Rutgers EI

Enterprise Infrastructure

Integrating Systems

RAD – FAQ

RAD

Rutgers Active Directory FAQ's

Shared Drives Not Mapping

You have migrated your users to RAD and now their shared drives are not mapping properly. Please confirm if this a specific user / group or entire OU issue.

 

Specific User / Group

  • Check Group Policy
  • Check machine(s) Event Log
  • Confirm user(s) and or Group(s) are associated to the proper Group(s) for proper permissions
  • Confirm that uidNumber is populated

Entire OU

  • Check Group Policy
  • Check machine(s) Event Log
  • Confirm user(s) and or Group(s) are associated to the proper Group(s) for proper permissions.
  • Confirm that uidNumber is populated

If uidNumber is not populated please contact RAD Support via HDRTi. Please inform them of which netID’s are missing uidNumber’s. As always please work with your IT Team Leads / ADM users to troubleshoot.

Requesting Elevated / ADM account

You now require additional elevated / ADM accounts then you have previously requested.

Rutgers Active Directory (RAD) uses ADM accounts for elevated rights to modify OU’s, groups, printers, group policies, servers and workstations within your organization. An ADM account will be based on your existing netid. Prior to RAD on boarding, you should identify who in your organization requires ADM accounts, for OU or Workstation admin access, and have them go through the request process below.

To Request Additional Elevated / ADM account:

  • Go to Elevated Account Request under the Rutgers Active Directory (RAD) web page
  • You can Submit an ADM account request and check the status of the request from this page.
  • Once the ADM accounts have been created, they can be added to the appropriate groups by a Delegated OU admin.
  • If you had an ADM account prior to when the Request process was implemented, you will have to still go through the Request process to link your existing Adm account to your netid.
  • Once your ADM account has been provisioned correctly, you will be able to manage it through https://netid.rutgers.edu/index.htm

 

Mapping Printers in RAD

There are (2) ways to map your printers within RAD:

Directly through the Enterprise Print Server

OIT’s RAD enterprise print server can also be found at \\asbradprint01.rad.rutgers.edu where all your printers can be found.

GPO’s

  1. Launch Group Policy Management
  2. Locate your OU that you manage
  3. Right Click on the OU
  4. Choose “Create a GPO in this Domain, and Link it here…”
  5. Name the Group Policy accordingly and click OK
  6. In the Scope tab, under Security Filtering, remove Authenticated Users and add the appropriate group the GPO would apply to and click OK.
  7. In the Delegation Tab, click Add, and add Authenticated Users with Read permissions and select OK.
  8. Right Click the GPO you just created and choose Edit
  9. Group Policy Management Editor will pop up.
  10. In here, choose Computer Configuration>Policies>Windows Settings>Deployed Printers. You will enter printer name (\\server\printername), then click Add to Deploy these printers to this GroupPolicy Object, then click OK, then close out of window.

  11. In the Group Policy object that was created, go to the settings tab, and confirm setting were applied in User Configuration.
Updating Display Name

You may want to do this if your display name is not what you prefer or what you were expecting to see. This process will update your display name and reflect on your RAD machine, email, etc.

  1. Go to the following website: https://personalinfo.rutgers.edu
  2. On website, proceed to Directory Listing Tab
  3. You will read the information posted, then proceed to enter your preferred display name, then hit Save Directory Listing Settings.
Admin Level Access via GP

Administrative access is provided to end users through Adm accounts. ADM accounts must exist before the GP is created. ADM accounts can be requested here.

https://requests.rutgers.edu/radAdmin/radAdmin.htm

Once the Adm account is created, OU admins can use the directions below to create a Group policy to provide administrative rights to the user’s Adm account.

  1. Find the computer in AD Users and Computers. The GPO must be created and linked to the same OU that the machine is in.
  2. Open GPMC, Navigate to the OU the machine is in. Right click the OU and choose to “Create and Link GPO here…”
  3. Create the Group Policy using the following naming convention: Delegated OU NETID Admin GP
  4. Right-click the Group Policy and select Edit.
  5. Navigate to Computer Configuration | Policies | Windows Settings | Security Settings | Restricted Groups.
  6. Right-click on Restricted Group
  7. Select Add Group and type in Administrators and click OK. The properties tab of the Administrators group is displayed

  8. Under “Members of this group” Click on Add and Browse. Add Groups to the Object Types

  9. Add in the following groups: RAD Admin Access, Delegated OU Workstation Administrators group and the user’s Adm account.
  10. Click OK until back at the Group Policy editor window.
  11. Close the Group Policy editor, select the Group Policy and click the Scope tab:
  12. Remove Authenticated Users and add in the workstation that the user is going to have administrative rights over.
  13. Click on the Details tab and change the GPO Status to User configuration settings disabled and click OK.
  14. Click on the Delegation tab and add the following groups: Delegated OU Admins and Rad Group Policy Administrators. Change the default “Read” to “Edit Settings, delete, modify security” and select OK. Add Authenticated Users group as well and leave permissions on “Read.” Once those groups have been added remove yourself from the delegation list.

  15. Click on the OU and change the order of the group policies so the departmental group policy is at the bottom of the list, i.e. has the highest number of all the group policies applied to this OU.
Provide Access For Another Group to Manage Group Members
  1. Right click on the group and select properties
  2. Click on the Security Tab, then Advanced
  3. Click the ADD Button, and on the next screen “Select a Principal”
  4. An AD Find box will appear. Type in the name of the OU-admin group and hit check names to ensure you have the spelling correct.
  5. Click OK once the correct OU admins group has been located.
  6. On the Next Screen on the “Applies To” filed, select ‘This Object Only”
  7. This group should have the “Write Members” checkbox checked so they can start modifying the group membership of this group.
  8. This should be checked by Default after you add the group.
  9. Hit OK and then apply on the next screen.
  10. Access has now been granted for that OU admins group to modify the members of this group.
Mapping Shares Through Group Policy
  1. Launch Group Policy Management
  2. Locate your OU that you manage
  3. Right Click on the OU
  4. Choose “Create a GPO in this Domain, and Link it here…”
  5. Name the Group Policy accordingly and click OK
  6. In the Scope tab, under Security Filtering, remove Authenticated Users and add the appropriate group the GPO would apply to and click OK.

  7. In the Delegation Tab, click Add, and add Authenticated Users with Read permissions and select OK.

  8. Right Click the GPO you just created and choose Edit
  9. Group Policy Management Editor will pop up.
  10. In here, choose User Configuration>Preferences>Windows Settings>Drive Maps
  11. Right click Drive Maps, highlight New, select Mapped Drive
  12. In the General Tab, for Location: Enter DFS link (recommend copy, paste) and Drive Letter: Select appropriate drive letter
  13. In the Common tab, select Run-In logged-on user’s security context (user policy option)
  14. Select Apply, OK to close window
  15. In the Group Policy object that was created, go to the settings tab, and confirm settings were applied in User Configuration
Access Isilon Storage from Home
  1. Connect to VPN
  2. Use RDP to connect to your desktop and access mapped Shared Drives

If RDP is not available

Accessing RAD Shares Remotely – After connecting to the appropriate VPN, users working from home
should be able to access Rad Shares that are housed on Isilon Storage.

  1. Users on RAD bound machines should be able to connect by DFS link. Please contact your local
    IT Support to determine which DFS link you should be using to access your RAD storage.

    • Example DFS Link: \\rad.rutgers.edu\dfs\RADHomeShares
  2. Users on Stand Alone non-Managed machines should be able access the storage by SMB Path.
    Please contact your local IT Support to determine which SMB Path you should be using to access
    your RAD storage.

    • Example SMB Path: \\isilon-1-asb-smb.ei.rutgers.edu\home

If data is on One Drive or BOX, they would not have to connect to VPN to access that.

Run OIT Ems Groups

These groups belong to Rutgers-Newark IT for support of the Newark Campus EMS application
supporting the Newark Campus, and the business school in New Brunswick.

The application https://reserve.newark.rutgers.edu , is a reservation and event management application
which allows authentication of a user, and based on their group membership in RAD, LDAP will
determine what process template they will receive, and where they can make reservations. Potentially
anyone can use this application which is why the group is populated with all staff.

The group includes all Rutgers Staff based on a nightly import from the DW. These applications are
supports approximately 20k users so a manual process could potentially be inefficient and time
consuming. RAD groups support its functionality. In the case of EMS, these RAD groups provide role
information that EMS used to determine what rooms are available for the user to schedule and what
rules apply to their scheduling requests.

Below are the groups associated with the EMS application:

  • Run Oit Ems-Faculty
  • Run Oit Ems-Staff
  • Run Oit Ems-RBS Students
  • Run Oit Ems-CJ Grad Students
  • Run Oit Ems-Law Students
  • Run Oit Ems-Camden Law Students
  • Run Oit Ems-SPAA MPA Students
  • Run Oit Ems-SPAA PhD Students
  • Run Oit Ems-SPAA Undergraduate Students
  • Rls Nwk-Computer Services Users
  • Rls Nwk-Library Users
RAD-ADM account Initial Setup

Setting up RAD -adm Account for the First Time

  1. Go to Elevated Account Request
  2. Click on Submit an RAD Admin Request
  3. Click on Submit Request

  4. You should receive message as: Create RAD Admin Request
    RAD Admin Request #’xxxxx’ has been submitted successfully. You will be notified when the request is approved and processed

  5. You will then receive an email as below.
  6. Follow the instructions in the email to complete the process. The process to set a password on an -adm account is listed below:

Steps to follow to set up netid-adm password

  1. Go to the following link and login with your regular netID and password
  2. https://netid.rutgers.edu/loginView.htm?from=/createRadAdminAccount.htm

  3. Set up two-factor for your netid-adm account
  4. Set up /reset password for RAD Admin Account. Please note, the -adm password should be different from your netID password.

  5. If the account set up is successful, following success page is shown:

If you require further assistance, please contact rad-support@oit.rutgers.edu