Overview
Just-in-Time (JIT) Accounts in Active Directory (AD) can be configured to include custom security groups. This allows you to specify additional group memberships for JIT accounts, ensuring they have the appropriate access when created or enabled.
Note: This guide applies to on-premise Active Directory (AD) only. Support for custom security groups on Entra/M365 will be available in a future updates.
Defining Custom Security Groups in a JIT Policy
To define custom security groups, follow these steps:
-
Navigate to Settings > Just-in-Time Accounts.
-
You can either create a new AD policy or update an existing one to include custom security groups.
Creating a New Policy with Custom Groups
-
Click on + New Policy.
- Define the name, description, access, duration options, and built in groups as needed.
-
Next go to the Custom Security Groups section.
-
Click on + Add Custom Group.
-
Enter the names of the custom security groups.
-
Separate multiple group names with line breaks.
-
-
Click + Add to submit the groups.
-
Click on the trash icon to remove any unwanted groups.
-
Save the policy.
Updating an Existing AD Policy to Add Custom Groups
-
Locate and click Edit on the existing AD policy you want to modify.
-
In the policy form, navigate to the Custom Security Groups section.
-
Click on + Add Custom Group.
-
Enter the names of the custom security groups, using line breaks to separate multiple names.
-
Click + Add to submit the groups.
-
Use the trash icon to remove any unwanted groups.
-
Save the updated policy.
Effect of Custom Security Groups on JIT Accounts
-
Any JIT account enabled or created under this policy will automatically be added to the specified custom security groups, provided they exist in the domain.
-
If a specified custom group does not exist in the domain, it will be ignored, and the JIT account will still be created or enabled with any other built-in or custom groups defined in the policy.
By leveraging custom security groups, you can tailor JIT account permissions to better fit your organization's security and access control requirements.
Comments
0 comments
Please sign in to leave a comment.