This article provides information about the permissions needed for service account used with PCS / PPS Active Directory.
Problem or Goal
When configuring an Active Directory Authentication Server instance (Standard mode) on a PCS/PPS device, the administrator must specify a service account that is used by the device to perform a join domain operation. In case full domain administrator level service account cannot be permitted, then this article specifies the minimum permissions that should be enabled on this service account. It also provides an example of how to set it up on Windows Server 2016 using Delegate Control Wizard.
Note: This article does not apply to the Legacy Mode of Active Directory Authentication server on PCS/PPS devices (Legacy mode has been deprecated. For details refer KB40251)
The service account should have permission to join computers to the Active Directory domain. Use the Delegate Control wizard in Active Directory to assign the following account permissions to the username or to a group to which the user belongs:
* Write * Write All Properties * Change Password * Reset Password * Validate Write to DNS hostname * Read and write DNS host attributes * Delete Computer Objects * Create Computer Objects
Example using Windows Server 2016
First identify the user account that needs to be provided with delegated privileges, then login to AD domain, right click on the computers folder.
Select Delegate Control > Next
In the Enter the object names to select, add the account.
4. Click OK
Select Create a custom task to delegate
Select the radio button for Only the following objects in this folder and select the following options:
Create selected objects in this folder
Delete selected objects in this folder
Select the following checkboxes for:
Creation/deletion of specific child objects” along with the ones specified below.