Windows Containers do not ship with Active Directory support and due to their nature can’t (yet) act as a full-fledged domain joined objects, but a certain level of Active Directory functionality can be supported through the use of Globally Managed Service Accounts (GMSA).
Windows Containers cannot be domain-joined, they can also take advantage of Active Directory domain identities similar to when a device is realm-joined. With Windows Server 2012 R2 domain controllers, we introduced a new domain account called a group Managed Service Account (GMSA) which was designed to be shared by services.
We can authenticate to Active Directory resources from Windows container which is not part of your domain. For this to work certain prerequisites needs to be met.
For once your container hosts shall be part of Active Directory and you shall be able to utilize Group Managed Service Accounts.
The following steps needed for communicate Windows container with on premise SQL server using GMSA.
Environments are used and described for this post.
- Active directory Domain Controller installed on server CloudIQDC1.
- OS – Windows Server 2012/2016.
- The domain name is cloudiq.local
- Below are the Domain members (Computers) joined in DC
- SQL server installed on CIQSQL2012. This will be used for GMSA testing.
- OS – Windows 2012
- cloud-2016 will be used to test GSMA connection.
- This is the container host we are using to connect on premise SQL server using GMSA account.
- The GMSA account name is “container_gsma”. We will create this and configure it.
Step 1: Create the KDS Root Key
- We can generate this only once per domain.
- This is used by the KDS service on DCs (along with other information) to generate passwords.
- Login to domain controller.
- Open PowerShell and execute the below.
12Import-module ActiveDirectoryAdd-KdsRootKey –EffectiveTime ((get-date).addhours(-10));5.
- Verify your key using the below command.
Step 2: Create GMSA account
- Create GSMA account using the below command.
1New-ADServiceAccount -Name container_gmsa -DNSHostName cloudiq.local -PrincipalsAllowedToRetrieveManagedPassword "Domain Controllers", "domain admins", "CN=Container Hosts,CN=Builtin, DC=cloudiq, DC=local" -KerberosEncryptionType RC4, AES128, AES256
- Use below command to verify the created GMSA account.
1Get-ADServiceAccount -Identity container_gmsa
- If everything works as expected, you’ll notice a new gMSA object in your domain’s Managed Service Account.
Step 3: Add GMSA account to Servers where we are going to use.
- Open the Active directory Admin Center.
- Select the container_gmsa account and click on properties.
- Select the security and click on add.
- Select only Computers
- Select Computers you want to use GMSA. In our case we need to add CIQSQL2012 and cloud-2016.
- Reboot Domain controller first to these changes take effect.
- Reboot the computers who will be using GMSA. In our case we need to reboot CIQSQL2012 and cloud-2016.
- After reboots, login to Domain controller. Execute the below command.
1Set-ADServiceAccount -Identity container_gmsa -PrincipalsAllowedToRetrieveManagedPassword CloudIQDC1$,cloud-2016$, CIQSQL2012$
Step 4: Install GMSA Account on Servers
- Login to the system where the GMSA account which will use it. In our case login to cloud-2016. This is the container host we are using to connect on premise SQL server using GMSA account.
- Execute the below command if AD features are not available.
1Enable-WindowsOptionalFeature -FeatureName ActiveDirectory-Powershell -online -all
- Execute the below commands
123Get-ADServiceAccount -Identity container_gmsaInstall-ADServiceAccount -Identity container_gmsaTest-AdServiceAccount -Identity container_gmsa
- If everything is working as expected then you need to create credential spec file which need passed to docker during container creation to utilize this service account. Run the below commands to downloads module which will create this file from Microsoft github account and will create a JSON file containing required data.
12345Invoke-WebRequest "https://raw.githubusercontent.com/Microsoft/Virtualization-Documentation/live/windows-server-container-tools/ServiceAccounts/CredentialSpec.psm1" -UseBasicParsing -OutFile $env:TEMP\cred.psm1Import-Module $env:temp\cred.psm1New-CredentialSpec -Name Gmsa -AccountName container_gmsa#This will return location and name of JSON fileGet-CredentialSpec
Step 5: SQL Server Configuration to allow GMSA
- On SQL server create login for GMSA account and add it to “Sysadmin” role. Based on your on premise DB access, you can add suitable roles.
12CREATE LOGIN [cloudiq\container_gmsa$] FROM WINDOWSsp_addsrvRolemember "cloudiq\container_gmsa$", "sysadmin"