Skip to content

Commit 91fd27b

Browse files
authored
Update service-accounts-govern-on-premises.md
1 parent 63c0376 commit 91fd27b

File tree

1 file changed

+14
-14
lines changed

1 file changed

+14
-14
lines changed

articles/active-directory/fundamentals/service-accounts-govern-on-premises.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ Part of service account governance includes:
3333
* Protecting them, based on requirements and purpose
3434
* Managing account lifecycle, and their credentials
3535
* Assessing service accounts, based on risk and permissions
36-
* Ensuring Active Directory (AD) and Azure Active Directory (Azure AD) have no stale service accounts, with permissions
36+
* Ensuring Active Directory (AD) and Azure Active Directory (Azure AD) have no unused service accounts, with permissions
3737

3838
## New service account principles
3939

@@ -158,24 +158,24 @@ Deprovision service accounts at the following junctures:
158158
* Retirement of the script or application function, for which the service account was used
159159
* Replacement of the service account for another
160160

161-
When deprovisioning, first remove permissions and monitoring, and then remove the account, if needed. To remove the account:
162-
163-
1. When the associated application or script is deprovisioned, monitor the sign-ins and resource access for the associated service accounts to be sure that they're not being used in another process. If you're sure it's no longer needed, go to next step.
164-
165-
1. Disable the service account to prevent sign-in, and ensure that it's no longer needed. Create a business policy for the time during which accounts should remain disabled.
166-
167-
1. After the remain-disabled policy is fulfilled, delete the service account.
168-
169-
* **For MSAs**: [Uninstall the account](/powershell/module/activedirectory/uninstall-adserviceaccount?view=winserver2012-ps&preserve-view=true) by using PowerShell, or delete it manually from the managed service account container.
161+
To deprovision:
162+
163+
1. Remove permissions and monitoring.
164+
2. Examine sign-ins and resource access of related service accounts to ensure no potential effect on them.
165+
3. Prevent account sign-in.
166+
4. Ensure the account is no longer needed (there's no complaint).
167+
5. Create a business policy that determines the amount of time accounts are disabled.
168+
6. Delete the service account.
170169

171-
* **For computer or user accounts**: Manually delete the account from within Active Directory.
170+
* **MSAs** - See, [Uninstall the account](/powershell/module/activedirectory/uninstall-adserviceaccount?view=winserver2012-ps&preserve-view=true). Use PowerShell, or delete it manually from the managed service account container.
171+
* **Computer or user accounts** - Manually delete the account from Active Directory.
172172

173173
## Next steps
174174

175175
To learn more about securing service accounts, see the following articles:
176176

177-
* [Introduction to on-premises service accounts](service-accounts-on-premises.md)
177+
* [Securing on-premises service accounts](service-accounts-on-premises.md)
178178
* [Secure group managed service accounts](service-accounts-group-managed.md)
179179
* [Secure standalone managed service accounts](service-accounts-standalone-managed.md)
180-
* [Secure computer accounts](service-accounts-computer.md)
181-
* [Secure user accounts](service-accounts-user-on-premises.md)
180+
* [Secure on-premises computer accounts with AD](service-accounts-computer.md)
181+
* [Secure user-based service accounts in AD](service-accounts-user-on-premises.md)

0 commit comments

Comments
 (0)