MCITP 70-640: Managed Service Accounts - YouTube

Channel: unknown

[1]
Welcome back to IT Free Training course for Active Directory. In this video I will look
[6]
at a new feature in Windows 7 and Windows Server 2008 R2 to automate the management
[12]
of service accounts. This video will show you how managed service accounts can be used
[17]
in your organization to simplify user account management, remove the need to manage passwords
[22]
for service accounts, and give you a higher level of security.
[27]
To refresh your memory about service accounts, a service account is simply a user account
[31]
that gets created to run a particular piece of software or service. In order to have good
[37]
security you will want to limit a service account to one application or service. The
[42]
problem with this approach is the management of these service accounts and, in particular,
[47]
the management of their passwords becomes difficult.
[51]
In one of our previous videos about computer accounts, we learnt that a computer account
[57]
is created for each computer in the domain. These computer accounts have a password associated
[62]
with them that is automatically updated without any intervention from the user. Managed service
[69]
accounts use this system for password updating. This means that if you use a managed service
[75]
account, you never need to worry about setting or changing the password.
[80]
The password used is a random string of 120 characters. This makes managed service accounts
[86]
very secure as the password is not easily guessable. By default, the password is changed
[93]
automatically every 30 days without any intervention from the administrator just like the password
[99]
on computer accounts. Managed service accounts are bound only to
[104]
the one computer. This ensures the service account will not be used other than on the
[109]
computer it was created on. Managed Service Accounts can be placed into groups so this
[115]
is a work around to give them access to other resources on the network if you need to.
[122]
Before you start using managed service accounts you need to meet a few requirements. First
[129]
the domain function level needs to be Windows Server 2008 R2. Managed service accounts also
[137]
requires schema changes. For this reason you need to run ADPrep /ForestPrep using the Windows
[144]
Server 2008 R2 DVD in your forest. This will expand the schema to meet the requirements
[151]
for managed service accounts. Even though you need to expand the schema, you do not
[157]
need to raise the forest function level in order to use managed service accounts.
[163]
The next requirement is that the client that is using the managed service accounts is running
[168]
Windows Server 2008 R2 or Windows 7. Lastly you need some software components installed
[176]
in order to create the managed service accounts and configure them to be used with that computer.
[182]
These components are .Net framework 3.5 and the Active Directory module for Windows PowerShell.
[188]
Both of these can be installed by adding the component using server manager.
[195]
Once you have met all these prerequisites you can start using managed service accounts
[199]
in your organization. The next step is to determine which software will work with managed
[206]
service accounts. Managed service accounts don鈥檛 work with
[211]
all software. By design they do not allow interactive use which means no support for
[217]
GUI based operations or logging in the computer via the login prompt. You will need to check
[225]
that the software that you are trying to run supports managed service accounts.
[230]
Here is a list of common Microsoft products and their level of support for Managed Service
[236]
Accounts. Exchange supports managed services accounts except for sending e-mails. This
[243]
means that you can use a managed service account to run Exchange but will need to configure
[248]
another service account to handle sending e-mails from Exchange.
[253]
Next, managed service accounts can be used in IIS to configure application pools. In
[260]
the demonstration I will look at how to configure a managed service account to work with IIS.
[266]
Microsoft listed SQL as not being compatible with managed service accounts. A lot of people
[272]
have use managed service accounts with SQL and had some success. The risk you run with
[278]
using a managed service account with SQL is that if you have problems, Microsoft will
[284]
not give you any support for that configuration. Next a managed service account cannot be used
[291]
with the task scheduler. Lastly a managed service account can be used
[297]
with Active Directory Lightweight Directory Services, not to be confused with Active Directory
[303]
Domain Services which is the software used to run a Domain Controller. Active Directory
[309]
Lightweight Directory Services is used with 3rd party applications that require some of
[314]
the features of Active Directory but do not need a full Active Directory environment.
[320]
In order to get Active Directory Lightweight Services to operate with a managed service
[325]
account, some additional configuration needs to be done, but Microsoft does support this
[331]
configuration. I will now change to my Windows Server 2008
[335]
R2 member server to look at how to configure a managed service account to operate with
[341]
IIS. First of all I want to make sure that the
[345]
prerequisites for managed service accounts are met. To do this, open server manager and
[352]
select features. From features select add features to see which features have already
[359]
been installed. The prerequisite for the .Net Framework 3.5
[364]
or above framework is shown at the top as being installed. Scrolling down, I can see
[371]
that some components of Remote Administration Tools have been installed. These were installed
[375]
to allow Active Directory administration to be performed on this server. The important
[380]
thing to look for is that Active Directory module for Windows PowerShell is installed.
[386]
This allows power shell to interface with Active Directory to create the service account
[391]
and configure it to be used on this server. Now that I know that the prerequisites have
[397]
been meet, I will exit out of here and from the start menu open PowerShell.
[404]
The first command that I will run is import-module ActiveDirectory. This command loads the ActiveDirectory
[412]
module which allows Active Directory administration to be performed from PowerShell. If you do
[418]
not run this command, all the other commands will fail.
[423]
The next command New-ADServiceAccount will create a managed service account. The name
[431]
of the service account needs to be given with the name parameter. In this case I will create
[436]
a service account called ManagedIISService. This service account will be used later on
[443]
with IIS. Following this is the enable parameter followed by $True. This ensures the managed
[453]
service account is enabled when it is created. This server is not a domain controller, but
[459]
since it has Active Directory tools installed it is able to create the service account in
[464]
Active Directory. If I now open Active Directory Users and Computers from the start menu, I
[472]
can see the newly created service account by expanding down to managed service accounts.
[479]
Any managed service account will appear in here. It should be remembered that even though
[484]
it appears in Active Directory here, it still is tied to the one computer.
[490]
If I minimize Active Directory Users and Computers and go back to PowerShell. I next need to
[496]
associate the service account with the computer that it will be used with. This is done using
[501]
the command Add-ADComptuerServiceAccount. The first parameter, identify is used to specify
[510]
the computer that the service account will be linked to in this case this will be Svr1.
[517]
The next parameter, ServiceAccount, specifies the service account that we want to link,
[523]
in this example it is ManagedIISService. So basically this command is linking the service
[531]
account ManagedIISService with the computer Svr1.
[537]
The previous commands could have been run on any computer that is able to perform Active
[542]
Directory administration. The next command needs to be run on the Windows Server 2008
[548]
R2 install or Windows 7 install that you want to use the managed service account on. PowerShell
[556]
can also connect to a computer remotely to run the command as long as the commands target
[561]
is the local computer. The command is Install-ADServiceAccount. The
[568]
only parameter that you need is identity followed by the service account name. This command
[575]
makes the necessary changes on the local computer in order to allow the managed service account
[580]
to operate. Now that all the hard work is done creating
[584]
the managed service account, I will now open internet information Services from the start
[589]
menu to change the service that is used in IIS to the service account that I just created.
[597]
From IIS manager, expand down to application pools. Form here right click on the default
[605]
app pool and select advanced settings. From the advanced settings, select the option identity.
[614]
Currently this is configured to run with the default settings. This means a local service
[619]
account on the server will be used. When running multiple application pools on
[624]
the same IIS install, you may want to create each pool to run with its own service account.
[630]
There is nothing stopping you from using the same procedure that I went through to create
[634]
multiple service accounts and associating these service accounts with the same computer.
[640]
Once I select custom account I can press the set button to specify the managed service
[646]
account. For the user name, enter in the managed service account but make sure the user name
[652]
ends with a dollar sign. Managed service accounts differ from regular user account in that a
[658]
dollar sign must always be added to the end. If you do not enter in the dollar sign, Windows
[665]
will not be able to find the managed service account. Having the dollar sign at the end
[670]
can mean some Windows interfaces will not be able to detect the managed service account.
[676]
A work around is to place the managed service account in a group. The Windows interface
[681]
should not have trouble finding the group and using it even though it cannot find the
[686]
managed service account. Since Active Directory will automatically
[691]
change the password for the managed service account, leave the password blank in the password
[696]
and confirm passwords fields. That鈥檚 it; I can now exit out of here and go back to
[703]
the application pool which will now be using the managed service account.
[708]
To show that it worked, I will stop the service and start it again. The managed service account
[715]
is now set up and the administrator will never have to worry about changing the password
[719]
on the account. Also since the service account is bound to this computer, even though it
[725]
is located in Active Directory, it cannot be used on any other computer in the domain.
[733]
In the next video I will look at the exam objective offline domain join. This is another
[740]
new feature available in Windows 7 and Windows Server 2008 R2. This allows a computer to
[747]
join the domain when it does not have access to a domain controller. Thanks for watching
[753]
another free video from IT Free Training.