请问:如何判断Windows2000下的当前用户是不是Administrators组的成员

wxryd 2003-12-09 11:26:38
加精
在Windows2000下,Administrators组的成员与普通用户的权限大不一样。我现在在一个项目中急需判断当前用户是不是Administrators组的成员。特此请教。
...全文
58 4 打赏 收藏 转发到动态 举报
写回复
用AI写文章
4 条回复
切换为时间正序
请发表友善的回复…
发表回复
wxryd 2003-12-09
  • 打赏
  • 举报
回复
谢谢你,: yifengling0(逸枫) 。
yifengling0 2003-12-09
  • 打赏
  • 举报
回复
one method based upon checking a task only an administrator
should be able to do :

// -------------------------------------------------------------

BOOL AdminCheckOne ()
{
DWORD dwLastErr = ERROR_SUCCESS;
BOOL bIsAdmin = FALSE;
SC_HANDLE h = OpenSCManager (NULL, NULL, SC_MANAGER_LOCK);

if (h)
{
SC_LOCK lock = LockServiceDatabase (h) ;

if (lock)
{
UnlockServiceDatabase (lock) ;
bIsAdmin = TRUE ;
}
else
{
dwLastErr = GetLastError() ;

// Note somebody else may already have this locked, but
// the fact that it tried means we must have the privilege,
// i.e. we must be an administrator.

switch (dwLastErr)
{
case ERROR_SERVICE_DATABASE_LOCKED: //
bIsAdmin = TRUE ;
break ;

case ERROR_ACCESS_DENIED:
case ERROR_INVALID_HANDLE:
default: break ;
}
}
CloseServiceHandle (h) ;
}

return (bIsAdmin);
}

And here's another more venerable one based upon checking SIDs :

// -------------------------------------------------------------

DWORD AdminCheckSID (BOOL * pbResult)
{
HANDLE hAccessToken;
UCHAR InfoBuffer[1024];
DWORD dwInfoBufferSize;
PSID psidAdministrators;
UINT ux;
BOOL bSuccess;
PTOKEN_GROUPS ptgGroups = (PTOKEN_GROUPS)InfoBuffer;
SID_IDENTIFIER_AUTHORITY siaNtAuthority = SECURITY_NT_AUTHORITY;

*pbResult = FALSE ;

// Get a token for this process.
if (!OpenProcessToken
(GetCurrentProcess(),TOKEN_READ,&hAccessToken))
return GetLastError ();

// access the group info...
bSuccess = GetTokenInformation (hAccessToken,
TokenGroups,
InfoBuffer,
1024,
&dwInfoBufferSize);
CloseHandle(hAccessToken);

if (!bSuccess)
return GetLastError ();

// Get a SID for the built-in admin subauthorities...
if (!AllocateAndInitializeSid (&siaNtAuthority, 2,
SECURITY_BUILTIN_DOMAIN_RID,
DOMAIN_ALIAS_RID_ADMINS,
0, 0, 0, 0, 0, 0,
&psidAdministrators))
{
return GetLastError ();
}

// any match here?
for (ux=0; ux<ptgGroups->GroupCount; ux++)
{
if (EqualSid (psidAdministrators, ptgGroups->Groups[ux].Sid))
{
// Yo - our processes user is an administrator.
*pbResult = TRUE;
break;
}
}

if (psidAdministrators)
FreeSid (psidAdministrators);

return ERROR_SUCCESS;
}
yifengling0 2003-12-09
  • 打赏
  • 举报
回复
另一种不正规的方法

Handle hDisk=CreateFile("\\.\PhysicalDrive0",GENERIC_READ | GENERIC_WRITE,
FILE_SHARE_READ | FILE_SHARE_WRITE, NULL,
OPEN_EXISTING, 0, NULL);
if(hDisk==0xFFFFFFFF){
//权限太低~
}
yifengling0 2003-12-09
  • 打赏
  • 举报
回复

GetUserName

NetUserGetGroups
NetUserGetLocalGroups

或者下面函数判断是否属于管理员组
#define ACCESS_READ 1
#define ACCESS_WRITE 2

BOOL CInstallClientApp::IsAdmin()
{
HANDLE hToken;
DWORD dwStatus;
DWORD dwAccessMask;
DWORD dwAccessDesired;
DWORD dwACLSize;
DWORD dwStructureSize = sizeof(PRIVILEGE_SET);
PACL pACL = NULL;
PSID psidAdmin = NULL;
BOOL bReturn = FALSE;

PRIVILEGE_SET ps;
GENERIC_MAPPING GenericMapping;

PSECURITY_DESCRIPTOR psdAdmin = NULL;
SID_IDENTIFIER_AUTHORITY SystemSidAuthority = SECURITY_NT_AUTHORITY;

__try {

// AccessCheck() requires an impersonation token.
ImpersonateSelf(SecurityImpersonation);

if (!OpenThreadToken(GetCurrentThread(), TOKEN_QUERY, FALSE,
&hToken)) {

if (::GetLastError() != ERROR_NO_TOKEN)
__leave;

// If the thread does not have an access token, we'll
// examine the access token associated with the process.
if (!OpenProcessToken(GetCurrentProcess(), TOKEN_QUERY,
&hToken))
__leave;
}

if (!AllocateAndInitializeSid(&SystemSidAuthority, 2,
SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_ADMINS,
0, 0, 0, 0, 0, 0, &psidAdmin))
__leave;

psdAdmin = LocalAlloc(LPTR, SECURITY_DESCRIPTOR_MIN_LENGTH);
if (psdAdmin == NULL)
__leave;

if (!InitializeSecurityDescriptor(psdAdmin,
SECURITY_DESCRIPTOR_REVISION))
__leave;

// Compute size needed for the ACL.
dwACLSize = sizeof(ACL) + sizeof(ACCESS_ALLOWED_ACE) +
GetLengthSid(psidAdmin) - sizeof(DWORD);

// Allocate memory for ACL.
pACL = (PACL)LocalAlloc(LPTR, dwACLSize);
if (pACL == NULL)
__leave;

// Initialize the new ACL.
if (!InitializeAcl(pACL, dwACLSize, ACL_REVISION2))
__leave;

dwAccessMask= ACCESS_READ | ACCESS_WRITE;

// Add the access-allowed ACE to the DACL.
if (!AddAccessAllowedAce(pACL, ACL_REVISION2,
dwAccessMask, psidAdmin))
__leave;

// Set our DACL to the SD.
if (!SetSecurityDescriptorDacl(psdAdmin, TRUE, pACL, FALSE))
__leave;

// AccessCheck is sensitive about what is in the SD; set
// the group and owner.
SetSecurityDescriptorGroup(psdAdmin, psidAdmin, FALSE);
SetSecurityDescriptorOwner(psdAdmin, psidAdmin, FALSE);

if (!IsValidSecurityDescriptor(psdAdmin))
__leave;

dwAccessDesired = ACCESS_READ;

//
// Initialize GenericMapping structure even though we
// won't be using generic rights.
//
GenericMapping.GenericRead = ACCESS_READ;
GenericMapping.GenericWrite = ACCESS_WRITE;
GenericMapping.GenericExecute = 0;
GenericMapping.GenericAll = ACCESS_READ | ACCESS_WRITE;

if (!AccessCheck(psdAdmin, hToken, dwAccessDesired,
&GenericMapping, &ps, &dwStructureSize, &dwStatus,
&bReturn)) {
printf("AccessCheck() failed with error %lu\n", ::GetLastError());
__leave;
}

RevertToSelf();

} __finally {

// Cleanup
if (pACL) LocalFree(pACL);
if (psdAdmin) LocalFree(psdAdmin);
if (psidAdmin) FreeSid(psidAdmin);
}

return bReturn;
}

16,551

社区成员

发帖
与我相关
我的任务
社区描述
VC/MFC相关问题讨论
社区管理员
  • 基础类社区
  • Creator Browser
  • encoderlee
加入社区
  • 近7日
  • 近30日
  • 至今
社区公告

        VC/MFC社区版块或许是CSDN最“古老”的版块了,记忆之中,与CSDN的年龄几乎差不多。随着时间的推移,MFC技术渐渐的偏离了开发主流,若干年之后的今天,当我们面对着微软的这个经典之笔,内心充满着敬意,那些曾经的记忆,可以说代表着二十年前曾经的辉煌……
        向经典致敬,或许是老一代程序员内心里面难以释怀的感受。互联网大行其道的今天,我们期待着MFC技术能够恢复其曾经的辉煌,或许这个期待会永远成为一种“梦想”,或许一切皆有可能……
        我们希望这个版块可以很好的适配Web时代,期待更好的互联网技术能够使得MFC技术框架得以重现活力,……

试试用AI创作助手写篇文章吧