Overview
This guide provides step-by-step instructions for configuring an on-premises GYTPOL dsRequester Server to use a Group Managed Service Account (gMSA).
Follow these guidelines to ensure all GYTPOL components function correctly with the gMSA.
Guidelines / Prerequisites
Install GYTPOL dsRequester Server with a regular user account (do not use the gMSA for initial installation).
If the server is yet installed, please refer to this guide to setup and install dsRequester.
Create a security group that will be allowed to retrieve the managed password for the gMSA.
Create and install the gMSA.
Reconfigure GYTPOL Tasksto use the gMSA.
Creating the Security Group (GroupName)
A security group is required to define which computers can retrieve the gMSA's managed password and use it.
Note |
---|
This step is crucial before creating the gMSA. |
Create the Security Group
Open Active Directory Users and Computers (ADUC) on a Domain Controller.
You can also perform this on the dsRequester server, provided the necessary features are installed as specified in the prerequisites.
Right-click the desired OU, select New > Group, and name it (e.g.,
gMSA-GYTPOL-Servers
).Set the group type to Security and click OK.
Enter the computer accounts that should have access to the gMSA under the Members tab.
Usually, this will include only the dsRequester server.
Create the gMSA
Identify the name of the gMSA you want to create. For example,
gytGMSA
.Determine the group or computer accounts that will have access to use this gMSA.
Open PowerShell as an Administrator on a Domain Controller.
You can also perform this on the dsRequester server, provided the necessary features are installed as specified in the prerequisites.
Run the following command to create the gMSA:
Code Block | ||
---|---|---|
| ||
New-ADServiceAccount -Name "gytGMSA" -DNSHostName "domain.com" -PrincipalsAllowedToRetrieveManagedPassword "GroupName" |
Info |
---|
|
Verify the creation of the gMSA account with:
Code Block | ||
---|---|---|
| ||
Get-ADServiceAccount "gytGMSA" |
Install the gMSA on the GYTPOL Server
Log in to the GYTPOL dsRequester server.
Open PowerShell as an Administrator.
Install the gMSA using:
Code Block language powershell Install-ADServiceAccount -Identity "gytGMSA"
Test the gMSA installation:. A
True
result indicates that the account is ready to use.Code Block language powershell Test-ADServiceAccount "gytGMSA"
Info |
---|
A |
...
Add the gMSA to Local Administrators group and Logon as a Batch Privilege on the dsRequester server
Granting gMSA Local Administrator Privileges
Add the gMSA to the local Administrators group using Powershell as Administrator. Replace
Domain\gytGMSA$
with the gMSA's name and domain.Code Block language powershell Add-LocalGroupMember -Group "Administrators" -Member "Domain\gytGMSA$"
Info |
---|
The |
Adding the gMSA to "Log on as a Batch Job" Policy
The "Log on as a batch job" privilege allows the gMSA to execute tasks such as scheduled tasks or batch processes. Here's how to grant this privilege:
Open Local Security Policy
...
Log in to the target machine as an administrator.:
Press
Win + R
, typesecpol.msc
, and press Enter
.
Locate the Policy
...
In the left pane, navigate to: :
Go to Security Settings > Local Policies > User Rights Assignment
.
Double-click Log on as a batch job.
Add the gMSA
...
In the Properties window, click :
Click Add User or Group
> Advanced > Find Now.
Search for the gMSA account. The account will appear as
Domain\MyGMSA$
.Select
Domain\gytGMSA$
and click OK.
Apply
...
Changes:
Click Apply
> OK to save
Close the Local Security Policy console.
Domain Permissions:
- Add the gMSA to the "Performance Log Users" group in the domain
and close.
Adding the gMSA to the "Performance Log Users" Group in the Domain
Open Active Directory Users and Computers on the dsRequester Server:
Press
Win + R
, typedsa.msc
, and press Enter.
Locate the Group:
Navigate to the Built-in container or the location of the Performance Log Users group.
Add the gMSA:
Double-click Performance Log Users and go to the Members tab.
Click Add > Advanced > Find Now.
Select
Domain\gytGMSA$
and click OK.
Apply Changes:
Click Apply > OK to save and close.
Reconfigure GYTPOL Tasks to use the gMSA
Update Scheduled Tasks:
Modify Update all gytpolServer scheduled tasks (3 in total) to run under the gMSA.
Ensure all tasks are executing as the user who originally installed the dsRequester (not the gMSA), following the instructions in Prerequisites Step 1.
...
Follow these steps to use the script (be sure to modify the gMSA name as needed):
Open PowerShell ISE as an Administrator.
Copy and paste the script into the editor.
Run the script and verify the results.
...