Management wants me to create a script/application/ancient magical artifact that allows field technicians to perform a task on our Configuration Manager server (updating collection memberships - very easily done via WMI calls) without actually giving the techs the permissions to conduct said task. The first solution that comes to mind is creating a service account that has the requisite permissions, then finding a way of allowing techs to run commands under this account without actually revealing the service account's credentials to them. I suppose I could do this via asymmetric cryptography to encrypt the credentials, but I'm fairly clueless about encryption, so I would have a very difficult time with this.
Another option that I'm looking at is creating a custom WMI method provider that will make the appropriate WMI calls to accomplish the task I need within a set of constraints that I would like to enforce on the techs using the tool that Management wants. Then I'll just register this provider on the ConfigManager server and give the field technicians "Execute Methods" permissions to it.
Before I get knee-deep into breaking my org's SCCM server with crazy custom WMI junk that will probably be difficult for my successors to modify or recreate, is there anything obvious that I'm missing that makes this stupid or infeasible? Otherwise, are there any other common practices that I'm oblivious to that would allow the kind of execution-by-proxy for our techs to conduct a task they don't specifically have permissions to do?