buermanjjr
New Member
- Joined
- Mar 7, 2025
- Messages
- 3
- Thread Author
- #1
I want to understand if this pattern has been explored.
In an enterprise environment, if a service hosted on server A ("ssa") needs to interact with services on server B ("ssb") , it is required to create a "service account" that is configured to run ssa, with that service account then having to be configured in the appropriate acl on ssb. This has been the case for as long as I remember, and with this being copied thousands of times over, the management of these accounts and thier configured locations becomes monsterous. Thousands of PW's having to be reconfigured and tracked, not to mention access to those accounts to even BE managed...
We experimented: "what if we don't use a service account, and instead let ssa run as the local system account like it does by default?"
We then took the computer object ID of that server "serverA$" and applied it to the ssb ACL.... and it worked!
Is this considered an approved pattern over creating non human generic accounts? Why/not?
I hope that this has, because trying to communicate a "new" security idea around here... isn't easy.
In an enterprise environment, if a service hosted on server A ("ssa") needs to interact with services on server B ("ssb") , it is required to create a "service account" that is configured to run ssa, with that service account then having to be configured in the appropriate acl on ssb. This has been the case for as long as I remember, and with this being copied thousands of times over, the management of these accounts and thier configured locations becomes monsterous. Thousands of PW's having to be reconfigured and tracked, not to mention access to those accounts to even BE managed...
We experimented: "what if we don't use a service account, and instead let ssa run as the local system account like it does by default?"
We then took the computer object ID of that server "serverA$" and applied it to the ssb ACL.... and it worked!
Is this considered an approved pattern over creating non human generic accounts? Why/not?
I hope that this has, because trying to communicate a "new" security idea around here... isn't easy.