Skip to content

Commit d8ee351

Browse files
authored
Update service-accounts-govern-on-premises.md
1 parent dc8a761 commit d8ee351

File tree

1 file changed

+23
-21
lines changed

1 file changed

+23
-21
lines changed

articles/active-directory/fundamentals/service-accounts-govern-on-premises.md

Lines changed: 23 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -19,34 +19,36 @@ ms.collection: M365-identity-device-management
1919

2020
Active Directory offers four types of on-premises service accounts:
2121

22-
* [Group managed service accounts (gMSAs)](service-accounts-group-managed.md)
23-
* [Standalone managed service accounts (sMSAs)](service-accounts-standalone-managed.md)
24-
* [Computer accounts](service-accounts-computer.md)
25-
* [User accounts that function as service accounts](service-accounts-user-on-premises.md)
22+
* Group-managed service accounts (gMSAs)
23+
* [Secure group managed service accounts](service-accounts-group-managed.md)
24+
* Standalone managed service accounts (sMSAs)
25+
* [Secure standalone managed service accounts](service-accounts-standalone-managed.md)
26+
* On-premises computer accounts
27+
* [Secure on-premises computer accounts with Active Directory](service-accounts-computer.md)
28+
* User accounts functioning as service accounts
29+
* [Secure user-based service accounts in Active Directory](service-accounts-user-on-premises.md)
2630

31+
Part of service account governance includes:
2732

28-
It is critical to govern service accounts closely so that you can:
33+
* Protecting them, based on requirements and purpose
34+
* Managing account lifecycle, and their credentials
35+
* Assessing service accounts, based on risk and permissions
36+
* Ensuring Active Directory (AD) and Azure Active Directory (Azure AD) have no stale service accounts, with permissions
2937

30-
* Protect them based on their use-case requirements and purpose.
31-
* Manage the lifecycle of the accounts and their credentials.
32-
* Assess them based on the risk they'll be exposed to and the permissions they carry.
33-
* Ensure that Active Directory and Azure Active Directory have no stale service accounts with potentially far-reaching permissions.
38+
## New service account principles
3439

35-
## Principles for creating a new service account
36-
37-
When you create a service account, understand the considerations listed in the following table:
40+
When you create service accounts, consider the information in the following table.
3841

3942
| Principle| Consideration |
4043
| - |- |
41-
| Service account mapping| Tie the service account to a single service, application, or script. |
42-
| Ownership| Ensure that there's an owner who requests and assumes responsibility for the account. |
43-
| Scope| Define the scope clearly, and anticipate usage duration for the service account. |
44-
| Purpose| Create service accounts for a single, specific purpose. |
45-
| Permissions | Apply the principle of *least permission*. To do so:<li>Never assign permissions to built-in groups, such as administrators.<li>Remove local machine permissions, where appropriate.<li>Tailor access, and use Active Directory delegation for directory access.<li>Use granular access permissions.<li>Set account expirations and location-based restrictions on user-based service accounts. |
46-
| Monitor and audit use| Monitor sign-in data, and ensure that it matches the intended usage. Set alerts for anomalous usage. |
47-
| | |
48-
49-
### Set restrictions for user accounts
44+
| Service account mapping| Connect the service account to a service, application, or script |
45+
| Ownership| Ensure there's an owner who requests and assumes account responsibility |
46+
| Scope| Define the scope, and anticipate usage duration|
47+
| Purpose| Create service accounts for one purpose |
48+
| Permissions | Apply the principle of least permission. To do so:<li>Don't assign permissions to built-in groups, such as administrators<li>Remove local machine permissions, where feasible<li>Tailor access, and use AD delegation for directory access<li>Use granular access permissions<li>Set account expiration and location restrictions on user-based service accounts |
49+
| Monitor and audit use| Monitor sign-in data, and ensure it matches the intended usage. Set alerts for anomalous usage. |
50+
51+
### User account restrictions
5052

5153
For user accounts that are used as service accounts, apply the following settings:
5254

0 commit comments

Comments
 (0)