Share via


When to use resource accounts

Applies To: Windows Server 2003 R2

Resource accounts are simply user accounts that are stored in a resource partner forest. What makes a resource account different from a standard user account is that the sole purpose of a resource account is to represent the security context of a single identity that does not originate from the resource forest or from any trusting forests.

Because a federated identity is not created from the resource forest, it does not have a security identifier (SID) that identifies it as a security principal to standard, Windows-based authorization controls (such as access control lists (ACLs)) on servers in the resource forest. Therefore, the federated identity is prevented from gaining access to any Web-based federated resources in the resource partner, such as Windows NT token–based applications, that use ACLs.

Active Directory Federation Services (ADFS) requires a way for a federated identity to correspond or map to an existing security principal that does, in fact, have a SID that represents the resource forest. ADFS uses resource accounts to map federated identities to existing security principals.

ADFS creates a security token using the resource account. It then presents the SID of the resource account to any access control mechanism in the resource partner forest or a trusting forest. At this point—because there is a one-to-one mapping of the federated identity to the resource account—the federated identity can be treated like any other user account by Web server administrators.

Note

A federated identity, in ADFS terms, is known as a federated user.

Consider using the resource account mapping method when:

  • You are deploying a Windows NT token–based application as your federated application, and it requires access control settings.

  • You want to provide more detailed levels of access to sensitive or private data.

    For example, the user AlanSh must have a different set of rights than the rest of the Information Technology (IT) staff. In this case, the fact that a user account is AlanSh is given preference in terms of access rights over the fact that he is a member of the group that represents IT staff so that he can get the allowed level of privilege.

So that federated users can access Windows NT token–based applications, resource accounts must be security principals in Active Directory. You cannot use Active Directory Application Mode (ADAM) user accounts as resource accounts in the resource partner forest. However, you can use ADAM user accounts in the account partner forest. You can create a corresponding resource account in the resource partner forest to represent each ADAM user account.

Note

A resource account is not intended to be accessed directly by the federated user whose user account it represents. Therefore, the federated user does not have to know about the resource account because he or she does not have to log on with this account directly. Also, the password for the resource account does not have to match the password of the federated user account.

Best practices for using resource accounts

The following practices are recommended for using resource accounts to map to a federated user:

  • As a security best practice, add all resource accounts to a security group. Then, add this group to the Deny log on locally and Deny log on through Terminal Services user rights in Group Policy.

    Note

    If a resource account is disabled, resource account mapping will not function because a Windows NT token cannot be created for that account.

  • Create a single organizational unit (OU)—or perhaps one OU per account partner—where you can place all of the resource accounts for a particular partner so that you can more easily manage or delegate administrative control through Group Policy.

  • To prevent possible interruption of service for federated users as a result of password restrictions, configure each account (in the properties of the user account) so that the password never expires. Use the Password never expires setting in Group Policy.

  • To optimize how resource accounts are processed in the resource Federation Service, review the advantages and disadvantages of various resource account options. For more information, see Select the optimal resource account option.

  • To decrease administrative overhead, write your own provisioning software with a claim transformation module to create a resource account automatically, based on the incoming claims. For more information, see Configure a claims transform module.

Comparing resource accounts to resource groups

A single resource account has a one-to-one mapping to a federated user—and only that user. A resource group, however, has a one-to-many mapping scheme. You can use a single resource group to map to one or more federated users that are members of a security group in the account partner forest. For more information about resource groups, see When to use resource groups.

Although both resource account mapping methods provide similar functionality, meaning that both methods provide federated users with a means to access resources without possessing their own resource forest SID, a resource group can usually provide a more well-rounded set of benefits than its resource account counterpart. This is mostly attributable to the amount of administrative resources that you can consume by regularly creating, managing, and pruning individual resource accounts.

As shown in the following illustration, the choice of a correct resource account mapping method for your deployment is important, because it can, over time, severely affect the level of administrative overhead in your organization.

Compare resource accounts to resource groups

Preparing the resource forest for resource accounts

If you decide to use the resource account mapping method, you must make some minor changes to Active Directory. You must also make some minor access control changes to the ADFS-enabled Web server. As shown in the following illustration and described in the following steps, these changes include the following:

  • Adding the appropriate user principal name (UPN) suffixes to the resource forest

  • Creating each resource account using the appropriate UPN suffix

  • Assigning the appropriate permissions to the resource accounts in the Windows NT token–based application

8b2f7155-e26e-4f12-8957-3b1dd025fcd3

Note

No modifications to the account forest are necessary to configure resource account mapping.

1. Add a UPN suffix to the resource forest for each account partner

The first step in successfully routing authentication requests that are sent from federated users in the forest of the account partner organization to Windows NT token–based applications that are hosted on an ADFS-enabled Web server in the forest of the resource partner organization is to add a UPN suffix to the resource partner forest for each account partner forest that contains federated users. For example, if you have two account forests named Adatum.com and Tailspintoys.com and the resource forest is named Treyresearch.net, you add Adatum.com and Tailspintoys.com as UPN suffixes in the Treyresearch.net forest.

For more information about adding a UPN suffix to a forest, see Add user principal name suffixes (https://go.microsoft.com/fwlink/?LinkId=78171).

2. Create the resource accounts using the account partner UPN suffix

After you add a UPN suffix in the resource forest to mirror the UPN suffix of the account forest, you create individual resource accounts and assign the newly added UPN suffix to them. The UPN suffix in the Security Assertion Markup Language (SAML) tokens that are created by the account partner must match the UPN suffix of the associated resource accounts for successful access to federated Windows NT token–based applications. For more information about creating a resource account, see Create a resource account in the resource partner forest.

For example, say that Alan Shen is an employee of A. Datum Corporation. He regularly logs in to the network using his UPN, AlanSh@Adatum.com. The administrator for Trey Research has been given the task of creating a resource account for the AlanSh account. In this example, Adatum.com is the name of the account partner forest, and Treyresearch.net is the name of the resource partner forest. The administrator of Treyresearch.net uses the Active Directory Users and Computers snap-in to create a new user account. In the New Object - User dialog box, he types AlanSh in the User logon name field. He then selects the newly created UPN suffix @adatum.com in the drop-down list and creates the user account.

3. Assign access permissions to the resource accounts

After you create your resource accounts, you configure your Windows NT token–based application on the ADFS-enabled Web server with the appropriate access permissions for those accounts. Depending on the application, you can configure access permissions using standard ACLs or using the authorization controls that are built directly into some Windows NT token–based applications.

For example, if you want to configure an ADFS-enabled Web server to federate a Microsoft® Windows® SharePoint® Services site across organizations, you assign the resource account permissions using the Site Settings link on the Windows SharePoint Services site. For more information about ADFS and Windows SharePoint Services support, see Identify the type of federated application to deploy.