Skip to main content

NIM

Microsoft Active Directory

Abstract

Overview of Microsoft Active Directory, a directory service for Windows domains, including its features and configuration steps.

Microsoft Active Directory (AD) is a directory service developed by Microsoft for Windows domain networks. It is included in most Windows Server operating systems as a set of processes and services. Initially, Active Directory was only in charge of centralized domain management, but it has since grown to include a wide range of directory-based identity-related services. An AD domain controller authenticates and authorizes all users and computers in a Windows domain type network—assigning and enforcing security policies for all computers and installing or updating software. For example, when a user logs into a computer that is part of a Windows domain, Active Directory checks the submitted password and determines whether the user is a system administrator or a normal user. It also allows management and storage of information, provides authentication and authorization mechanisms, and establishes a framework to deploy other related services: Certificate Services, Federation Services, Lightweight Directory Services, and Rights Management Services.

About

Vendor

Microsoft

Product

Active Directory (On-Premise)

Integration Type

PowerShell

Links

github-mark.png
IntegrationConfig.png

Table

Key

Read

Create

Update

Delete

Computers

objectGUID

GreenCheckMark.png
GreenCheckMark.png
GreenCheckMark.png
GreenCheckMark.png

Users

objectGUID

GreenCheckMark.png
GreenCheckMark.png
GreenCheckMark.png
GreenCheckMark.png

Groups

objectGUID

GreenCheckMark.png
GreenCheckMark.png
GreenCheckMark.png
GreenCheckMark.png

Memberships

---

GreenCheckMark.png
GreenCheckMark.png
RedCheckmark.png
GreenCheckMark.png

OrganizationalUnits

objectGUID

GreenCheckMark.png
GreenCheckMark.png
GreenCheckMark.png
GreenCheckMark.png

Referencing Table

Foreign Key

Parent table

Primary Key

Memberships

group

Groups

objectGUID

Memberships

member

Users

objectGUID

  1. Create Group Managed Service Account

  2. In Windows, Click Start > Run > Enter Services.msc

    ActiveDirectoryConfig01.png
  3. Find NIM Service, Double-Click

    ActiveDirectoryConfig02.png
  4. Go to Log On Tab

  5. Select This Account:, click Browse

    ActiveDirectoryConfig03.png
  6. Click Locations, Select Entire Directory

    ActiveDirectoryConfig04.png
  7. Type in name of the GMSA you created, Click Ok

    ActiveDirectoryConfig06.png
  8. Clear Password and Confirm Password fields, Click Ok

    ActiveDirectoryConfig05.png

Troubleshooting

ACCESS DENIED Errors

If Active Directory objects that NIM attempts to modify are returning an ACCESS DENIED error, first verify that the NIM service is not running in the context of the "Local Service" or "Local System" account on the server. NIM must be run as a domain account, such as a group managed service account, and that account must have rights to manage users, groups, computers, and OUs.

If the NIM service is running as a domain account with proper privileges, the next step is to check that account's effective permissions, as there may be an explicit denial somewhere in the access control list.

  1. Launch Active Directory Users and Computers.

  2. Ensure that advanced features are turned on by enabling View > Advanced Features.

  3. Find the target object that is returning the ACCESS DENIED error. Right click on it and select Properties.

  4. Go to the Security tab and click Advanced.

  5. Go to the Effective Access tab.

  6. Click Select a user and find the NIM service account.

  7. Click View Effective Access.

If the resulting list shows a red X next to the operation being attempted (e.g., Delete, Write all properties, etc.), then examine the access control lists on that object and the containers in its hierarchy. There may be an explicit denial somewhere in the hierarchy, or a missing permission on the service account itself.

Cannot change password flags

In cases where the NIM service account has full control but cannot change password flags for accounts, it is possible that the Enable computer and user accounts to be trusted for delegation group policy setting is the cause. Ensure that the NIM service account is a part of this group policy, if it exists. If it does not exist, then the problem lies elsewhere.

To add the NIM service account to this group policy setting, follow these steps:

  1. Open Group Policy Management.

  2. Edit the group policy object that assigns this setting.

  3. Navigate to Computer Configuration > Windows Settings > Security Settings > Local Policies > User Rights Assignment.

  4. Double click on Enable computer and user accounts to be trusted for delegation.

  5. Add the NIM service account (or one of its group memberships) to the list of accounts in this setting.

  6. Click OK to apply your changes.