馃攳
MCITP 70-640: Managed Service Accounts - YouTube
Channel: unknown
[1]
Welcome back to IT Free Training course for
Active Directory. In this video I will look
[6]
at a new feature in Windows 7 and Windows
Server 2008 R2 to automate the management
[12]
of service accounts. This video will show
you how managed service accounts can be used
[17]
in your organization to simplify user account
management, remove the need to manage passwords
[22]
for service accounts, and give you a higher
level of security.
[27]
To refresh your memory about service accounts,
a service account is simply a user account
[31]
that gets created to run a particular piece
of software or service. In order to have good
[37]
security you will want to limit a service
account to one application or service. The
[42]
problem with this approach is the management
of these service accounts and, in particular,
[47]
the management of their passwords becomes
difficult.
[51]
In one of our previous videos about computer
accounts, we learnt that a computer account
[57]
is created for each computer in the domain.
These computer accounts have a password associated
[62]
with them that is automatically updated without
any intervention from the user. Managed service
[69]
accounts use this system for password updating.
This means that if you use a managed service
[75]
account, you never need to worry about setting
or changing the password.
[80]
The password used is a random string of 120
characters. This makes managed service accounts
[86]
very secure as the password is not easily
guessable. By default, the password is changed
[93]
automatically every 30 days without any intervention
from the administrator just like the password
[99]
on computer accounts.
Managed service accounts are bound only to
[104]
the one computer. This ensures the service
account will not be used other than on the
[109]
computer it was created on. Managed Service
Accounts can be placed into groups so this
[115]
is a work around to give them access to other
resources on the network if you need to.
[122]
Before you start using managed service accounts
you need to meet a few requirements. First
[129]
the domain function level needs to be Windows
Server 2008 R2. Managed service accounts also
[137]
requires schema changes. For this reason you
need to run ADPrep /ForestPrep using the Windows
[144]
Server 2008 R2 DVD in your forest. This will
expand the schema to meet the requirements
[151]
for managed service accounts. Even though
you need to expand the schema, you do not
[157]
need to raise the forest function level in
order to use managed service accounts.
[163]
The next requirement is that the client that
is using the managed service accounts is running
[168]
Windows Server 2008 R2 or Windows 7. Lastly
you need some software components installed
[176]
in order to create the managed service accounts
and configure them to be used with that computer.
[182]
These components are .Net framework 3.5 and
the Active Directory module for Windows PowerShell.
[188]
Both of these can be installed by adding the
component using server manager.
[195]
Once you have met all these prerequisites
you can start using managed service accounts
[199]
in your organization. The next step is to
determine which software will work with managed
[206]
service accounts.
Managed service accounts don鈥檛 work with
[211]
all software. By design they do not allow
interactive use which means no support for
[217]
GUI based operations or logging in the computer
via the login prompt. You will need to check
[225]
that the software that you are trying to run
supports managed service accounts.
[230]
Here is a list of common Microsoft products
and their level of support for Managed Service
[236]
Accounts. Exchange supports managed services
accounts except for sending e-mails. This
[243]
means that you can use a managed service account
to run Exchange but will need to configure
[248]
another service account to handle sending
e-mails from Exchange.
[253]
Next, managed service accounts can be used
in IIS to configure application pools. In
[260]
the demonstration I will look at how to configure
a managed service account to work with IIS.
[266]
Microsoft listed SQL as not being compatible
with managed service accounts. A lot of people
[272]
have use managed service accounts with SQL
and had some success. The risk you run with
[278]
using a managed service account with SQL is
that if you have problems, Microsoft will
[284]
not give you any support for that configuration.
Next a managed service account cannot be used
[291]
with the task scheduler.
Lastly a managed service account can be used
[297]
with Active Directory Lightweight Directory
Services, not to be confused with Active Directory
[303]
Domain Services which is the software used
to run a Domain Controller. Active Directory
[309]
Lightweight Directory Services is used with
3rd party applications that require some of
[314]
the features of Active Directory but do not
need a full Active Directory environment.
[320]
In order to get Active Directory Lightweight
Services to operate with a managed service
[325]
account, some additional configuration needs
to be done, but Microsoft does support this
[331]
configuration.
I will now change to my Windows Server 2008
[335]
R2 member server to look at how to configure
a managed service account to operate with
[341]
IIS.
First of all I want to make sure that the
[345]
prerequisites for managed service accounts
are met. To do this, open server manager and
[352]
select features. From features select add
features to see which features have already
[359]
been installed.
The prerequisite for the .Net Framework 3.5
[364]
or above framework is shown at the top as
being installed. Scrolling down, I can see
[371]
that some components of Remote Administration
Tools have been installed. These were installed
[375]
to allow Active Directory administration to
be performed on this server. The important
[380]
thing to look for is that Active Directory
module for Windows PowerShell is installed.
[386]
This allows power shell to interface with
Active Directory to create the service account
[391]
and configure it to be used on this server.
Now that I know that the prerequisites have
[397]
been meet, I will exit out of here and from
the start menu open PowerShell.
[404]
The first command that I will run is import-module
ActiveDirectory. This command loads the ActiveDirectory
[412]
module which allows Active Directory administration
to be performed from PowerShell. If you do
[418]
not run this command, all the other commands
will fail.
[423]
The next command New-ADServiceAccount will
create a managed service account. The name
[431]
of the service account needs to be given with
the name parameter. In this case I will create
[436]
a service account called ManagedIISService.
This service account will be used later on
[443]
with IIS. Following this is the enable parameter
followed by $True. This ensures the managed
[453]
service account is enabled when it is created.
This server is not a domain controller, but
[459]
since it has Active Directory tools installed
it is able to create the service account in
[464]
Active Directory. If I now open Active Directory
Users and Computers from the start menu, I
[472]
can see the newly created service account
by expanding down to managed service accounts.
[479]
Any managed service account will appear in
here. It should be remembered that even though
[484]
it appears in Active Directory here, it still
is tied to the one computer.
[490]
If I minimize Active Directory Users and Computers
and go back to PowerShell. I next need to
[496]
associate the service account with the computer
that it will be used with. This is done using
[501]
the command Add-ADComptuerServiceAccount.
The first parameter, identify is used to specify
[510]
the computer that the service account will
be linked to in this case this will be Svr1.
[517]
The next parameter, ServiceAccount, specifies
the service account that we want to link,
[523]
in this example it is ManagedIISService. So
basically this command is linking the service
[531]
account ManagedIISService with the computer
Svr1.
[537]
The previous commands could have been run
on any computer that is able to perform Active
[542]
Directory administration. The next command
needs to be run on the Windows Server 2008
[548]
R2 install or Windows 7 install that you want
to use the managed service account on. PowerShell
[556]
can also connect to a computer remotely to
run the command as long as the commands target
[561]
is the local computer.
The command is Install-ADServiceAccount. The
[568]
only parameter that you need is identity followed
by the service account name. This command
[575]
makes the necessary changes on the local computer
in order to allow the managed service account
[580]
to operate.
Now that all the hard work is done creating
[584]
the managed service account, I will now open
internet information Services from the start
[589]
menu to change the service that is used in
IIS to the service account that I just created.
[597]
From IIS manager, expand down to application
pools. Form here right click on the default
[605]
app pool and select advanced settings. From
the advanced settings, select the option identity.
[614]
Currently this is configured to run with the
default settings. This means a local service
[619]
account on the server will be used.
When running multiple application pools on
[624]
the same IIS install, you may want to create
each pool to run with its own service account.
[630]
There is nothing stopping you from using the
same procedure that I went through to create
[634]
multiple service accounts and associating
these service accounts with the same computer.
[640]
Once I select custom account I can press the
set button to specify the managed service
[646]
account. For the user name, enter in the managed
service account but make sure the user name
[652]
ends with a dollar sign. Managed service accounts
differ from regular user account in that a
[658]
dollar sign must always be added to the end.
If you do not enter in the dollar sign, Windows
[665]
will not be able to find the managed service
account. Having the dollar sign at the end
[670]
can mean some Windows interfaces will not
be able to detect the managed service account.
[676]
A work around is to place the managed service
account in a group. The Windows interface
[681]
should not have trouble finding the group
and using it even though it cannot find the
[686]
managed service account.
Since Active Directory will automatically
[691]
change the password for the managed service
account, leave the password blank in the password
[696]
and confirm passwords fields. That鈥檚 it;
I can now exit out of here and go back to
[703]
the application pool which will now be using
the managed service account.
[708]
To show that it worked, I will stop the service
and start it again. The managed service account
[715]
is now set up and the administrator will never
have to worry about changing the password
[719]
on the account. Also since the service account
is bound to this computer, even though it
[725]
is located in Active Directory, it cannot
be used on any other computer in the domain.
[733]
In the next video I will look at the exam
objective offline domain join. This is another
[740]
new feature available in Windows 7 and Windows
Server 2008 R2. This allows a computer to
[747]
join the domain when it does not have access
to a domain controller. Thanks for watching
[753]
another free video from IT Free Training.
Most Recent Videos:
You can go back to the homepage right here: Homepage





