ユーザー アカウントが AD グループのメンバーであるかどうかを判断する方法 (特に、ユーザーがグループの直接のメンバーではない場合)
例:
- user1 は group1 のメンバーです
- group1 は group2 のメンバーです
- (架空の) 関数呼び出しの結果はTRUE
IsUserMemberOf('user1', 'group2')
でなければなりません
.NET の場合、解決策があります。
static bool IsUserMemberOf(string userName, string groupName)
{
using (var ctx = new PrincipalContext(ContextType.Domain))
using (var groupPrincipal = GroupPrincipal.FindByIdentity(ctx, groupName))
using (var userPrincipal = UserPrincipal.FindByIdentity(ctx, userName))
{
return userPrincipal.IsMemberOf(groupPrincipal);
}
}
Delphi(Delphi-2007)でどうすればいいですか?
解決:
私は Remko の回答を受け入れますが、彼のコードは Delphi-2007 では動作しないため (いくつかの String/WideString の問題)、実行中の D2007 バージョンを次に示します。
unit Unit1;
interface
uses // Jedi ApiLib
SysUtils, Classes, Windows, JwaActiveDs, JwaAdsTlb, JwaNative, JwaWinNT, JwaWinBase,
JwaNtSecApi, JwaNtStatus, JwaWinType;
type
// Some Helper Types
TSidArray = array of PSID;
PSidArray = ^TSidArray;
TAdsValueArray = array[0..ANYSIZE_ARRAY-1] of ADSVALUE;
PAdsValueArray = ^TAdsValueArray;
TLsaTranslatedNameArray = array[0..ANYSIZE_ARRAY-1] of LSA_TRANSLATED_NAME;
PLsaTranslatedNameArray = ^TLsaTranslatedNameArray;
function GetPolicyHandle(const Computer: WideString=''): PLSA_HANDLE;
function GetGroupMembership(const AdsPath: WideString; var Groups: TStringList): Boolean;
implementation
function GetPolicyHandle(const Computer: WideString=''): PLSA_HANDLE;
var
ObjectAttributes: LSA_OBJECT_ATTRIBUTES;
lusSystemName: LSA_UNICODE_STRING;
nts: NTSTATUS;
dwError: DWORD;
begin
ZeroMemory(@ObjectAttributes, SizeOf(ObjectAttributes));
RtlInitUnicodeString(@lusSystemName, PWideChar(Computer));
nts := LsaOpenPolicy(@lusSystemName, ObjectAttributes, POLICY_LOOKUP_NAMES,
Pointer(Result));
if nts <> STATUS_SUCCESS then
begin
dwError := LsaNtStatusToWinError(nts);
raise EOSError.Create(SysErrorMessage(dwError));
end;
end;
function GetGroupMembership(const AdsPath: WideString; var Groups: TStringList): Boolean;
const
Username: PChar = 'Administrator';
Password: PChar = 'password';
var
hr: HRESULT;
nts: NTSTATUS;
PolicyHandle: PLSA_HANDLE;
DirObject: IDirectoryObject;
Domains: PLSA_REFERENCED_DOMAIN_LIST;
Names: PLsaTranslatedNameArray;
SidArray: TSidArray;
Attributes: array of PChar;
AdValue: PAdsValueArray;
AdAttrInfo: PADS_ATTR_INFO;
dwNumAttributes: DWORD;
i: Integer;
s: WideString;
begin
Result := False;
Assert(Assigned(Groups));
// Get Lsa Policy Handle
PolicyHandle := GetPolicyHandle;
try
// Open AD object, note that I am using username, password because I am
// connecting from a machine that's not a domain member.
// I am also passing the ADS_SERVER_BIND flag because I am directly
// connecting to a specific Domain Controller
hr := ADsOpenObject(PWideChar(AdsPath), Username, Password,
ADS_SERVER_BIND or ADS_SECURE_AUTHENTICATION, IID_IDirectoryObject,
Pointer(DirObject));
if Failed(hr) then
Exit;
// Attribute array
SetLength(Attributes, 1);
s := 'tokenGroups';
Attributes[0] := @s[1];
hr := DirObject.GetObjectAttributes(@Attributes[0], Length(Attributes), AdAttrInfo, dwNumAttributes);
if Failed(hr) then
Exit;
// Setup an Array for the PSID's
SetLength(SidArray, AdAttrInfo^.dwNumValues);
AdValue := PAdsValueArray(AdAttrInfo^.pADsValues);
for i := 0 to AdAttrInfo^.dwNumValues-1 do
begin
// Copy Pointer to Array
Assert(AdValue^[i].OctetString.dwLength > 0);
SidArray[i] := PSid(AdValue^[i].OctetString.lpValue);
end;
nts := LsaLookupSids(PolicyHandle, Length(SidArray), @SidArray[0], Domains, PLSA_TRANSLATED_NAME(Names));
if nts >= STATUS_SUCCESS then
begin
for i := 0 to AdAttrInfo^.dwNumValues - 1 do
begin
SetLength(s, Names[i].Name.Length div SizeOf(WideChar));
CopyMemory(@s[1], Names[i].Name.Buffer, Names[i].Name.Length);
Groups.Add(s);
end;
// even if nts returns STATUS_NONE_MAPPED or STATUS_SOME_NOT_MAPPED we
// must Free the Mem!
LsaFreeMemory(Names);
LsaFreeMemory(Domains);
Result := True;
end;
FreeAdsMem(AdAttrInfo);
finally
// Close the Lsa Policy Handle
LsaClose(PolicyHandle);
end;
end;
end.