Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: collect ECA RoleSeparation #97

Merged
merged 1 commit into from
Jul 25, 2024
Merged

feat: collect ECA RoleSeparation #97

merged 1 commit into from
Jul 25, 2024

Conversation

JonasBK
Copy link
Collaborator

@JonasBK JonasBK commented Apr 26, 2024

Description

Collection of enterpriseCA setting RoleSeparationEnabled

Ticket: BED-4351

Depends on this PR for commonlib: BloodHoundAD/SharpHoundCommon#120

Motivation and Context

If this setting is enabled, you cannot perform any CA actions if you have both ManageCA and ManageCertificates permissions. Only CA admins can modify the setting.

We need it for the ESC7 implementation, as some attack narratives require both ManageCA and ManageCertificates and could therefore be blocked by this setting.

More info on the setting: Q: How can I make sure that a given Windows account is assigned only

How Has This Been Tested?

Collection in my lab:
20240426013313_BloodHound.zip

Screenshots (if appropriate):

Types of changes

  • Chore (a change that does not modify the application functionality)
  • Bug fix (non-breaking change which fixes an issue)
  • New feature (non-breaking change which adds functionality)
  • Breaking change (fix or feature that would cause existing functionality to change)

Checklist:

  • Documentation updates are needed, and have been made accordingly.
  • I have added and/or updated tests to cover my changes.
  • All new and existing tests passed.
  • My changes include a database migration.

@JonasBK JonasBK marked this pull request as ready for review May 2, 2024 06:55
@JonasBK JonasBK merged commit 699386c into 2.X Jul 25, 2024
1 check passed
@JonasBK JonasBK deleted the collect-ca-roleseparation branch July 25, 2024 06:16
@github-actions github-actions bot locked and limited conversation to collaborators Jul 25, 2024
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants