We do this all the time and don’t have any issues. My first guess would be that the problem is that the gMSA was not in the group when it “logged in”—when the service started. Restart the service and I would assume that would fix it.
From: ntsys...@googlegroups.com <ntsys...@googlegroups.com>
On Behalf Of Mike Leone
Sent: Wednesday, October 29, 2025 12:33 PM
To: NTSysAdmin <ntsys...@googlegroups.com>
Subject: [ntsysadmin] Adding a gMSA acct to an AD group for directory access
|
EXTERNAL EMAIL: This email originated from outside of Pitt County Government. Do not click any links or open any attachments unless you trust the sender and know the content is safe. |
--
You received this message because you are subscribed to the Google Groups "ntsysadmin" group.
To unsubscribe from this group and stop receiving emails from it, send an email to
ntsysadmin+...@googlegroups.com.
To view this discussion visit
https://groups.google.com/d/msgid/ntsysadmin/CAHBr%2B%2Bgf%3DPLikcYO_s7fs8wAkFi_XODnVbMyua27w1m84pHrWA%40mail.gmail.com.
We do this all the time and don’t have any issues. My first guess would be that the problem is that the gMSA was not in the group when it “logged in”—when the service started. Restart the service and I would assume that would fix it.
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/8cac7638e9564ff1802432a716e11ea0%40pittcountync.gov.
On Wed, Oct 29, 2025 at 12:38 PM Mayo, Bill <Bill...@pittcountync.gov> wrote:We do this all the time and don’t have any issues. My first guess would be that the problem is that the gMSA was not in the group when it “logged in”—when the service started. Restart the service and I would assume that would fix it.
Yeah, I *thougth* I was doing it right, but you never know. LOL I did ask if I could at least bounce the service, if not the whole host (which would effectively accomplish the same thing). But I hadn't heard back, so I needed to get the copy finished, so I bulldozed ahead and added the gMSA to the NTFS security explicitly.Once I can bounce either the service or the host, I'll remove the explicit entry and try again,
I'm not sure about this topic, haven't used gMSA much (plan to when I get some reinforcement).Maybe you need to add computer account of dc2fil007 also to the PrincipalsAllowedToRetrieveManagedPassword (or the group you've set for that).
But if adding dc2fil007 to the group, you might need to restart the dc2fil007 host before it sees its updated group memberships.Best Regards,
StanOp woensdag 29 oktober 2025 om 20:42:43 UTC+1 schreef Mike Leone:On Wed, Oct 29, 2025 at 12:47 PM Mike Leone <tur...@mike-leone.com> wrote:On Wed, Oct 29, 2025 at 12:38 PM Mayo, Bill <Bill...@pittcountync.gov> wrote:We do this all the time and don’t have any issues. My first guess would be that the problem is that the gMSA was not in the group when it “logged in”—when the service started. Restart the service and I would assume that would fix it.
Yeah, I *thougth* I was doing it right, but you never know. LOL I did ask if I could at least bounce the service, if not the whole host (which would effectively accomplish the same thing). But I hadn't heard back, so I needed to get the copy finished, so I bulldozed ahead and added the gMSA to the NTFS security explicitly.Once I can bounce either the service or the host, I'll remove the explicit entry and try again,Nope, didn't work. I bounced the whole SQL server, but the job wouldn't run unless the SQL Agent was explicitly in the NTFS Security, not the AD group I put the SQL Agent into.
--
You received this message because you are subscribed to the Google Groups "ntsysadmin" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ntsysadmin+...@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/1dbf97a1-36f8-49a2-a283-6b7d998cdd08n%40googlegroups.com.
This is definitely not necessary. The only computer accounts that need to be given permission to the gMSA are the ones where it is actually logging on, either via a service, scheduled task or whatever. From there, it is just passing credentials like any other account.
I am not sure why it is not working for Mike, but I have recently seen some weird issues with our scheduled tasks (which I have migrated to gMSAs) where I had to give some list permissions on grandparent directories for some things to work. I used Process Explorer to sort that all out.
From: ntsys...@googlegroups.com <ntsys...@googlegroups.com>
On Behalf Of Stan Gobien
Sent: Thursday, October 30, 2025 3:31 PM
To: ntsysadmin <ntsys...@googlegroups.com>
Subject: Re: [ntsysadmin] Adding a gMSA acct to an AD group for directory access
|
EXTERNAL EMAIL: This email originated from outside of Pitt County Government. Do not click any links or open any attachments unless you trust the sender and know the content is safe. |
I'm not sure about this topic, haven't used gMSA much (plan to when I get some reinforcement).
--
You received this message because you are subscribed to the Google Groups "ntsysadmin" group.
To unsubscribe from this group and stop receiving emails from it, send an email to
ntsysadmin+...@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/1dbf97a1-36f8-49a2-a283-6b7d998cdd08n%40googlegroups.com.
Another thing to consider:
I seem to recall that gMSAs being used for SQL services need SPN setup when accessing another server. The easy way to do this is to allow the account to register its own SPN by granting "Write servicePrincipalName" permission to “Self” on the gMSA itself. This will allow the gMSA to register what it needs. Then reboot the server to see if that helps.
-Aakash Shah
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/d73c4b5ca26e43de9fd9000927012f05%40pittcountync.gov.
I also seem to vaguely recall this being a “Double Hop” problem where you may need to set up Kerberos constrained delegation. I’m not sure about this though but may be something to look into as well, or others may be able to chime in with more information.
-Aakash Shah
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/DM4P221MB15686E485FB6776583A97687F2F8A%40DM4P221MB1568.NAMP221.PROD.OUTLOOK.COM.
Another thing to consider:
I seem to recall that gMSAs being used for SQL services need SPN setup when accessing another server. The easy way to do this is to allow the account to register its own SPN by granting "Write servicePrincipalName" permission to “Self” on the gMSA itself. This will allow the gMSA to register what it needs. Then reboot the server to see if that helps.
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/DM4P221MB15686E485FB6776583A97687F2F8A%40DM4P221MB1568.NAMP221.PROD.OUTLOOK.COM.
We grant the permissions "Read servicePrincipalName" and "Write servicePrincipalName" in the Properties section of Advanced Permissions (it’s about 3/4 way down on the right side for me).
To undo this, you would not only need to remove the permission, but also change/clear any ServicePrincipalNames that may have been automatically registered to the gMSA using either SetSpn.exe or Set-ADServiceAccount in PowerShell.
You could also consider manually adding the SPNs in which case you wouldn’t need to grant this permission.
Here is a MS site that references setting up this permission or adding the SPN manually:
Register a Service Principal Name for Kerberos Connections - SQL Server | Microsoft Learn
Here are 2 third party sites that reference this (I don’t recall where I originally read this information but just came across these):
SQL Server Group Managed Service Account Setup: Preventing SPN Registration Errors
(referenced from the site above)
Configure Managed Service Accounts for SQL Server Always On Availability Groups
-Aakash Shah
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/CAHBr%2B%2BiQ4SDyAD4kciKnMaxwrX6_XaRMUaAQ5Kuou-SyuPqgFw%40mail.gmail.com.