SID Security Identifier

Windows İşletim Sisteminde Bilinen SID’ler

Well-Known SID Structures

Güvenlik tanımlayıcısı (SID), Windows işletim sistemlerinde bir güvenlik ilkesini (güvenlik grubu gibi) tanımlamak için kullanılan, değişken uzunlukta benzersiz bir değerdir. Genel kullanıcıları veya genel grupları tanımlayan SID’ler bilinmektedir. Bu Sid’lerin değerleri tüm işletim sistemlerinde aynıdır.

Güvenlikle ilgili sorunları gidermek için bu sid’ler kullanılabilir. Ayrıca, Windows erişim kontrol listesi (ACL) düzenleyicisindeki sorunlarını gidermek için de kullanışlıdır. Windows, bir güvenlik sorumlusunu SID’ine göre belirler. 

Örneğin, aşağıdaki tabloda S-1-5-21-<domain >-513 olarak tanımlanan bir SID ve 1, 2 ve 3 alt otorite değerine sahip alanın gerçek örneği verilir:

S-1: Indicates a revision or version 1 SID.

5: SECURITY_NT_AUTHORITY, indicates it’s a Windows specific SID.

21: SECURITY_NT_NON_UNIQUE, indicates a domain id will follow.

1-2-3: The next three SubAuthority arrays contain 32-bit random numbers to uniquely identify the domain.

RID: Indicates a unique object ID within the domain.

The actual constructed SID would be S-1-5-21-1-2-3-513.

Aşağıdaki tablo, bilinen SID değerlerini ve bunlarla eşleşen açıklamalarını görüntüler.

Constant/valueDescription
NULLS-1-0-0No Security principal.
EVERYONES-1-1-0A group that includes all users.
LOCALS-1-2-0A group that includes all users who have logged on locally.
CONSOLE_LOGONS-1-2-1A group that includes users who are logged on to the physical console. This SID can be used to implement security policies that grant different rights based on whether a user has been granted physical access to the console.<7>
CREATOR_OWNERS-1-3-0A placeholder in an inheritable access control entry (ACE). When the ACE is inherited, the system replaces this SID with the SID for the object’s creator.
CREATOR_GROUPS-1-3-1A placeholder in an inheritable ACE. When the ACE is inherited, the system replaces this SID with the SID for the primary group of the object’s creator.
OWNER_SERVERS-1-3-2A placeholder in an inheritable ACE. When the ACE is inherited, the system replaces this SID with the SID for the object’s owner server.<8>
GROUP_SERVERS-1-3-3A placeholder in an inheritable ACE. When the ACE is inherited, the system replaces this SID with the SID for the object’s group server.<9>
OWNER_RIGHTSS-1-3-4A group that represents the current owner of the object. When an ACE that carries this SID is applied to an object, the system ignores the implicit READ_CONTROL and WRITE_DAC permissions for the object owner.
NT_AUTHORITYS-1-5A SID containing only the SECURITY_NT_AUTHORITY identifier authority.
DIALUPS-1-5-1A group that includes all users who have logged on through a dial-up connection.
NETWORKS-1-5-2A group that includes all users who have logged on through a network connection.
BATCHS-1-5-3A group that includes all users who have logged on through a batch queue facility.
INTERACTIVES-1-5-4A group that includes all users who have logged on interactively.
LOGON_IDS-1-5-5-x-yA logon session. The X and Y values for these SIDs are different for each logon session and are recycled when the operating system is restarted.
SERVICES-1-5-6A group that includes all security principals that have logged on as a service.
ANONYMOUSS-1-5-7A group that represents an anonymous logon.
PROXYS-1-5-8Identifies a SECURITY_NT_AUTHORITY Proxy.<10>
ENTERPRISE_DOMAIN_CONTROLLERSS-1-5-9A group that includes all domain controllers in a forest that uses an Active Directory directory service.
PRINCIPAL_SELFS-1-5-10A placeholder in an inheritable ACE on an account object or group object in Active Directory. When the ACE is inherited, the system replaces this SID with the SID for the security principal that holds the account.
AUTHENTICATED_USERSS-1-5-11A group that includes all users whose identities were authenticated when they logged on. Users authenticated as Guest or Anonymous are not members of this group.<11>
RESTRICTED_CODES-1-5-12This SID is used to control access by untrusted code. ACL validation against tokens with RC consists of two checks, one against the token’s normal list of SIDs and one against a second list (typically containing RC – the “RESTRICTED_CODE” token – and a subset of the original token SIDs). Access is granted only if a token passes both tests. Any ACL that specifies RC must also specify WD – the “EVERYONE” token. When RC is paired with WD in an ACL, a superset of “EVERYONE”, including untrusted code, is described.
TERMINAL_SERVER_USERS-1-5-13A group that includes all users who have logged on to a Terminal Services server.
REMOTE_INTERACTIVE_LOGONS-1-5-14A group that includes all users who have logged on through a terminal services logon.
THIS_ORGANIZATIONS-1-5-15A group that includes all users from the same organization. If this SID is present, the OTHER_ORGANIZATION SID MUST NOT be present.<12>
IUSRS-1-5-17An account that is used by the default Internet Information Services (IIS) user.
LOCAL_SYSTEMS-1-5-18An account that is used by the operating system.
LOCAL_SERVICES-1-5-19A local service account.
NETWORK_SERVICES-1-5-20A network service account.
ENTERPRISE_READONLY_DOMAIN_CONTROLLERSS-1-5-21-<root domain>-498A universal group containing all read-only domain controllers in a forest.
COMPOUNDED_AUTHENTICATIONS-1-5-21-0-0-0-496Device identity is included in the Kerberos service ticket. If a forest boundary was crossed, then claims transformation occurred.<13>
CLAIMS_VALIDS-1-5-21-0-0-0-497Claims were queried for in the account’s domain, and if a forest boundary was crossed, then claims transformation occurred.<14>
ADMINISTRATORS-1-5-21-<machine>-500A user account for the system administrator. By default, it is the only user account that is given full control over the system.
GUESTS-1-5-21-<machine>-501A user account for people who do not have individual accounts. This user account does not require a password. By default, the Guest account is disabled.
KRBTGT
S-1-5-21-<domain>-502
A service account that is used by the Key Distribution Center (KDC) service.
DOMAIN_ADMINSS-1-5-21-<domain>-512A global group whose members are authorized to administer the domain. By default, the DOMAIN_ADMINS group is a member of the Administrators group on all computers that have joined a domain, including the domain controllers. DOMAIN_ADMINS is the default owner of any object that is created by any member of the group.
DOMAIN_USERSS-1-5-21-<domain>-513A global group that includes all user accounts in a domain.
DOMAIN_GUESTSS-1-5-21-<domain>-514A global group that has only one member, which is the built-in Guest account of the domain.
DOMAIN_COMPUTERSS-1-5-21-<domain>-515A global group that includes all clients and servers that have joined the domain.
DOMAIN_DOMAIN_CONTROLLERSS-1-5-21-<domain>-516A global group that includes all domain controllers in the domain.
CERT_PUBLISHERSS-1-5-21-<domain>-517A global group that includes all computers that are running an enterprise certification authority. Cert Publishers are authorized to publish certificates for User objects in Active Directory.
SCHEMA_ADMINISTRATORSS-1-5-21-<root-domain>-518A universal group in a native-mode domain, or a global group in a mixed-mode domain. The group is authorized to make schema changes in Active Directory.
ENTERPRISE_ADMINSS-1-5-21-<root-domain>-519A universal group in a native-mode domain, or a global group in a mixed-mode domain. The group is authorized to make forestwide changes in Active Directory, such as adding child domains.
GROUP_POLICY_CREATOR_OWNERSS-1-5-21-<domain>-520A global group that is authorized to create new Group Policy Objects in Active Directory.
READONLY_DOMAIN_CONTROLLERSS-1-5-21-<domain>-521A global group that includes all read-only domain controllers.
CLONEABLE_CONTROLLERSS-1-5-21-<domain>-522A global group that includes all domain controllers in the domain that can be cloned.
PROTECTED_USERSS-1-5-21-<domain>-525A global group that is afforded additional protections against authentication security threats.<15> For more information, see [MS-APDS] and [MS-KILE].
KEY_ADMINSS-1-5-21-<domain>-526A security group for delegated write access on the msdsKeyCredentialLink attribute only. The group is intended for use in scenarios where trusted external authorities (for example, Active Directory Federated Services) are responsible for modifying this attribute. Only trusted administrators should be made a member of this group.<16>
ENTERPRISE_KEY_ADMINSS-1-5-21-<domain>-527A security group for delegated write access on the msdsKeyCredentialLink attribute only. The group is intended for use in scenarios where trusted external authorities (for example, Active Directory Federated Services) are responsible for modifying this attribute. Only trusted enterprise administrators should be made a member of this group.<17>
RAS_SERVERSS-1-5-21-<domain>-553A domain local group for Remote Access Services (RAS) servers. By default, this group has no members. Servers in this group have Read Account Restrictions and Read Logon Information access to User objects in the Active Directory domain local group.
ALLOWED_RODC_PASSWORD_REPLICATION_GROUPS-1-5-21-<domain>-571Members in this group can have their passwords replicated to all read-only domain controllers in the domain.<18>
DENIED_RODC_PASSWORD_REPLICATION_GROUPS-1-5-21-<domain>-572Members in this group cannot have their passwords replicated to all read-only domain controllers in the domain.<19>
BUILTIN_ADMINISTRATORSS-1-5-32-544A built-in group. After the initial installation of the operating system, the only member of the group is the Administrator account. When a computer joins a domain, the Domain Administrators group is added to the Administrators group. When a server becomes a domain controller, the Enterprise Administrators group also is added to the Administrators group.
BUILTIN_USERSS-1-5-32-545A built-in group. After the initial installation of the operating system, the only member is the Authenticated Users group. When a computer joins a domain, the Domain Users group is added to the Users group on the computer.
BUILTIN_GUESTSS-1-5-32-546A built-in group. The Guests group allows users to log on with limited privileges to a computer’s built-in Guest account.
POWER_USERSS-1-5-32-547A built-in group. Power users can perform the following actions:Create local users and groups.Modify and delete accounts that they have created.Remove users from the Power Users, Users, and Guests groups.Install programs.Create, manage, and delete local printers.Create and delete file shares.
ACCOUNT_OPERATORSS-1-5-32-548A built-in group that exists only on domain controllers. Account Operators have permission to create, modify, and delete accounts for users, groups, and computers in all containers and organizational units of Active Directory except the Built-in container and the Domain Controllers OU. Account Operators do not have permission to modify the Administrators and Domain Administrators groups, nor do they have permission to modify the accounts for members of those groups.
SERVER_OPERATORSS-1-5-32-549A built-in group that exists only on domain controllers. Server Operators can perform the following actions:Log on to a server interactively.Create and delete network shares.Start and stop services.Back up and restore files.Format the hard disk of a computer.Shut down the computer.
PRINTER_OPERATORSS-1-5-32-550A built-in group that exists only on domain controllers. Print Operators can manage printers and document queues.
BACKUP_OPERATORSS-1-5-32-551A built-in group. Backup Operators can back up and restore all files on a computer, regardless of the permissions that protect those files.
REPLICATORS-1-5-32-552A built-in group that is used by the File Replication Service (FRS) on domain controllers.
ALIAS_PREW2KCOMPACCS-1-5-32-554A backward compatibility group that allows read access on all users and groups in the domain.<20>
REMOTE_DESKTOPS-1-5-32-555An alias. Members of this group are granted the right to log on remotely.<21>
NETWORK_CONFIGURATION_OPSS-1-5-32-556An alias. Members of this group can have some administrative privileges to manage configuration of networking features.<22>
INCOMING_FOREST_TRUST_BUILDERSS-1-5-32-557An alias. Members of this group can create incoming, one-way trusts to this forest.<23>
PERFMON_USERSS-1-5-32-558An alias. Members of this group have remote access to monitor this computer.<24>
PERFLOG_USERSS-1-5-32-559An alias. Members of this group have remote access to schedule the logging of performance counters on this computer.<25>
WINDOWS_AUTHORIZATION_ACCESS_GROUPS-1-5-32-560An alias. Members of this group have access to the computed tokenGroupsGlobalAndUniversal attribute on User objects.<26>
TERMINAL_SERVER_LICENSE_SERVERSS-1-5-32-561An alias. A group for Terminal Server License Servers.<27>
DISTRIBUTED_COM_USERSS-1-5-32-562An alias. A group for COM to provide computer-wide access controls that govern access to all call, activation, or launch requests on the computer.<28>
IIS_IUSRSS-1-5-32-568A built-in group account for IIS users.
CRYPTOGRAPHIC_OPERATORSS-1-5-32-569A built-in group account for cryptographic operators.<29>
EVENT_LOG_READERSS-1-5-32-573A built-in local group.  Members of this group can read event logs from the local machine.<30>
CERTIFICATE_SERVICE_DCOM_ACCESSS-1-5-32-574A built-in local group. Members of this group are allowed to connect to Certification Authorities in the enterprise.<31>
RDS_REMOTE_ACCESS_SERVERSS-1-5-32-575Servers in this group enable users of RemoteApp programs and personal virtual desktops access to these resources. This group needs to be populated on servers running RD Connection Broker. RD Gateway servers and RD Web Access servers used in the deployment need to be in this group.
RDS_ENDPOINT_SERVERSS-1-5-32-576A group that enables member servers to run virtual machines and host sessions.
RDS_MANAGEMENT_SERVERSS-1-5-32-577A group that allows members to access WMI resources over management protocols (such as WS-Management via the Windows Remote Management service).
HYPER_V_ADMINSS-1-5-32-578A group that gives members access to all administrative features of Hyper-V.
ACCESS_CONTROL_ASSISTANCE_OPSS-1-5-32-579A local group that allows members to remotely query authorization attributes and permissions for resources on the local computer.
REMOTE_MANAGEMENT_USERSS-1-5-32-580Members of this group can access Windows Management Instrumentation (WMI) resources over management protocols (such as WS-Management [DMTF-DSP0226]). This applies only to WMI namespaces that grant access to the user.
WRITE_RESTRICTED_CODES-1-5-33A SID that allows objects to have an ACL that lets any service process with a write-restricted token to write to the object.
NTLM_AUTHENTICATIONS-1-5-64-10A SID that is used when the NTLM authentication package authenticated the client.
SCHANNEL_AUTHENTICATIONS-1-5-64-14A SID that is used when the SChannel authentication package authenticated the client.
DIGEST_AUTHENTICATIONS-1-5-64-21A SID that is used when the Digest authentication package authenticated the client.
THIS_ORGANIZATION_CERTIFICATES-1-5-65-1A SID that indicates that the client’s Kerberos service ticket’s PAC contained a NTLM_SUPPLEMENTAL_CREDENTIAL structure (as specified in [MS-PAC] section 2.6.4). If the OTHER_ORGANIZATION SID is present, then this SID MUST NOT be present. <32>
NT_SERVICES-1-5-80An NT Service account prefix.
USER_MODE_DRIVERSS-1-5-84-0-0-0-0-0Identifies a user-mode driver process.
LOCAL_ACCOUNTS-1-5-113A group that includes all users who are local accounts.<33>
LOCAL_ACCOUNT_AND_MEMBER_OF_ADMINISTRATORS_GROUPS-1-5-114A group that includes all users who are local accounts and members of the administrators group.<34>
OTHER_ORGANIZATIONS-1-5-1000A group that includes all users and computers from another organization. If this SID is present, THIS_ORGANIZATION SID MUST NOT be present.<35>
ALL_APP_PACKAGESS-1-15-2-1All applications running in an app package context.
ML_UNTRUSTEDS-1-16-0An untrusted integrity level.
ML_LOWS-1-16-4096A low integrity level.
ML_MEDIUMS-1-16-8192A medium integrity level.
ML_MEDIUM_PLUSS-1-16-8448A medium-plus integrity level.
ML_HIGHS-1-16-12288A high integrity level.
ML_SYSTEMS-1-16-16384A system integrity level.
ML_PROTECTED_PROCESSS-1-16-20480A protected-process integrity level.
ML_SECURE_PROCESSS-1-16-28672A secure process integrity level.<36>
AUTHENTICATION_AUTHORITY_ASSERTED_IDENTITYS-1-18-1A SID that means the client’s identity is asserted by an authentication authority based on proof of possession of client credentials.<37>  <38>
SERVICE_ASSERTED_IDENTITYS-1-18-2A SID that means the client’s identity is asserted by a service.<39> <40>
FRESH_PUBLIC_KEY_IDENTITYS-1-18-3A SID that means the client’s identity is asserted by an authentication authority based on proof of current possession of client public key credentials.<41>
KEY_TRUST_IDENTITYS-1-18-4A SID that means the client’s identity is based on proof of possession of public key credentials using the key trust object.<42>
KEY_PROPERTY_MFAS-1-18-5A SID that means the key trust object had the multifactor authentication (MFA) property.<43>
KEY_PROPERTY_ATTESTATIONS-1-18-6A SID that means the key trust object had the attestation property.<44>

Domain User to SID

This will give you a Domain User’s SID

$objUser = New-Object System.Security.Principal.NTAccount(“DOMAIN_NAME”, “USER_NAME”)

$strSID = $objUser.Translate([System.Security.Principal.SecurityIdentifier])

$strSID.Value

SID to Domain User

This will allow you to enter a SID and find the Domain User

$objSID = New-Object System.Security.Principal.SecurityIdentifier `

(“ENTER-SID-HERE”)

$objUser = $objSID.Translate( [System.Security.Principal.NTAccount])

$objUser.Value

LOCAL USER to SID

$objUser = New-Object System.Security.Principal.NTAccount(“LOCAL_USER_NAME”)

$strSID = $objUser.Translate([System.Security.Principal.SecurityIdentifier])

$strSID.Value

Kaynak: https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-dtyp/81d92bba-d22b-4a8c-908a-554ab29148ab