Citrix DaaS

On-premises Active Directory service accounts

An on-premises Active Directory service account is a container to store the user name and password of a privileged domain user account. The user account must have sufficient permissions to manage computer accounts in an Active Directory. Machine Creation Service can use this service account to do computer accounts related operations without entering the domain credentials every time.

Create an on-premises Active Directory service account

Create an on-premises Active Directory service account using Studio or PowerShell.

Prerequisite

To create an on-premises Active Directory service account, make sure to complete the following task:

  • Create a domain user account in your Active Directory with sufficient permissions to create, update, and delete computer objects in your Active Directory or specific OUs.

Use Studio

  1. In the DaaS tile, click Manage.
  2. In the left pane, select Administrators.
  3. In the Service Accounts tab, click Create Service Account.
  4. On the Identity Type page, select On-premises Active Directory. Click Next.
  5. On the Credentials page, click Enter credentials to provide the username and password of a privileged domain user account which you want to use as the service account.
  6. Set the password expiration date or leave it as never expired.
  7. Select one or more scopes for this service account.
  8. Enter a friendly name and a description (optional) for the service account.
  9. Click Finish to complete the creation.

Use PowerShell

You can use PowerShell commands to create an on-premises Active Directory service. For example:

$credential = ConvertTo-SecureString -String $password -AsPlainText -Force
New-AcctServiceAccount -IdentityProviderType ActiveDirectory -IdentityProviderIdentifier test.local -AccountId test\svcacct_mcs -AccountSecret $credential -SecretExpiryTime 2030/08/15 -DisplayName 'scvacct_mcs' -Description 'Service account for test.local'
<!--NeedCopy-->

Note:

The $password is the matching password for the provided domain user account.

After an Active Directory or a Hybrid Azure AD based identity pool is associated with a service account, you can do various machines identity-related actions without requiring to enter the domain credentials.

  • To create a new identity account using a service account

     New-AcctADAccount -IdentityPoolName MyPool -Count 2 -UseServiceAccount
     <!--NeedCopy-->
    
  • To repair the identity accounts using a service account

     Repair-AcctADAccount -ADAccountName "Domain\account","Domain\account2" -UseServiceAccount
     <!--NeedCopy-->
    
  • To remove identity accounts using service account

     Remove-AcctADAccount -IdentityPoolName MyPool -RemovalOption Delete -ADAccountName "Domain\account","domain\account2" -UserServiceAccount
     <!--NeedCopy-->
    

Where to go next

On-premises Active Directory service accounts