Service Account
1. It is a user account
2. It provide permission to services
3. It requires DotNet Framework 3.5 Features
4. Only PowerShell with active directory module can create service account
5. The domain administrator or account operators permission is require in creation of service account
6. We need to add service account to local administrator group
Group managed service accounts (gMSA)
1. It supports on Windows Server 2012 or later
2. 64-bit architecture is required
3. It can run over multiple servers
4. The master root key is required
5. The Security group is used for maintain the managing member hosts
How to install Active Directory module
1. Open “PowerShell” with administrator right
2. Install-WindowsFeature RSAT-AD-PowerShell
How to install DotNet Framework 3.5 Features
1. Insert Windows Installation Disc
2. Using Dism.exe to install, in this example CD-ROM is D:
Dism.exe /online /enable-feature /featurename:NetFX3 /All /Source:D:\sources\sxs /LimitAccess
How to add gMSA into local administrator group
1. Open “Command Prompt” with administrator right
2. net localgroup Administrators <Domain Name>/<gMSA Name> /add
How to create the Key Distribution Services Root Key
1. After we create KDS root key, it need time to replicate to all DC
2. Domain Administrators/Enterprise Administrators permission is required to create KDS root key
How to verify KDS Root Key
How to view KDS Root Key Configuration
How to create gMSA and assign to security group
1. Open “PowerShell” with domain administrator or account operator right
How to create gMSA and assign to PC
How to verify gMSA
Install gMSA on local computer
Verify gMSA on local computer
Uninstall gMSA on local computer
How to delete gMSA
Assign gMSA to specify services
1. Press “Windows” + “R” key to open Run Command Box
2. Enter “services.msc” to open Services snap-in console
3. Right-click service -> “Properties”
4. Select “Log On” tab -> Click “This account” -> Enter “joeschoice\gMSA1$”
5. “Password” must be blank -> Click “OK”
6. Click “Restart the service” to restart service
After change account, Sometime “Log On” tab will become grey.
We will unable to change account.
We can try “sc managedaccount <service name> false” to solve this problem.
Assign gMSA to MS SQL
1. Press “Windows” + “R” key to open Run Command Box
2. Enter “services.msc” to open “Services” snap-in console
3. Right-click “SQL Server (MSSQLSERVER)” ->”Properties”
4. Select “Log On” tab -> Click “This account” -> Enter “joeschoice\gMSA1$”
5. Select “General” tab -> Select “Automatic (Delayed Start)” in “Startup type:”
6. “Password” must be blank -> Click “OK”
7. Click “Restart the service” to restart service
8. Right-click “SQL Server Agent (MSSQLSERVER)” ->”Properties”
9. Select “Log On” tab -> Click “This account” -> Enter “joeschoice\gMSA1$”
10. Select “General” tab -> Select “Automatic (Delayed Start)” in “Startup type:”
11. “Password” must be blank -> Click “OK”
12. Click “Restart the service” to restart service
13. Press “Windows” + “R” key to open Run Command Box
14. Enter “secpol.msc” to open “Local Security Policy” snap-in console
15. Expend “Local Policies” -> Select “User Rights Assignment”
16. Grant “joeschoice\gMSA1$” the following permission: “Log on as a service“, “Replace a process-level token“, “Bypass traverse checking” & “Adjust memory quotas for a process”
Assign gMSA to IIS
1. Press “Windows” + “R” key to open Run Command Box
2. Enter “Inetmgr.msc” to open IIS Manager
3. Double-click <IIS Server Name> -> double-click “Application Pools”
4. right-click <Pool Name> -> Click “Advanced Settings”
5. Click “…” in “Identity” -> Click “Custom Account” -> Click “Set”
6. Enter “joeschoice\gMSA1$”
7. Click “Stop” under “Application Pool Tasks” -> Click “Start”
3 thoughts on “Group managed service accounts”
Comments are closed.