You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/service-accounts-govern-on-premises.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,7 +33,7 @@ Part of service account governance includes:
33
33
* Protecting them, based on requirements and purpose
34
34
* Managing account lifecycle, and their credentials
35
35
* Assessing service accounts, based on risk and permissions
36
-
* Ensuring Active Directory (AD) and Azure Active Directory (Azure AD) have no stale service accounts, with permissions
36
+
* Ensuring Active Directory (AD) and Azure Active Directory (Azure AD) have no unused service accounts, with permissions
37
37
38
38
## New service account principles
39
39
@@ -158,24 +158,24 @@ Deprovision service accounts at the following junctures:
158
158
* Retirement of the script or application function, for which the service account was used
159
159
* Replacement of the service account for another
160
160
161
-
When deprovisioning, first remove permissions and monitoring, and then remove the account, if needed. To remove the account:
162
-
163
-
1. When the associated application or script is deprovisioned, monitor the sign-ins and resource access for the associated service accounts to be sure that they're not being used in another process. If you're sure it's no longer needed, go to next step.
164
-
165
-
1. Disable the service account to prevent sign-in, and ensure that it's no longer needed. Create a business policy for the time during which accounts should remain disabled.
166
-
167
-
1. After the remain-disabled policy is fulfilled, delete the service account.
168
-
169
-
***For MSAs**: [Uninstall the account](/powershell/module/activedirectory/uninstall-adserviceaccount?view=winserver2012-ps&preserve-view=true) by using PowerShell, or delete it manually from the managed service account container.
161
+
To deprovision:
162
+
163
+
1. Remove permissions and monitoring.
164
+
2. Examine sign-ins and resource access of related service accounts to ensure no potential effect on them.
165
+
3. Prevent account sign-in.
166
+
4. Ensure the account is no longer needed (there's no complaint).
167
+
5. Create a business policy that determines the amount of time accounts are disabled.
168
+
6. Delete the service account.
170
169
171
-
***For computer or user accounts**: Manually delete the account from within Active Directory.
170
+
***MSAs** - See, [Uninstall the account](/powershell/module/activedirectory/uninstall-adserviceaccount?view=winserver2012-ps&preserve-view=true). Use PowerShell, or delete it manually from the managed service account container.
171
+
***Computer or user accounts** - Manually delete the account from Active Directory.
172
172
173
173
## Next steps
174
174
175
175
To learn more about securing service accounts, see the following articles:
176
176
177
-
*[Introduction to on-premises service accounts](service-accounts-on-premises.md)
177
+
*[Securing on-premises service accounts](service-accounts-on-premises.md)
178
178
*[Secure group managed service accounts](service-accounts-group-managed.md)
179
179
*[Secure standalone managed service accounts](service-accounts-standalone-managed.md)
0 commit comments