Dmitri Gavrilov [MSFT] opined thusly on May 5:
Modifying defaultSD in the schema will only affect newly created objects.
Dang. That explains why, despite removing Authenticated Users just now (and
adding the group that'll be administering this attribute), the value in an
existing object's attribute is readable to everyone; no implicit deny.
You should also tweak inheritable aces at the top of the domain hierarchy.
Good grief, how? For a single attribute?
Securing selected attributes is tough. Download the ad delegation
whitepaper -- your problem is considered there. If you are running w2k,
beware of ACE explosion, when a single ACE may explode into several hundred
property-specific aces.
No delegation whites I found consider this. And yeah, I hear you on the
explosion issue. I've been fragged by that before.
Aside from still not being sure how to change the ACE of existing users,
then, for this attribute (I decided to use employeenumber, BTW, rather than
adding a new attribute; I tacked employeenumber on to Person) I'm also
wondering what properties I should enable for this attribute (indexing and
the like). Are you aware of any documentation on these properties?
Another thing I'm wondering (this never ends) is how to get the attribute
to show up as a usable column when searching the directory. I'd assume this
is related to indexing.
Thank you for your reply.