Condividi tramite


Support-Tip: (INSTALLATION): Installation Companion - Accounts Reference

PURPOSE

The purpose of this blog is to cover the different accounts / service accounts that are needed/required in a Microsoft Identity Manager 2016 solution.  Documented here are these accounts for an Identity Manager solution with explanation of their responsibilities.

NOTE This blog does not cover the MIM Certificate Management, BHOLD or PAM Scenarios

 

ACCOUNT TYPE ACCOUNT NAME SUGGESTION ACCOUNT RESPONSIBILITIES EXPLANATION
Installation Account miminstall
NOTE This is a recommended account, not a required account to make FIM/MIM work.
The installation of the Identity Management software requires elevated privileges and special permissions on SQL Server.  Many times, a standard user and/or a service account does not have all of the necessary permissions to execute an installation of the Microsoft Identity Management product and/or update.  This is why we feel it is a good idea to have an installation account that can be utilized for the sole purpose of Product Installation, Service Pack Installation and/or Hotfix (Cumulative Update) Installation.  Once the installation is completed, the recommendation would be to disable the account until you have another update installation to execute.This account will need the following permissions for the purpose of the installation.
NOTE It is important to note that these permissions are required for the account executing the installation for the purpose of installation.  Once the installation is complete, then these permissions can be removed if they are not needed for the account that is executing the installation.  This is important to note in case you choose not to have an actual installation account, but to use a service account and/or another user account.
  1. SQL SERVER: sysAdmin
    1. The account executing the installation must have sysAdmin permissions on the Microsoft SQL Server that is hosting the FIMSynchronizationService and FIMService Databases
    2. sysAdmin permissions are needed for several different creation and/or alter job that happen during the installation.
  2. Domain Admin Permissions
    1. The account executing the installation should have Domain Administrator permissions long enough for the installation of the product and/or update.
    2. By adding the account to the Domain Administrator, the account will most likely become a part of the Local Administrators group.
  3. SharePoint Permissions
    NOTE The SharePoint permissions are normally set during the installation process of SharePoint and is normally the account logged in executing the installation.
    1. SharePoint Farm Administrator
    2. SharePoint Site Collection Administrator

Reasons to utilize an installation account

  1. It will always exist, even if the physical person executing the Identity Management Installation ends up leaving the company, then the installation account still resides.
  2. Installation account can have the elevated privileges where other accounts will not need to be granted this type access, even if it is for a short period of time.

It is not recommended to:

  1. Use Service Accounts to execute the installation, because the account executing the installation is required to have elevated privileges and permissions.
  2. Use Service Accounts because the installation of the Service and Portal adds it to the Administrators Set in the Portal.
SharePoint Configuration Account spDBAccount
SharePoint Application Pool Account mimAppPool
SharePoint Application Pool - SPN Information
If the address that the clients use to contact the FIM Portal is not the same as the server address, you have to establish an SPN for HTTP. That is, if you use a CNAME resource record in DNS, have a SharePoint farm, or use NLB, this address must be registered or Internet Explorer cannot use the Kerberos protocol when it contacts the portal. Run the following command:
  1. On a domain controller where the FIM Solution is installed, open an administrative command-prompt by right clicking on command prompt and selecting Run As Administrator
  2. Type:setspn -S HTTP/<FIMPortalAlias> <Domain Name>\<SharePoint Service Account>( e.g. setspn -s HTTP/myfimportalmachine DOMAINA\svcSharePointService )
    1. <FIMPortalAlias>: This is the address that is used to navigate to the FIM Portal ( e.g.http://myfimportalserver/ )
    2. <Domain Name>: NETBIOS name of the domain that the FIM Solution has been installed
    3. <SharePoint Service Account>: sAMAccountName of the SharePoint Service Account ( e.g. The account specified on the SharePoint - 80 Application Pool in IIS.
NOTE If the account running the SharePoint Application Pool is Network Service, then the SharePoint Service Account should be the computer account that SharePoint Services and the FIM Portal are running.
If, in your solution, you are using a Load Balancer, DNS, Fully Qualified Domain Names (FQDN), you will need to ensure that you have an SPN for each of them.
SPN EXAMPLES
HTTP/myfimservicemachineHTTP/myfimservicemachine.contoso.comHTTP/myfimserviceDNSAlias
ADDITIONAL INFORMATION ON SPNS
NOTE This page will be the same for MIM 2016
 
 
  • This account must be trusted for Kerberos delegation, which is done on the Active Directory account on the Delegation Tab.  In the below snapshot, we utilize the 2nd radio button.  In a more locked down, secure environment one might choose to use the 3rd radio button.  However, we do not recommend doing this, unless you are familiar with Kerberos Delegation settings.
 
Synchronization Service Account mimsync
  • Domain User
  • This is the account that you will see on the Forefront Identity Manager Synchronization Service item in Services MMC.
  • This account is utilized to communicate between the Application Client (Synchronization Service Manager) and the backend SQL Server Database called FIMSynchronizationService
  • This account should not be used for:
    • Installation purposes
    • A Management Agent Account
  • Providing a bit more security to the FIM/MIM Service Account, add the FIM/MIM Service Account to the following Local Security Policies
    • Deny Logon as Batch Job
    • Deny Logon Locally
    • Deny Access to this computer from the network
Service Account mimservice
  • Domain User
  • This is the account that is referenced on the Forefront Identity Manager Service item on the Services MMC
  • The FIM/MIM Service is the account that helps connect the Synchronization Service to the FIMService Database for request processing
  • This should be an email enabled service account, especially if you are going to utilize approvals which executes emails sent from the FIMService account
  • This account should not be used for:
    • Installation purposes
    • A Management Agent Account
FIM/MIM Service - SPN Information
If the address that the clients use to contact the FIM Portal is not the same as the server address, you have to establish an SPN for HTTP. That is, if you use a CNAME resource record in DNS, have a SharePoint farm, or use NLB, this address must be registered or Internet Explorer cannot use the Kerberos protocol when it contacts the portal. Run the following command:
  1. On a domain controller where the FIM Solution is installed, open an administrative command-prompt by right clicking on command prompt and selecting Run As Administrator
  2. Type:setspn -S HTTP/<FIMPortalAlias> <Domain Name>\<SharePoint Service Account>( e.g. setspn -s HTTP/myfimportalmachine DOMAINA\svcSharePointService )
    1. <FIMPortalAlias>: This is the address that is used to navigate to the FIM Portal ( e.g.http://myfimportalserver/ )
    2. <Domain Name>: NETBIOS name of the domain that the FIM Solution has been installed
    3. <SharePoint Service Account>: sAMAccountName of the SharePoint Service Account ( e.g. The account specified on the SharePoint - 80 Application Pool in IIS.
NOTE If the account running the SharePoint Application Pool is Network Service, then the SharePoint Service Account should be the computer account that SharePoint Services and the FIM Portal are running.
If, in your solution, you are using a Load Balancer, DNS, Fully Qualified Domain Names (FQDN), you will need to ensure that you have an SPN for each of them.
SPN EXAMPLES
FIMService/myfimservicemachineFIMService/myfimservicemachine.contoso.comFIMService/myfimserviceDNSAlias
ADDITIONAL INFORMATION ON SPNS
NOTE This page will be the same for MIM 2016
  • This account must be trusted for Kerberos delegation, which is done on the Active Directory account on the Delegation Tab.  In the below snapshot, we utilize the 2nd radio button.  In a more locked down, secure environment one might choose to use the 3rd radio button.  However, we do not recommend doing this, unless you are familiar with Kerberos Delegation settings.
 
  • Providing a bit more security to the FIM/MIM Service Account, add the FIM/MIM Service Account to the following Local Security Policies
    • Deny Logon as Batch Job
    • Deny Logon Locally
    • Deny Access to this computer from the network
NOTE If you are using Exchange Online, then do not have the FIMService in the "Deny Access to this computer from the network"
  • In a Privileged Access Management (PAM) Scenario
    • The MIM Service Account must have the ability to create shadow principals or groups (depending on the mode PAM is running in)
Self-Service Password Reset / Registration mimsspr
  • Domain User Account
  • This account should be exclusive to the Self-Service Password Reset / Registration service
  • This account is represented in the IIS Manager under the Application Pool
FIM/MIM Service - SPN Information
If the address that the clients use to contact the FIM Portal is not the same as the server address, you have to establish an SPN for HTTP. That is, if you use a CNAME resource record in DNS, have a SharePoint farm, or use NLB, this address must be registered or Internet Explorer cannot use the Kerberos protocol when it contacts the portal. Run the following command:
  1. On a domain controller where the FIM Solution is installed, open an administrative command-prompt by right clicking on command prompt and selecting Run As Administrator
  2. Type:setspn -S HTTP/<FIMPortalAlias> <Domain Name>\<SharePoint Service Account>( e.g. setspn -s HTTP/myfimportalmachine DOMAINA\svcSharePointService )
    1. <FIMPortalAlias>: This is the address that is used to navigate to the FIM Portal ( e.g.http://myfimportalserver/ )
    2. <Domain Name>: NETBIOS name of the domain that the FIM Solution has been installed
    3. <SharePoint Service Account>: sAMAccountName of the SharePoint Service Account ( e.g. The account specified on the SharePoint - 80 Application Pool in IIS.
NOTE If the account running the SharePoint Application Pool is Network Service, then the SharePoint Service Account should be the computer account that SharePoint Services and the FIM Portal are running.
If, in your solution, you are using a Load Balancer, DNS, Fully Qualified Domain Names (FQDN), you will need to ensure that you have an SPN for each of them.
SPN EXAMPLES
HTTP/myfimpasswordregistrationHTTP/myfimpasswordregistration.contoso.comHTTP/myfimpasswordregistrationDNSAlias
ADDITIONAL INFORMATION ON SPNS
NOTE This page will be the same for MIM 2016
  • This account must be trusted for Kerberos delegation, which is done on the Active Directory account on the Delegation Tab.  In the below snapshot, we utilize the 2nd radio button.  In a more locked down, secure environment one might choose to use the 3rd radio button.  However, we do not recommend doing this, unless you are familiar with Kerberos Delegation settings.
  
FIM Service Management Agent Account mimma
  • Domain User
  • This account should be exclusive to the FIM Service Management Agent
  • This account should not be a
    • Local Administrator
    • The Synchronization Service Account
    • The FIM Service Account
  • This account is utilized to communicate with the FIMService Database
  • This account should match the account that you specified during the Service and Portal Installation, which adds it to the Windows Registry under the key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\FIMService.
LOCAL SECURITY POLICY
  • The FIM Management Agent Account cannot have the "Deny access to this computer from the network"
INFORMATION / LINKS

 

 

MANAGEMENT AGENT ACCOUNTS

  • In this section, we will discuss some of the common Management Agents utilized in Identity Management Solutions.  These permissions are only required/needed if you utilize them in your Identity Management Solutions.
    • In this section, you will not find all of the Management Agents, just ones that are fairly common.
MANAGEMENT AGENT ACCOUNT NAME RECCOMENDATION EXPLANATION OF RESPONSABILITIES
Active Directory Management Agent Account adma
  • This account is the account that is used to communicate with the Active Directory Forest you specify on the "Connect to Active Directory Forest" page in the Management Agent Properties Window.
  • Permissions needed:
    • Account that has permission to work with that specific Active Directory Forest.  You can control the permissions so that the account only has access to the locations needed for the Identity Management solution.
INFORMATION / LINKS
GalSync Management Agent Account galma
  • The GalSync Management Agent is a pre-configured Active Directory Management Agent for the GalSync Solution.  Because of this, the information above, will correlate to the GalSync Management Agent as well.
  • There are some additional permissions for the GalSync Management Agent Account that are covered in the below Microsoft TechNet Wiki.
INFORMATION / LINKS
 

 

ADDITIONAL INFORMATION