credential, Debug, DomainController, ErrorAction, Err...

Get-DomainController Mail Recipient Creation {Credential, Debug, DomainName, ErrorAction, ErrorVariable,...

Get-ActiveSyncMailboxPolicy Mail Recipient Creation {Debug, DomainController, ErrorAction, ErrorVariable, Ident...

Get-ADServerSettings Mail Recipient Creation {Debug, ErrorAction, ErrorVariable, OutBuffer, OutVariable,...