Create a gMSA for use with SharpHound Enterprise
Group Managed Service Accounts (gMSA) are managed domain accounts that provide automatic password management, simplified service principal name (SPN) management, and the ability to delegate the management to other objects.
Detailed software requirements from Microsoft are available here.
Microsoft gMSA documentation is available here.
Prepare the domain
-
Log into a domain controller within the domain you want to create a GMSA.
-
Run the following to validate whether the domain has a KDS Root Key configured:
- If already configured (as seen below), skip this step:
Otherwise, create the KDS Root Key:
Create the gMSA and password read group
Perform the following steps from/against a writeable Domain Controller.
-
Create a gMSA password read group for computers that should have access to the gMSA password. The SharpHound Enterprise server will later be added to this group.
Browse to the desired location in Users and Computers and create the group. Alternatively, use the following following template to create the group using PowerShell:
-
Add the SharpHound Enterprise server as a member of the gMSA password read group, which allows it to access the password of the gMSA and run the service.
You can add the computer to the group in Users and Computers. Alternatively, use the following following template to add group membership using PowerShell:
-
Create the gMSA and allow the password read group to retrieve it’s password.
Use the following following template to create the gMSA and set the retrieve right using PowerShell:
NB: If the error “New-ADServiceAccount : Key does not exist” shows, try again in 10 hours which will allow all Domain Controllers to converge AD replication of the KDS root key.
Prepare the SharpHound Enterprise server
-
Restart the SharpHound Enterprise server so that the server’s membership of the `pwdRead` group takes effect.
-
Grant the gMSA the “Log on as a service” User Rights Assignment on the SharpHound Enterprise server. This can for example be done through `secpol.msc`, or policy deployment methods like a GPO.
-
Optional: Test that the SharpHound Enterprise server can retrieve the gMSA password, see _Test the gMSA (optional)
_
-
The gMSA is now ready to be used on the SharpHound Enterprise server. Follow Install and Upgrade SharpHound Enterprise to complete the installation of the SharpHound Enterprise service.
Test the gMSA (optional)
- Check the status of the RSAT PowerShell module. On the SharpHound Enterprise server, open a PowerShell as an Administrator and run:
If the Install State shows “Installed” then skip to step 2, otherwise run:
- In the elevated PowerShell, test that the SharpHound server can retrieve the gMSA password by running:
- The test is successful of the command responds with “True”
Add the gMSA to the SharpHound Enterprise service
Change the SharpHound Enterprise service to be run by the created gMSA. This can be done in two ways:
Using Services GUI / ‘services.msc’
-
Open the Services application / ‘services.msc’ as a local administrator
-
Open properties of the service: **SharpHoundDelegator
**
-
In the Log On tab; set This account to be the gMSA
-
Delete the contents of the password fields if present
-
Save by clicking **OK
**
Using command line / ‘sc.exe’
-
Open command prompt/PowerShell as a local administrator
-
Run the following command, replacing ‘DOMAIN’ and the gMSA name to match your environment