Prior to deployment of a DVLS instance, some accounts are needed to operate the various services involved in a secure deployment of DVLS. The first decision is to use either domain accounts for operating the platform, or to use local SQL accounts paired with local service accounts. Since this decision is a matter of personal preference, we support both models.
The names used in this guide are to ease comprehension of the role fulfilled by the account. Our documentation uses these names as well, but there is no requirement that you use them.
Please choose the appropriate section
- Domain Based Operation
- Non-Domain Based Operation or Azure SQL environment
Domain Based Operation (Integrated Security option)
The Administration Credentials needs full read permissions on the AD structure, but does NOT perform any changes to your directory. Sadly, because of a side effect of how thenet Directory Services are built, there is an issue when that account tries to read properties of AD groups that may reside in a protected area of your directory. The easiest fix was to grant full admin permissions, but we are looking into implementing a better fallback strategy to handle the case where access is denied. Some members of our community have had success by adding the VaultADReader account to the AD Account Operator group.
# | Name | Origin | Description | Set in... |
---|---|---|---|---|
1 | VaultOwner | AD | Account with full privileges on the DB. | Interactive Windows session used to run the installation/upgrade of a DVLS instance. |
2 | VaultRunner | AD | Least-privileged account to run the web application. Used to connect to the DB, and to read from the file system. | IIS Application pools that are running a DVLS Instance. |
3 | VaultADReader | AD | Least-privileged account to query the AD. | DVLS Instance Settings - Administration credentials. |
4 | VaultSchedulerService | AD | Least-privileged account to operate the scheduler service. Used to connect to the DB, and to read/write from the file system. | Windows Service Control Manager. |
Non-Domain Based Operation or Azure SQL environment
On a non-domain based deployment, a single connection string is used for three different aspects of the system. This will be improved in a future release in order to respect the least-privilege principle.
For Azure SQL hosted database, domain based operation (Integrated Security option) is not supported.
# | Name | Origin | Description | Set in... |
---|---|---|---|---|
1 | VaultOwner | SQL | Account with full privileges on the DB. | The DVLS.Console only for installation/upgrade sessions. |
2 | VaultRunner | SQL | Least-privileged account to run the web application. | The DVLS.Console for operation of the instance. |
3 | VaultADReader | AD | Least-privileged account to query the AD through LDAP. | DVLS Instance Settings - Administration credentials. |
4 | VaultSchedulerService | SQL | Least-privileged account to operate the scheduler service. Used to read/write from the file system. | Windows Service Control Manager. The database access will be performed by the single ConnectionString that is the subject of the informational note above. |