While deploying ADCS, on the documentation Microsoft recommends using service accounts for the services making up ADCS. The problem is that it doesn't address if these should be individually managed, if they could share a host, nor it is addressed the losing access from a remote Server Manager because Kerberos delegation is involved.
I learned how to fix this a while back because it's the same issue when ADFS* is deployed: control of the computer is stolen by the service account but, as you probably know, it can be gained back by simply adding Active Directory aliases (CNAMEs) to the machine account. e.g;
…if the CA were called LOCKSMITH…
netdom computername locksmith /add:ceslocksmith.domain.tld
netdom computername locksmith /add:ceplocksmith.domain.tld
netdom computername locksmith /add:nedeslocksmith.domain.tld
…or maybe even subdomains; (I've never tried this thought)
netdom computername locksmith /add:ces.locksmith.domain.tld
…
So I was wondering that, if I add aliases for each of the service accounts ADCS might use (CES, CEP, NDES) I could run each one as per recommendation but in the same machine — probably against best practices, but y'know — except I found this thing in some forum-type-place where it said that multiple instances of CES (I assume in a farm) should all run with the same service account. No mention of the other services was made. But should they too share the same service account, or is it OK for individual services tied to a single Enterprise CA to each run under their own service account?
Thanks.
*: actually it's worse for ADFS because for several years the documentation has wrongly indicated to use the wrong Kerberos
service/PRINCIPAL
. It indicateshost
, instead of thehttp
service. Giving control of http to an account at most locks you out of remote admin/PowerShell remoting, but giving control of host away from the machine's account leaves it orphaned from the domain. What's worse is that this is repeated verbatim by MVPs and others in their own blogs.