Implementing the Algorithm for Deriving Password and encrypting Connection String in MS-RAIOP

In Microsoft Open Protocol documents, there are many algorithms that involve with crypto operations in some particular ways.   Sometimes the protocol documents also provide specific protocol examples that include the initial input, the intermediate results and the final result for each step of the algorithm.   The correctness of the result  is very crucial for the…


Understanding security descriptor defaulting rules for Active Directory objects

This blog post is to help understand the defaulting rules when assigning security descriptors to new active directory (AD) objects. Background The SECURITY_DESCRIPTOR structure defines the security attributes of an object. For instance, some of the attributes specify the owner, the access rights, privileges to perform operations, and level of audit logging. The SECURITY_DESCRIPTOR structure…