dsRequester server configuration with gMSA Account
Overview
This guide provides step-by-step instructions for configuring an on-premises GYTPOL dsRequester Server to use a Group Managed Service Account (gMSA).
Follow these guidelines to ensure all GYTPOL components function correctly with the gMSA.
Guidelines / Prerequisites
Install GYTPOL dsRequester Server with a regular user account (do not use the gMSA for initial installation).
If the server is yet installed, please refer to this guide to setup and install dsRequester.
Create a security group that will be allowed to retrieve the managed password for the gMSA.
Create and install the gMSA.
Reconfigure GYTPOL Tasks to use the gMSA.
Creating the Security Group (GroupName)
A security group is required to define which computers can retrieve the gMSA's managed password and use it.
This step is crucial before creating the gMSA.
Create the Security Group
Open Active Directory Users and Computers (ADUC) on a Domain Controller.
You can also perform this on the dsRequester server, provided the necessary features are installed as specified in the prerequisites.
Right-click the desired OU, select New > Group, and name it (e.g.,
gMSA-GYTPOL-Servers
).Set the group type to Security and click OK.
Enter the computer accounts that should have access to the gMSA under the Members tab.
Usually, this will include only the dsRequester server.
Create the gMSA
Identify the name of the gMSA you want to create. For example,
gytGMSA
.Determine the group or computer accounts that will have access to use this gMSA.
Open PowerShell as an Administrator on a Domain Controller.
You can also perform this on the dsRequester server, provided the necessary features are installed as specified in the prerequisites.
Run the following command to create the gMSA:
New-ADServiceAccount -Name "gytGMSA" -DNSHostName "domain.com" -PrincipalsAllowedToRetrieveManagedPassword "GroupName"
Replace
gytGMSA
with your desired gMSA name.Replace
domain.com
with your domain name.Replace
GroupName
with the name of the group you created (e.g.,gMSA-GYTPOL-Servers
).The
PrincipalsAllowedToRetrieveManagedPassword
parameter ensures that only members of the specified group can access the gMSA's credentials. This adds a layer of security and limits access to specific computers or services.
Verify the creation of the gMSA account with:
Get-ADServiceAccount "gytGMSA"
Install the gMSA on the GYTPOL Server
Log in to the GYTPOL dsRequester server.
Open PowerShell as an Administrator.
Install the gMSA using:
Install-ADServiceAccount -Identity "gytGMSA"
Test the gMSA installation. A
True
result indicates that the account is ready to use.
Add the gMSA to Local Administrators group and Logon as a Batch Privilege on the dsRequester server
Granting gMSA Local Administrator Privileges
Add the gMSA to the local Administrators group using Powershell as Administrator. Replace
Domain\gytGMSA$
with the gMSA's name and domain.
The $
is required at the end of the gMSA name.
Adding the gMSA to "Log on as a Batch Job" Policy
The "Log on as a batch job" privilege allows the gMSA to execute tasks such as scheduled tasks or batch processes. Here's how to grant this privilege:
Open Local Security Policy:
Press
Win + R
, typesecpol.msc
, and press Enter.
Locate the Policy:
Go to Security Settings > Local Policies > User Rights Assignment.
Double-click Log on as a batch job.
Add the gMSA:
Click Add User or Group > Advanced > Find Now.
Select
Domain\gytGMSA$
and click OK.
Apply Changes:
Click Apply > OK to save and close.
Adding the gMSA to the "Performance Log Users" Group in the Domain
Open Active Directory Users and Computers on the dsRequester Server:
Press
Win + R
, typedsa.msc
, and press Enter.
Locate the Group:
Navigate to the Built-in container or the location of the Performance Log Users group.
Add the gMSA:
Double-click Performance Log Users and go to the Members tab.
Click Add > Advanced > Find Now.
Select
Domain\gytGMSA$
and click OK.
Apply Changes:
Click Apply > OK to save and close.
Reconfigure GYTPOL Tasks to use the gMSA
Update Scheduled Tasks:
Update all gytpolServer scheduled tasks (3 in total) to run under the gMSA.
Ensure all tasks are executing as the user who originally installed the dsRequester (not the gMSA), following the instructions in Prerequisites Step 1.
Follow these steps to use the script (be sure to modify the gMSA name as needed):
Open PowerShell ISE as an Administrator.
Copy and paste the script into the editor.
Run the script and verify the results.
After the script runs successfully, the following output should appear on your screen:
Manually execute the tasks by right-clicking on them and selecting Run.
Verify that they remain in the "Running" status and do not terminate immediately.