Good afternoon, Henrik. I just wanted to follow up on this. it has been quite some time and we are still using 7.2.1 and i'm now evaluating 8.0.4 on our test server. I still think the permissions are not as I requested when AD Groups are involved. The same situation i described one post previously is there.
AD Group = DOMAIN\VC_Admins
AD Group members: DOMAIN\Mary, DOMAIN\Todd, and DOMAIN\Brian
I remove all AD users from VisualCron. I then add the DOMAIN\VC_Admins group with default options (Active, and Let Users Inherit (not clone) permissions).
I then log into VisualCron as DOMAIN\Brian and a new AD User is created called 'Brian' with a Name, AD (Yes), Domain (DOMAIN), and FQDN of domain. This account has admin privelages within VC and all works as expected.
Fast forward 3 weeks from now. Brian has done something bad and has been demoted. He's now working in Sanitation and has absolutely no reason to have access to VisualCron but he still has a domain account, no longer a member of the DOMAIN\VC_Admins group, for purposes of checking e-mail and doing HR related items. In VisualCron, there's still an entry for 'Brian' that is a member of the built-in VC 'Administrators' permission group. Brian can still be destructive if he wishes due to VisualCron not caring or re-evaluating his membership of the DOMAIN\VC_Admins group. If he's removed from the AD Group that gave him permissions in the first place, there should be no more access, but the access remains.
My suggestion to create temporary sessions based on AD Group membership is still likely the way to go. There should be no permanent footprint in the User list if using AD groups and not explicit User additions.
Thoughts?
Brian