Hello Gev Ananyan,
Thank you for posting in Q&A forum.
Managed Service Accounts (MSA) and Group Managed Service Accounts (gMSA) can work together with Identity Management (IDM) services, including Microsoft Identity Manager (MIM). Here are some key points to consider:
Compatibility and Integration
- MSA and gMSA:
• MSA: Designed for single-server use, providing automatic password management and simplified SPN management.
• gMSA: Extends MSA functionality to multiple servers, ideal for server farms and services requiring mutual authentication.
- Microsoft Identity Manager (MIM):
• MIM can be configured to use gMSA for various services, such as the MIM Synchronization Service and MIM Service.
• Certain MIM components, like the MIM Portal, do not support gMSA directly due to their integration with SharePoint.
Steps to Implement gMSA with MIM
- Prepare the Environment:
• Ensure your Active Directory domain is configured to support gMSA.
• Create the Key Distribution Services (KDS) root key on your domain controller.
- Create gMSA Accounts:
• Use PowerShell to create gMSA accounts for the MIM services.
For example:
New-ADServiceAccount -Name MIMSyncGMSAsvc -DNSHostName MIMSyncGMSAsvc.contoso.com -PrincipalsAllowedToRetrieveManagedPassword "MIMSync_Servers"
- Configure MIM Services:
• Update the MIM services to use the newly created gMSA accounts.
This involves setting the service accounts for the MIM Synchronization Service, MIM Service, and other supported components.
References:
Group Managed Service Accounts Overview | Microsoft Learn
Get started with Group Managed Service Accounts
Convert Microsoft Identity Manager-specific services to gMSA | Microsoft Learn
Set up a gMSAs for Microsoft Identity Manager 2016 | Microsoft Learn
I hope the information above is helpful.
If you have any questions or concerns, please feel free to let us know.
Best Regards,
Daisy Zhou
============================================
If the Answer is helpful, please click "Accept Answer" and upvote it.