These docs are under active development and cover the v0.20 Kobicha security model.
×
Home
/
Peios
/
Identity
/
Well-Known SIDs Reference
On this page
How-to
3 min read
Well-Known SIDs Reference
Well-known SIDs have fixed, universal meaning across every Peios installation and every domain. This page is a reference for the most commonly encountered ones.
Universal well-known SIDs #
SID
Name
Meaning
S-1-0-0
Null
No identity. Used as a placeholder.
S-1-1-0
Everyone
Matches every principal, including anonymous
S-1-1-7
Anonymous
The anonymous identity — used when no authentication has occurred
S-1-2-0
Local
Any principal that has logged on locally
S-1-2-1
Console Logon
A principal that has logged on at the physical console
S-1-3-0
Creator Owner
Replaced with the creating principal's SID when inherited
S-1-3-1
Creator Group
Replaced with the creating principal's primary group SID when inherited
S-1-3-4
Owner Rights
Controls the owner's implicit rights on an object
NT Authority SIDs (S-1-5) #
SID
Name
Meaning
S-1-5-2
Network
A principal that authenticated over the network
S-1-5-3
Batch
A principal running as a batch job
S-1-5-4
Interactive
A principal that logged on interactively
S-1-5-6
Service
A principal running as a service
S-1-5-7
Anonymous Logon
An anonymous logon session
S-1-5-9
Enterprise Domain Controllers
All domain controllers in the enterprise
S-1-5-11
Authenticated Users
All principals that have authenticated (excludes anonymous)
S-1-5-13
Terminal Server Users
Principals that have logged on via terminal services
S-1-5-15
This Organization
Principals from the same organization
S-1-5-18
SYSTEM
The operating system itself — highest-privilege identity
S-1-5-19
Local Service
Built-in service account for services needing minimal local access
S-1-5-20
Network Service
Built-in service account for services needing network identity
Built-in domain SIDs (S-1-5-32) #
SID
Name
Meaning
S-1-5-32-544
Administrators
The built-in administrators group
S-1-5-32-545
Users
The built-in users group
S-1-5-32-546
Guests
The built-in guests group
S-1-5-32-547
Power Users
Legacy group — no special meaning on Peios
S-1-5-32-548
Account Operators
Can manage user accounts
S-1-5-32-549
Server Operators
Can manage domain servers
S-1-5-32-550
Print Operators
Can manage printers
S-1-5-32-551
Backup Operators
Can back up and restore files regardless of permissions
S-1-5-32-552
Replicators
Supports directory replication
Logon session SIDs (S-1-5-5) #
SID
Name
Meaning
S-1-5-5-X-Y
Logon SID
Unique to a specific logon session. Added to the token's groups at authentication. Can be used in ACEs to scope access to a single session.
Well-known domain RIDs #
Within a domain (prefix S-1-5-21-{domain}), certain RIDs are reserved:
RID
Name
Meaning
500
Administrator
The built-in domain administrator account
501
Guest
The built-in domain guest account
502
krbtgt
The Kerberos ticket-granting account
512
Domain Admins
The domain administrators group
513
Domain Users
All domain users
514
Domain Guests
All domain guests
515
Domain Computers
All domain-joined machines
516
Domain Controllers
All domain controllers
RIDs below 1000 are reserved. Regular user and group accounts start at RID 1000.
Service SIDs (S-1-5-80) #
SID
Name
Meaning
S-1-5-80-{hash}
Per-service SID
Unique to a specific service. Added to the service's token to distinguish it from other services running under the same account.
Confinement SIDs #
SID
Name
Meaning
S-1-15-2-{hash}
Confinement SID
Identifies a specific confined application
S-1-15-2-1
ALL_APPLICATION_PACKAGES
Matches all normal confined applications
S-1-15-2-2
ALL_RESTRICTED_APPLICATION_PACKAGES
Matches all confined applications including strictly confined
S-1-15-3-{n}
Capability SID
A declared capability for a confined application
Process Trust Label SIDs (S-1-19) #
SID
Name
Meaning
S-1-19-0-0
None / None
No PIP protection
S-1-19-512-{trust}
Protected / {trust}
Protected process (PPL equivalent)
S-1-19-1024-{trust}
Isolated / {trust}
Isolated process (PP equivalent)
Peios Learn
Built with Trail