Creating a PKIaaS WSTEP Service Account

Create a PKIaaS WSTEP service account for the PKIaaS WSTEP agent and PKIaaS WSTEP server to authenticate all incoming requests from WSTEP clients.

Each root domain in the Active Directory forest requires a separate PKIaaS WSTEP service account, as each Active Directory forest must be configured separately.

To create a PKIaaS WSTEP Service Account

  1. Log into a domain controller of the Active Directory forest's root domain as a user who is a member of both the Domain Admins and Enterprise Admins groups..

    The service account created for the PKIaaS Virtual Machine must have read permissions on certificate templates, user objects, and computer objects in LDAP.

  2. Select Start > Windows Administrative Tools > Active Directory Users and Computers to open the Active Directory Users and Computers dialog box.

    images/download/attachments/232241488/Kerberos_Service_Account_01_Active_Directory_Users_and_Computers-version-1-modificationdate-1701156741362-api-v2.png
  3. Right-click the folder where you want to create the new account

  4. Select New > User to open the New Object – User dialog box.

    images/download/attachments/232241488/Kerberos_Service_Account_02_New_User_name-version-1-modificationdate-1701156741391-api-v2.png
  5. Enter the First name, Last name, and Full name for the new user account.

  6. Enter a Windows User logon name for the user account. Optionally, enter a User logon name (pre-Windows 2000) for pre-Windows 2000 computers.

  7. Click Next to display the password options.

    images/download/attachments/232241488/Kerberos_Service_Account_03_New_User_password-version-1-modificationdate-1701156741434-api-v2.png
  8. Enter a Password for the user account.

  9. Enter the password again in the Confirm password field.

  10. Deselect User must change password at next logon.

  11. Click Next to display the confirmation dialog.

    images/download/attachments/232241488/image-2024-1-26_11-11-52-version-1-modificationdate-1706245912265-api-v2.png
  12. Record the user logon name of the account. You will use this logon name later to add a Service Principal Name (SPN) mapping for Kerberos.

  13. Click Finish.

  14. Double-click the account you just created to display the properties dialog box.

    images/download/attachments/232241488/image-2024-3-1_16-14-48-version-1-modificationdate-1709288089089-api-v2.png
  15. In the Account tab, check the following boxes under Account options:

    • This account supports Kerberos AES 128 bit encryption.

    • This account supports Kerberos AES 256 bit encryption.

  16. Click OK.