Chatta subito con l'assistenza
Chat con il supporto

Active Roles 8.2.1 - Console User Guide

Introduction Getting started User or service account management Group management Computer account management Organizational Unit management Contact management Exchange recipient management

gMSA management tasks

The Active Directory domain in which you are going to create and administer group Managed Service Accounts must meet the following requirements:

  • The domain has an least one Domain Controller (DC) that runs Windows Server 2016 or newer.

  • The domain has the KDS Root Key created.

    You can create a KDS Root Key by running the Add-KDSRootKey PowerShell command on the DC. For more information, see at Create the Key Distribution Services KDS Root Key for further details.

NOTE: You cannot perform Exchange-related operations on the on-premises Exchange Server environment with the gMSA account. For example, you cannot manage remote mailboxes, user mailboxes, or contacts.

Creating a gMSA

Perform the following steps in the Active Roles Console to create a group Service Managed Account (gMSA).

To create a gMSA

  1. Right-click the OU or container in which you want to create a gMSA and select New > Group Managed Service Account.

  2. In the wizard that opens, complete following fields:

    • Name: Specifies the name of the gMSA in Active Directory.

    • Description: Specifies a description of the gMSA.

    • DNS host name: Specifies the DNS hostname. Typically, this is the fully qualified domain name of the server on which you will use the gMSA, for example your-organization.domain.com.

    • Account name (pre-Windows 2000): Specifies the legacy login name of the gMSA (sAMAccountName). Typically, the value of this setting is the same as the name of the gMSA.

    • Password change interval (days): Specifies the number of days before the managed password is automatically changed for the gMSA.

      NOTE: You can configure this setting only when creating the gMSA. After creating the gMSA, this setting will be read-only.

    • Computers or groups: Specifies the computers on which the gMSA can be used to run services. You can add individual computers to this field, or you can add computers to a security group, then add the group to this field.

Managing the properties of a gMSA

For an existing group Managed Service Account (gMSA), perform the following steps in the Active Roles Console to view or change the properties of the gMSA.

To view or change the properties of the gMSA, right-click the gMSA you want to administer and click Properties.

This opens the Properties dialog containing the same fields as the gMSA creation wizard (see Creating a gMSA) with the only difference that the Password change interval field is read-only. In addition, the Account is disabled check box on the Account page shows whether the gMSA is disabled for login, and allows you to disable and re-enable the gMSA.

Searching for gMSA in the directory

The Active Roles Console allows you to find group Managed Service Accounts that meet your search conditions.

To search for gMSA in the directory

  1. Right-click the OU, domain or container in which you want to search for gMSA and click Find.

  2. In the Find window that opens, configure and start your search:

    1. In the Find list, click Custom Search.

    2. Click Field, and select the msDS-GroupManagedServiceAccount object type and the object property to search for.

    3. Configure and add the desired search condition for the object property you have selected.

    4. If needed, add more search conditions by repeating Steps b and c.

    5. Click Find Now.

In the list of search results, right-click a gMSA and use the shortcut menu to perform management tasks. For example, you can right-click a gMSA and then click Properties to view or change the properties of the gMSA.

Related Documents

The document was helpful.

Seleziona valutazione

I easily found the information I needed.

Seleziona valutazione