Securing authentication tokens by preventing delegation of admin accounts

The underlying capabilities provided by Kerberos authentication in Active Directory means that access tokens can be delegated to users and computers for various purposes. Attackers can capitalize on the built-in capabilities of Active Directory with impersonation and delegation to compromise sensitive resources. This article details the recommended settings in Active Directory that mitigate the risk associated with account delegation on insecure computers and administrator accounts.

Access tokens and impersonation levels

In a client-server environment, a special token called the impersonation token allows a thread to execute in the security context of a user or computer.

Certain network services running in the environment determine the assigned permissions and access levels based on impersonation. For example, when certain server services run, they briefly use the impersonation token to determine the assigned privileges and the resources a user can access.

When this impersonation is invoked, it means the client has allowed the server to act as a client on its behalf. There are different levels of impersonation that Microsoft refers to as impersonation levels. Each level dictates the authority given to the server to act on behalf of the client.

There are four impersonation levels:

  • Anonymous – The client is anonymous to the server. While the server can impersonate the client, the impersonation token doesn’t include any information about the client.
  • Identify – The system default level is configured for Identify. With this level, the server can impersonate the client’s identity to perform access control list (ACL) checks.
  • Impersonate – The server can impersonate the client and its security context with the impersonate level. The server can access local resources as the client’s identity. With remote resources, it can only access resources that are on the same computer as the server.
  • Delegate – The delegate is the most powerful and dangerous of the impersonation levels. If selected, the server can impersonate the client’s credentials, both local and remote. These can be passed to all computers.

You can learn more about impersonation levels from Microsoft here: Impersonation Levels (COM) – Win32 apps | Microsoft Learn.

Using the delegate impersonation level has additional requirements for use. These include:

  • The client must set the impersonation level to RPC_C_IMP_LEVEL_DELEGATE
  • The server account must be marked with the “Trusted for delegation” attribute in the Active Directory Service
  • All the servers and clients in question must be running in the domain

Find here additional information on how to delegate password reset permissions in Active Directory.

Security implications of delegable admins

Using freely available tools, attackers only need to compromise a client and access a standard account. Once they have their foot in the door, they can use tools like Meterpreter to list the available delegate tokens. Privileged accounts with delegation tokens available can lead to the attacker being able to steal a privileged user token, such as a domain admin account. Once the attacker has a domain admin-level account, the possibilities are endless.

Once they have high-level privileged accounts, they often go after backup files that may contain prized targets, such as backups of the NTDS.DIT database of Active Directory. If found, they can copy the database offsite and run an offline tool to compromise accounts in the organization further.

The “Account is sensitive and cannot be delegated” setting

Microsoft has provided a setting in Active Directory Domain Services that can help mitigate the issue. In addition, an Active Directory setting is recommended to be enabled for privileged accounts in the domain. The setting is “account is sensitive and cannot be delegated” within the account properties.

When configured, this setting strips the delegate-level token from the user, removing the user credentials. When configured, the logon becomes an ANONYMOUS login with no resource permissions.

The Account is sensitive and cannot be delegated setting in Active Directory

When computers trusted for delegation are compromised, attackers can use these to access data stored on other servers using delegated credentials. Therefore, Microsoft recommends using the “account is sensitive and cannot be delegated” setting on any insecure computer that has little or no physical security or administrator accounts, such as Domain Admins.

Domain Admin accounts have tremendous domain privileges and basically unlimited access to server resources and data in the organization. In addition, if any computers are trusted for delegation, you can use constrained delegation and other techniques to help mitigate risk when delegation is used.

Specops Delegable Admins report

For security purposes and to bolster your organization’s cybersecurity posture, it is crucial to have visibility of admin accounts that do not have the setting configured, “Account is sensitive and cannot be delegated.” While you can create PowerShell scripts to query the various attributes of users and computers in the domain, there is a much easier way. Specops Password Auditor (free) provides a built-in report called “Delegable Admins.”

With the Delegable Admins report, Specops Password Auditor provides quick visibility to all admin-level accounts. Organizations interested in securing authentication tokens will find this report useful for helping to audit for accounts that should be marked as “sensitive and cannot be delegated” in their environment.

Viewing the Delegable Admins report in Specops Password Auditor

In addition to the Delegable Admins report, it provides many other features and reports that are useful to bolster Active Directory account security, including findings accounts with compromised passwords.

Delegation and impersonation FAQs

Why can delegation be dangerous?

While it may be used in certain use cases, delegating insecure computers or privileged accounts, such as Domain Admin accounts, can provide a target for attackers to perform privilege escalation attacks.

Are there ways to mitigate the risk of account impersonation?

Yes, Microsoft provides a setting in Active Directory called the “Account is sensitive and cannot be delegated.” Setting this option on an account marks the account as sensitive and strips the delegate-level token, forcing an ANONYMOUS login. Additionally, if delegation is used, constrained delegation should be configured to restrict the realm of delegation. Finally, admins need to maintain visibility of all admin accounts that are not marked as sensitive.

How can admin accounts without the account marked as sensitive be found?

Using PowerShell, you can query for attributes configured and find admin accounts that are not marked as sensitive. However, Specops Password Auditor provides an easier way with the “Delegable Admins” report. It allows the creation of executive reports detailing delegable admins and other password audit information.

(Last updated on October 2, 2024)

brandon lee writer

Written by

Brandon Lee

Brandon Lee has been in the industry 20+ years, is a prolific blogger focusing on networking, virtualization, storage, security & cloud, and contributes to the community through various blog posts and technical documentation primarily at Virtualizationhowto.com.

Back to Blog

Related Articles

  • WCF and WIF, Delegation and Kerberos Failure

    I recently ran into an issue where a client of ours was trying to implement Version 5.1 of Specops Password Reset. The implementation was “Multi-Tiered” in that the Web Component was on a separate server from the Password Reset Component. As Specops Password Reset relies on kerberos to identify and authenticate the user during enrollment,…

    Read More
  • How to delegate password reset permissions in Active Directory

    Least privilege access is a crucial part of security that protects against overprovisioning user permissions. Even with IT technicians, and junior administrators, this needs to be considered when configuring permissions in the environment. A case in point is helpdesk staff who need to reset end-user passwords in an Active Directory environment. How can organizations use…

    Read More
  • Securing ADFS against password spraying attacks

    Stolen account passwords provide the “path of least resistance” into a victim network for an attacker. Once compromised credentials are obtained, the attacker can easily access business-critical systems with little effort. Active Directory Federation Service (ADFS) is a solution that allows federating identity and access management and sharing entitlement and authorization rights across enterprise boundaries….

    Read More