TABLE OF CONTENTS
Active Directory Account Creation Policy
Effective March 1, 2021, you must use the AD Management tool to create AD accounts.
Active Directory Account Policy
Account Types
Account Type | Account Purpose | Naming Scheme | Password Requirements | Account Ownership |
---|---|---|---|---|
User Accounts |
|
|
|
|
Privileged Accounts (-sa) |
|
|
|
|
AD Accounts (-ad) |
|
|
|
|
Service Accounts |
|
|
|
|
Managed Service Accounts |
|
|
|
|
Test Accounts |
|
|
|
|
Account Creation
All account creation must go through IDM
Although technical controls are not in place to limit people from creating accounts, this can be determined retroactively.
All accounts created by staff outside of IDM will be deactivated immediately.
IDM will provide a web-based tool to request new accounts.
For the time being, requests should be made by email to help@lbl.gov.
Details to follow
Enforcement
Accounts found not adhering to the above requirements are subject to immediate deactivation. In some cases the deactivation is automated and occurs on an ongoing basis.
Accounts found with non-expiring passwords will immediately have that setting removed. There is no notification for this process.
Active Directory Class Object Management Policy
User Object Policy
This manual action is performed by LBL Help Desk personnel.
Upon notification of employee termination - The User object is immediately disabled.
User objects will be automatically disabled after 180 days of inactivity.
180 days after the User object is disabled it is moved to the Aged_Accounts OU.
This automated action is managed by LBL Active Directory domain administration.
Computer Object Policy
Upon retirement of ODS PCs - The Computer object is deleted from the LBL domain.
This manual action is performed by LBL Active Directory domain administration.
180 days after a Computer object has last communicated with the LBL Active Directory it is disabled and moved to the Aged_Accounts OU .
This automated action is managed by LBL Active Directory domain administration.
- Contingency for Class Object Policy
For objects where no notification of employee termination exits - The object is automatically disabled (after 365 days of non use) and moved to the Aged_Accounts OU.
This automated action is performed by LBL Active Directory domain administration.
For Computer Objects that were not actively retired. 365 days after the Computer object is disabled it is deleted from the LBL Active Directory.
- Contingency for Class Object Policy
This action is performed by LBL Active Directory domain administration.
Active Directory Base Object Creation Policy
User Object Creation Policy
- The User Object name must be unique within the LBL domain. The AD User Object name should match the employees Berkeley Lab Identity account name.
- On occasions where an employee returns to LBL and they no longer have an AD User Object one can be created for them by creating a "Help Ticket" for the LBL Help Desk.
Computer Object Creation Policy
- The LBL forest consists of a single domain, and all computer accounts in the same domain must have a unique name. A computer name cannot be used if it has already been assigned to another computer in the LBL domain.
- Computer Objects should not be created before adding a Computer to the LBL AD as this is not always a reliable way to perform this action.
- Computers and therefore Computer Objects may be added to the LBL AD by any valid User Object (up to a limit of 10 Computer Objects).
- Computer addition in excess of 10 Objects requires user membership in the "AddComputers" AD security group.
Computer Objects should follow the proper naming convention.