Active Directory
Learn how to configure Active Directory access through KMS PAM for secure, audited management of your AD domain controllers and domain-joined resources.
KMS PAM supports secure management of Active Directory (AD) domain controllers. An AD Server resource represents a domain controller and serves as the central point for managing domain-joined Windows servers, enabling you to organize your infrastructure by domain.
How It Works
An Active Directory resource in KMS PAM represents a domain controller and acts as the organizational hub for domain-joined machines. Windows Server resources can be linked to an AD resource to indicate they belong to that domain. When a user needs to access domain resources, they navigate to an AD account and select from the list of related Windows servers that are joined to the domain.
flowchart LR
AD[AD Server Resource<br/>corp.example.com]
WS1[Windows Server<br/>web-server-01]
WS2[Windows Server<br/>db-server-01]
WS3[Windows Server<br/>app-server-01]
ACC[AD Account<br/>domain-admin]
WS1 -->|domain joined| AD
WS2 -->|domain joined| AD
WS3 -->|domain joined| AD
ACC -->|belongs to| AD
ACC -.->|access via| WS1
ACC -.->|access via| WS2
ACC -.->|access via| WS3Key Concepts
- Domain Controller: The AD Server resource represents your domain controller. It stores the domain name, DC address, and serves as the parent for domain-joined resources and domain accounts.
- Domain Join: Windows Server resources can be associated with an AD Server resource to indicate they are part of that Active Directory domain. This enables you to view all domain-joined servers from the AD resource's Related Resources tab.
- Related Resources: From an AD account's detail page, users can see all Windows servers joined to the domain. This provides a clear view of which machines are accessible with domain credentials.
- Account Types: AD accounts can be categorized as either User accounts or Service accounts, allowing you to organize and manage different types of domain credentials.
Prerequisites
Before configuring Active Directory access in KMS PAM, you need:
- KMS Gateway - A Gateway deployed in your network with access to the AD domain controller
- LDAP Access - The domain controller must be reachable on the LDAP port (default: 389)
- Domain Credentials - A username and password for an Active Directory account
Gateway Required: Active Directory access requires an KMS Gateway to be deployed and registered with your Hanzo KMS instance. The Gateway must have network connectivity to your domain controller on the LDAP port (default: 389).
Create the PAM Resource
The PAM Resource represents the Active Directory domain controller you want to manage.
Before creating the resource, ensure you have an KMS Gateway running and registered with your Hanzo KMS instance. The Gateway must have network access to your AD domain controller.
- Navigate to your PAM project and go to the Resources tab
- Click Add Resource and select Active Directory
- Fill in the connection details:
A friendly name for this resource (e.g., corp-dc, prod-domain-controller)
Select the Gateway that has network access to this domain controller
The Active Directory domain name (e.g., corp.example.com)
The hostname or IP address of the domain controller (e.g., 10.0.1.10 or dc.corp.example.com)
The LDAP port (default: 389)
Clicking Create Resource will trigger a connection test from the selected Gateway to your domain controller. Hanzo KMS verifies that the server is reachable and responds to LDAP requests.
Create PAM Accounts
A PAM Account represents a specific Active Directory user account in the domain. You can create multiple accounts per resource with different permission levels.
After creating the resource, click into it to open the resource detail view. Select the Accounts tab on the right.
Click Add Account.
Fill in the account details:
A friendly name for this account (e.g., domain-admin, svc-deploy)
Select the type of AD account:
- User Account - A standard Active Directory user account
- Service Account - An Active Directory service account
The Active Directory username (e.g., admin or svc-deploy). Credentials are validated using UPN format (username@domain) against the domain controller.
The Active Directory password for this user
Clicking Create Account will validate the credentials by performing an LDAP bind against the domain controller through the Gateway.
Domain Join (Related Resources)
Active Directory resources support linking Windows Server resources to represent domain membership. This allows you to see all servers that belong to a particular AD domain from a single view.
Joining a Windows Server to a Domain
When creating or editing a Windows Server resource, you can select an Active Directory Domain from the dropdown. This associates the Windows server with the AD domain controller, indicating that it is a domain-joined machine.
Viewing Related Resources
Once Windows servers are associated with an AD resource, you can view them from the AD resource's detail page:
- Navigate to the Active Directory resource
- Select the Related Resources tab (next to the Accounts tab)
- All Windows servers (and other resources) joined to this domain are listed here
This provides a centralized view of your domain infrastructure, making it easy to understand which servers belong to which domain.
How is this guide?
Last updated on