- I have
UserA
. - Working on
ComputerA
. I have setup a Virtual Machine on
ComputerA
under Hyper-V calledComputerA-VM
.ComputerA
runs Windows 10 Pro.ComputerA
is part of domain.com managed by a DC running Windows Server 2012 R2.UserA
is a domain user.
I want UserA
to have permissions to START ComputerA-VM
and CONNECT (access console) to ComputerA-VM
and NOTHING ELSE.
I don't want them to be able to create other VMs, delete VMs, edit the settings of ComputerA-VM, or to mess with snapshots or anything.
How can I do this?
this seems to be possible. https://blogs.msdn.microsoft.com/virtual_pc_guy/2008/01/17/allowing-non-administrators-to-control-hyper-v/ here is more information about it.
I have poked around a bit with it to see how it works. it seems to go like this.
Role Based Access Control is the way to go.
In the days of Windows 2008, it was supported using the Authorization Manager tool. Sad to say that Authorization Manager is no longer supported in Windows 2012 R2.
The only way for you to control RBAC now with Windows 2012 R2 is to use SCVMM: https://technet.microsoft.com/en-us/library/gg696971(v=sc.12).aspx
In the end I was not able to find an effective way to restrict access exactly the way I wanted (boo Microsoft for removing granular options).
The workaround I'm using right now is to simply grant access to control the VM. I then provide two Powershell scripts files to my users which allow them to Start the VM and another to Connect to the VM.
At the same time, I have a GPO policy which disables access to the HyperV control panel to those specific users that have HyperV installed locally.