Active Directory Groups
3 TopicsActive Directory Unable to reset user passwords
I am managing a Windows Server 2025 Active Directory environment with client machines. I created a test user and enabled the option “User must change password at next logon.” I then provided a temporary password to the user, expecting them to get the prompt to change it on first login. However, when the user attempts to change the password, they receive the error: “The user must change password before signing in.” My goal is that when I provide a temporary password to a user: They get the prompt to change the password at next logon. When they change it, it should not throw the “user must change password before signing in” error. I need guidance on how to achieve this so users can reset their passwords successfully.Create AD group with owners and members with python graph SDK
from msgraph import GraphServiceClient from msgraph.generated.models.group import Group graph_client = GraphServiceClient(credentials, scopes) request_body = Group( description = "Group with designated owner and members", display_name = "Operations group", group_types = [ ], mail_enabled = False, mail_nickname = "operations2019", security_enabled = True, additional_data = { "owners@odata_bind" : [ "https://graph.microsoft.com/v1.0/users/26be1845-4119-4801-a799-aea79d09f1a2", ], "members@odata_bind" : [ "https://graph.microsoft.com/v1.0/users/ff7cb387-6688-423c-8188-3da9532a73cc", "https://graph.microsoft.com/v1.0/users/69456242-0067-49d3-ba96-9de6f2728e14", ], } ) result = await graph_client.groups.post(request_body) Im following this example to create Azure AD security group with owners and members, But the group is created without the members and additional owners provided. Im following the below doc: https://learn.microsoft.com/en-us/graph/api/group-post-groups?view=graph-rest-1.0&tabs=python#example-2-create-a-group-with-owners-and-members The Group object has members and owners parameter, should that be used instead? If so is there any example for that?709Views0likes0CommentsAdding Distributed COM Users group in the built-in groups for AD
I came across this question from one of my connections in my network. "A user was added to the Distributed COM Users group in the https://bit.ly/2U7Zarc however it seems to be doing nothing for allowing that user to access dcom on the servers. Isn't the point of the built-in groups is that they are already defaulted to the correct permissions and setup on object in the AD structure? Is there a way to test? An effective access on an OU with that group was done and it was all denied. Is this the right way to test those particular permissions" I suggested the following: As the added users are not able to access the dcom server. In that case it is good to check the dcom remote access permissions in the component services. Remote access and local access should be enabled. If it is not then any user part of distributed com users group will not be able to access the dcom servers. Let me what are your thoughts on this. Thanks.25KViews0likes0Comments