Skip to main content
< All Topics
Print

Adding a Group with Read-only Access

Background

In the Group Policy Management Console (GPMC), delegation configured on the Group Policy Objects container (via the Delegation tab) only applies to permissions for creating GPOs in the domain.

Users granted Create GPO permissions can:

  • Create and manage GPOs they own
  • View other GPOs only if they have explicit read access

In most environments, GPOs are broadly visible because Authenticated Users are included in Security Filtering, which implicitly grants Read access.

However, some organizations require tighter control and may want to:

  • Remove Authenticated Users
  • Grant read access only to a specific group (e.g., auditing, security, or delegated admin teams)
Default Behavior

When a GPO is created, it inherits a default security descriptor defined in the Active Directory schema (DefaultSecurityDescriptor for the groupPolicyContainer class).

This can be modified using the Active Directory Schema MMC snap-in, but:

  • Modifying the schema is global and permanent
  • It introduces risk and change control overhead
Recommended Approach (UPA Configuration)

To avoid schema changes, UPA provides a configuration-based method to automatically assign Read permissions to a specified group.

You can configure this behavior in the Gateway web.config file.

Configuration Steps
  1. On the machine where UPA is installed, go to:
    C:\Program Files\FullArmor\AD Bridge\Gateway\WebApp
  2. Open the Web.config file
  3. In the <appSettings> section, add the following key:

<add key=”AddGPOReaders_<domain.dns.name>” value=”<GroupName>” />

Example:
<add key=”AddGPOReaders_micah.local” value=”GPOReadAccess” />

  1. Save the file
  2. After making the change, the UPA service in IIS needs to be restarted.  It will be in IIS Sites, AD Bridge Gateway as shown below.
Behavior

When configured, the specified group is automatically granted Read permission on GPOs in the following scenarios:

Supported Scenarios
  1. Create and Export
    • A Universal Policy (UP) is created and exported to a new GPO
  2. Import, Modify, Export
    • An existing GPO is imported into UPA
    • Modified
    • Exported back to AD

In both cases, the group is added to the GPO’s Delegation with Read access.

Please Note: If you are exporting a UP to an existing GPO that does not have the Read Access added, add ‘Authenticated Users’ or the group(s) that the GPO should apply to in the UPA Security Filtering.

In This Article