Skip to content

Commit 9c7a9f8

Browse files
authored
Update service-accounts-user-on-premises.md
1 parent fdc4b4e commit 9c7a9f8

File tree

1 file changed

+6
-1
lines changed

1 file changed

+6
-1
lines changed

articles/active-directory/fundamentals/service-accounts-user-on-premises.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,12 @@ ms.collection: M365-identity-device-management
1919

2020
On-premises user accounts was the traditional approach to help secure services running on Windows. Today, use these accounts if group managed service accounts (gMSAs) and standalone managed service accounts (sMSAs) aren't supported by your service. For information about the account type to use, see [Securing on-premises service accounts](service-accounts-on-premises.md).
2121

22-
You can investigate moving your service an Azure service account, such as a managed identity or a service principal. See, [What are managed identities for Azure resources?](../managed-identities-azure-resources/overview.md)
22+
You can investigate moving your service an Azure service account, such as a managed identity or a service principal.
23+
24+
Learn more:
25+
26+
* [What are managed identities for Azure resources?](../managed-identities-azure-resources/overview.md)
27+
* [Securing service principals in Azure Active Directory](service-accounts-principal.md)
2328

2429
You can create on-premises user accounts to provide security for services and permissions the accounts use to access local and network resources. On-premises user accounts require manual password management, like other Active Directory (AD) user accounts. Service and domain administrators are required to maintain strong password management processes to help keep accounts secure.
2530

0 commit comments

Comments
 (0)