Skip to content

Commit ac4202f

Browse files
authored
Update manage-group-managed-service-accounts.md
1 parent 4b49de3 commit ac4202f

File tree

1 file changed

+2
-0
lines changed

1 file changed

+2
-0
lines changed

WindowsServerDocs/identity/ad-ds/manage/group-managed-service-accounts/group-managed-service-accounts/manage-group-managed-service-accounts.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -66,6 +66,8 @@ For Kerberos authentication to work with services using gMSAs, the following are
6666

6767
- All systems involved in the authentication process must have synchronized clocks. Kerberos is sensitive to time configuration, and discrepancies can cause authentication failures.
6868

69+
- All systems that are intended to logon as, or be installed with a gMSA must support Kerberos encryption types required by gMSA. Systems that do not meet this requirement cannot log on or install gMSA.
70+
6971
If you're managing AD from a computer that isn't a domain controller, install the Remote Server Administration Tools (RSAT) to access the necessary management features. RSAT provides the AD module for PowerShell. After installing RSAT, open PowerShell as an administrator and run `Import-Module ActiveDirectory` to enable AD management cmdlets. This allows administrators to manage AD remotely and securely, minimizing the load on domain controllers.
7072

7173
### Create a gMSA

0 commit comments

Comments
 (0)