| 1 | /* | 
|---|
| 2 | Unix SMB/CIFS implementation. | 
|---|
| 3 |  | 
|---|
| 4 | session_info utility functions | 
|---|
| 5 |  | 
|---|
| 6 | Copyright (C) Andrew Bartlett 2008-2010 | 
|---|
| 7 |  | 
|---|
| 8 | This program is free software; you can redistribute it and/or modify | 
|---|
| 9 | it under the terms of the GNU General Public License as published by | 
|---|
| 10 | the Free Software Foundation; either version 3 of the License, or | 
|---|
| 11 | (at your option) any later version. | 
|---|
| 12 |  | 
|---|
| 13 | This program is distributed in the hope that it will be useful, | 
|---|
| 14 | but WITHOUT ANY WARRANTY; without even the implied warranty of | 
|---|
| 15 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the | 
|---|
| 16 | GNU General Public License for more details. | 
|---|
| 17 |  | 
|---|
| 18 | You should have received a copy of the GNU General Public License | 
|---|
| 19 | along with this program.  If not, see <http://www.gnu.org/licenses/>. | 
|---|
| 20 | */ | 
|---|
| 21 |  | 
|---|
| 22 | #include "includes.h" | 
|---|
| 23 | #include "libcli/security/security.h" | 
|---|
| 24 | #include "librpc/gen_ndr/auth.h" | 
|---|
| 25 |  | 
|---|
| 26 | enum security_user_level security_session_user_level(struct auth_session_info *session_info, | 
|---|
| 27 | const struct dom_sid *domain_sid) | 
|---|
| 28 | { | 
|---|
| 29 | if (!session_info) { | 
|---|
| 30 | return SECURITY_ANONYMOUS; | 
|---|
| 31 | } | 
|---|
| 32 |  | 
|---|
| 33 | if (security_token_is_system(session_info->security_token)) { | 
|---|
| 34 | return SECURITY_SYSTEM; | 
|---|
| 35 | } | 
|---|
| 36 |  | 
|---|
| 37 | if (security_token_is_anonymous(session_info->security_token)) { | 
|---|
| 38 | return SECURITY_ANONYMOUS; | 
|---|
| 39 | } | 
|---|
| 40 |  | 
|---|
| 41 | if (security_token_has_builtin_administrators(session_info->security_token)) { | 
|---|
| 42 | return SECURITY_ADMINISTRATOR; | 
|---|
| 43 | } | 
|---|
| 44 |  | 
|---|
| 45 | if (domain_sid) { | 
|---|
| 46 | struct dom_sid *rodc_dcs; | 
|---|
| 47 | rodc_dcs = dom_sid_add_rid(session_info, domain_sid, DOMAIN_RID_READONLY_DCS); | 
|---|
| 48 | if (security_token_has_sid(session_info->security_token, rodc_dcs)) { | 
|---|
| 49 | talloc_free(rodc_dcs); | 
|---|
| 50 | return SECURITY_RO_DOMAIN_CONTROLLER; | 
|---|
| 51 | } | 
|---|
| 52 | talloc_free(rodc_dcs); | 
|---|
| 53 | } | 
|---|
| 54 |  | 
|---|
| 55 | if (security_token_has_enterprise_dcs(session_info->security_token)) { | 
|---|
| 56 | return SECURITY_DOMAIN_CONTROLLER; | 
|---|
| 57 | } | 
|---|
| 58 |  | 
|---|
| 59 | if (security_token_has_nt_authenticated_users(session_info->security_token)) { | 
|---|
| 60 | return SECURITY_USER; | 
|---|
| 61 | } | 
|---|
| 62 |  | 
|---|
| 63 | return SECURITY_ANONYMOUS; | 
|---|
| 64 | } | 
|---|