How to set gMSA account in physical path credentials property

michal kavi rajan 6 Reputation points
2021-12-04T03:09:07.003+00:00

Trying to setup classic ASP application in IIS 10. Anonymous Authentication is disabled. Windows Authentication is enabled. This application is currently running using normal service account. Wanted to change it to gMSA account for better password mangement.

As the application is using windows based authentication, the service account is configured for IIS app pool and physical path property for the SQL connection from application to work.

I am able to configure gMSA account for app pool without password. However while setting the gMSA account in physical path property getting error as password is invalid , invalid user id.

Is it possible to use gMSA account for IIS physical path property?
If Yes, how to set it up?

Internet Information Services
{count} vote

2 answers

Sort by: Most helpful
  1. Bruce (SqlWork.com) 56,851 Reputation points
    2021-12-04T18:08:13.577+00:00

  2. Brian Webb-xa 0 Reputation points
    2024-03-08T23:01:41+00:00

    Just posting this here in case anyone else runs into this issue. Within IIS, gMSAs are only allowed to run as app pool identities. It's stated in their documentation:

    With Windows Server 2012, services or service administrators do not need to manage password synchronization between service instances when using group Managed Service Accounts (gMSA). You provision the gMSA in AD and then configure the service which supports Managed Service Accounts. Use of the gMSA is scoped to any machine that is able to use LDAP to retrieve the gMSA's credentials. You can provision a gMSA using the *-ADServiceAccount cmdlets which are part of the Active Directory module. Service identity configuration on the host is supported by:

    • Same APIs as sMSA, so products which support sMSA will support gMSA
    • Services which use Service Control Manager to configure logon identity
    • Services which use the IIS manager for application pools to configure identity
    • Tasks using Task Scheduler.

    https://learn.microsoft.com/en-us/windows-server/security/group-managed-service-accounts/getting-started-with-group-managed-service-accounts#BKMK_Intro

    0 comments No comments