/
dsRequester server configuration with gMSA Account

dsRequester server configuration with gMSA Account

Overview

This guide provides step-by-step instructions for configuring an on-premises GYTPOL dsRequester Server to use a Group Managed Service Account (gMSA).

Follow these guidelines to ensure all GYTPOL components function correctly with the gMSA.

Guidelines / Prerequisites

  1. Install GYTPOL dsRequester Server with a regular user account (do not use the gMSA for initial installation).

    1. If the server is yet installed, please refer to this guide to setup and install dsRequester.

  2. Create a security group that will be allowed to retrieve the managed password for the gMSA.

  3. Create and install the gMSA.

  4. Reconfigure GYTPOL Tasks to use the gMSA.

Creating the Security Group (GroupName)

A security group is required to define which computers can retrieve the gMSA's managed password and use it.

This step is crucial before creating the gMSA.

Create the Security Group

  1. Open Active Directory Users and Computers (ADUC) on a Domain Controller.

    1. You can also perform this on the dsRequester server, provided the necessary features are installed as specified in the prerequisites.

  2. Right-click the desired OU, select New > Group, and name it (e.g., gMSA-GYTPOL-Servers).

  3. Set the group type to Security and click OK.

  4. Enter the computer accounts that should have access to the gMSA under the Members tab.

    1. Usually, this will include only the dsRequester server.

Create the gMSA

  1. Identify the name of the gMSA you want to create. For example, gytGMSA.

  2. Determine the group or computer accounts that will have access to use this gMSA.

  3. Open PowerShell as an Administrator on a Domain Controller.

    1. You can also perform this on the dsRequester server, provided the necessary features are installed as specified in the prerequisites.

  4. Run the following command to create the gMSA:

New-ADServiceAccount -Name "gytGMSA" -DNSHostName "domain.com" -PrincipalsAllowedToRetrieveManagedPassword "GroupName"
  • Replace gytGMSA with your desired gMSA name.

  • Replace domain.com with your domain name.

  • Replace GroupName with the name of the group you created (e.g., gMSA-GYTPOL-Servers).

    • The PrincipalsAllowedToRetrieveManagedPassword parameter ensures that only members of the specified group can access the gMSA's credentials. This adds a layer of security and limits access to specific computers or services.

Verify the creation of the gMSA account with:

Get-ADServiceAccount "gytGMSA"

Install the gMSA on the GYTPOL Server

  1. Log in to the GYTPOL dsRequester server.

  2. Open PowerShell as an Administrator.

  3. Install the gMSA using:

    Install-ADServiceAccount -Identity "gytGMSA"
  4. Test the gMSA installation. A True result indicates that the account is ready to use.

Add the gMSA to Local Administrators group and Logon as a Batch Privilege on the dsRequester server

Granting gMSA Local Administrator Privileges

  1. Add the gMSA to the local Administrators group using Powershell as Administrator. Replace Domain\gytGMSA$ with the gMSA's name and domain.

The $ is required at the end of the gMSA name.

Adding the gMSA to "Log on as a Batch Job" Policy

The "Log on as a batch job" privilege allows the gMSA to execute tasks such as scheduled tasks or batch processes. Here's how to grant this privilege:

  1. Open Local Security Policy:

    1. Press Win + R, type secpol.msc, and press Enter.

  2. Locate the Policy:

    1. Go to Security Settings > Local Policies > User Rights Assignment.

    2. Double-click Log on as a batch job.

  3. Add the gMSA:

    1. Click Add User or Group > Advanced > Find Now.

    2. Select Domain\gytGMSA$ and click OK.

  4. Apply Changes:

    1. Click Apply > OK to save and close.

Adding the gMSA to the "Performance Log Users" Group in the Domain

  1. Open Active Directory Users and Computers on the dsRequester Server:

    • Press Win + R, type dsa.msc, and press Enter.

  2. Locate the Group:

    • Navigate to the Built-in container or the location of the Performance Log Users group.

  3. Add the gMSA:

    • Double-click Performance Log Users and go to the Members tab.

    • Click Add > Advanced > Find Now.

    • Select Domain\gytGMSA$ and click OK.

  4. Apply Changes:

    • Click Apply > OK to save and close.

Reconfigure GYTPOL Tasks to use the gMSA

Update Scheduled Tasks:

Update all gytpolServer scheduled tasks (3 in total) to run under the gMSA.

Ensure all tasks are executing as the user who originally installed the dsRequester (not the gMSA), following the instructions in Prerequisites Step 1.

image-20250117-160308.png

Follow these steps to use the script (be sure to modify the gMSA name as needed):

  1. Open PowerShell ISE as an Administrator.

  2. Copy and paste the script into the editor.

  3. Run the script and verify the results.

After the script runs successfully, the following output should appear on your screen:

image-20250127-135748.png

Manually execute the tasks by right-clicking on them and selecting Run.

Verify that they remain in the "Running" status and do not terminate immediately.