Overview
Regardless of the Active Directory option you choose, CAS will create several objects in the Active Directory domain in order to manage the deployment:
One root-level organizational unit (OU) for storing AD objects created by CAS
Security groups for mapping users to resources (Collection Pools)
Service accounts for performing various Active Directory management functions
Administrator accounts for CAS users with Editor or Owner rights on the deployment
Group Policy Objects (GPOs) that are assigned to the OUs (and sub-OUs) created by CAS; the GPOs control specific features and configurations in the RDS environment
Organizational Units
Active Directory is a hierarchical directory system that allows administrators to create a structure of cascading sub-objects for security and logical organization. The security hierarchy consists of the AD forest, domains, and security groups; the logical hierarchy consists of AD sites, container objects, and groups.
The most common container object type is an organizational unit (OU). OUs allow administrators to arrange objects in a way that resembles the organization's structure in managerial or geographical terms, or with whatever other criteria is necessary.
CAS deploys one organizational unit (OU) in the root of the AD domain and creates a sub-OU structure beneath this OU. The root OU is named based on the deployment code and deployment name in the CAS console and contains computer accounts, security groups, and end-user accounts as provisioned in the CAS console.
NOTE: CAS deployments created before August 2021 may contain an additional root-level OU named Admin Accounts. In new deployments, this OU has been moved underneath the Deployment OU. |
Group Policy Objects
In Active Directory, group policy objects (GPOs) are used to define and enforce various settings on computers and user accounts in the domain. GPOs can define security controls, settings for the operating system and supported software, and user experience customizations.
In each deployment, CAS creates a set of GPOs that define various settings for the RDS environment; these GPOs are assigned only to the OUs and sub-OUs created by CAS and only affect the resources created by CAS. When certain settings are configured in CAS, CAS may link or unlink GPOs to the appropriate OU to enforce those settings on the resources in the deployment.
You can create additional GPOs in your Active Directory environment to enforce certain settings in the RDS environment as long as the settings do not interfere with RDS functionality. For example, certain GPOs that enforce very strict security parameters may disrupt CAS management connectivity or end-user authentication. Any manual changes to the RDS environment should be performed in a controlled manner, with each individual change being fully tested before being applied to the production environment.
It is not supported to manually edit the GPOs created by CAS; while it may be possible to do so, CAS is unaware of any modifications and this may result in unintended consequences when CAS links or unlinks GPOs as part of regular administration.
Service Accounts
When creating and managing an RDS deployment, itopia CAS provisions a set of service accounts within the AD domain. These accounts are used to perform various administrative functions within the operating system (OS), AD domain, and the RDS environment. These accounts, referred to as itoadmin accounts, are created in the default “Users” container of the Active Directory (AD) domain in each CAS deployment.
The service accounts are programmatically generated and used by the itopia Proxy Execution Service (PES) using the unique deployment key stored in Google Cloud KMS (see this section for more details). The accounts' credentials are encrypted and periodically rotated in accordance with itopia's Key Vault design.
Service Account Details
In any CAS deployment regardless of the domain type, CAS creates 6 (six) service accounts which are granted scoped permissions and are used to perform various administrative functions. These accounts differ slightly in deployments that use Managed Microsoft AD due to the modified structure of built-in permissions in those environments.
The table below provides the function and privileges of each itoadmin service account.
Name | Function | AD DS Privileges | Managed Microsoft AD Privileges |
itoadmin | This account is used to create the deployment and subsequent itoadmin accounts that are used for the automation and orchestration from the point they are created. Before the deployment process is completed this account is disabled and not used again by CAS. Once the deployment is created, customers can delete it from AD if they choose to. | Membership in the Domain Admins group
| Not Used |
miadmin | Created by default by the Google Managed AD service. This account is used to create all the other itoadmin accounts and configure the Bastion VM. This account is built into Managed Microsoft AD and cannot be deleted. | Not Used | Membership in the Cloud Service Administrators group |
itoadmin01 | RDS administration tasks: creating and managing RDS Collections, configuring the RD Broker, adding RD Session Hosts and controlling autoscale functions. | Membership in the local Administrators group on all RDS servers (RD Broker, RD Gateway, RD Session Host, RD Web Access) | Membership in the local Administrators group on all RDS servers (RD Broker, RD Gateway, RD Session Host, RD Web Access) |
itoadmin02 | AD object administration. Creation, management, and deletion of user and group objects as well as linking GPOs. | Delegated read/write permissions to the Deployment OU (e.g. OU=XYZ-Deployment-Name,DC=contoso,DC=com) | Membership in the Cloud Service Administrators group |
itoadmin03 | Domain-related functions: Joining and unjoining servers, creating GPOs | Membership in the Domain Admins group | Membership in the Cloud Service Administrators group |
itoadmin04 | Used for AD Site topology management | Membership in the Enterprise Admins Group | Membership in the Cloud Service Administrators group |
itoadmin05 | Performs most tasks related to server-level management: Restarting servers, managing file shares, health and configuration checks, configuring Windows Roles and Features. | Membership in the local Administrators group on all member servers (RDS servers, file servers, application servers created/imported in CAS) | Membership in the local Administrators group on all member servers (RDS servers, file servers, application servers created/imported in CAS) |