Installing RSCD agents in a replicated domain controller environment
To install RSCD agents in a Windows replicated domain controller environment, you set Domain Controller Security Policies on one domain controller and then install RSCD agents in the correct sequence on all domain controllers. This topic contains the following sections:
Overview of the process
The RSCD installer will create a user named BladeLogicRSCDDC instead of the default BladeLogicRSCD when installing on a domain controller. This is to avoid the possibility that member servers could cause a lockout of the Domain level BladeLogicRSCD account. This is a known issue with certain utilities that run through the RSCD agent, as the utility first tries to authenticate to the domain with the credentials of the user that is running the utility, which in this case is the member server's BladeLogicRSCD account.
The password for the BladeLogicRSCD user or an alternate user of non-domain controller machines is generated at run time. However in the case of a domain controller, the BladeLogicRSCD user or alternate user is assigned a password from a fixed set of passwords. BMC recommends that you change the default password as per your company's password policies. For steps on changing the password, see Changing the BladeLogicRSCDDC account password on domain controllers.
If you want to create a single account for each domain controller (instead of the default single account for all domain controllers), or if you want to use an alternate account name that differs from the default BladeLogicRSCDDC, you can perform the procedure described in this topic.
Before you begin
During RSCD agent installation, you map a client user to a local user on the target server. Make sure that the local user to which you are mapping is a direct member of the Builtin\Administrators group and you do not map to the BladeLogicRSCD account.
Preparing an alternate user name for the agents in the Windows system
If using an alternate user name for the RSCD agent, limit the length of the user name to a maximum of 20 characters. By design, the agent fails to create the account if you use more than 20 characters. The account will be created during the RSCD service startup.
Installing RSCD agents in a replicated domain controller environment with the default, alternate, or per-server account name
BladelogicRSCDDC user account (or any other equivalent account that you use for running the agent in the domain):On a domain controller, perform the following steps to set Domain Controller Security Policies for the
- Start the Group Policy Management Console (GPMC).
- In the GPMC console tree, right-click Default Domain Controllers Policy, and then click Edit.
- In the Group Policy Management Editor window, in the console tree, go to Computer Configuration/Policies/Windows Settings/Security Settings/Local Policies/User Rights Assignment.
In the details pane, double-click Deny logon locally.
Ensure that the Define these policy settings check box is selected, and then click Add User or Group.
Type the name of the account that you want to deny the ability to log on locally (BladelogicRSCDDC or any other equivalent account that you use for running the agent in the domain). As an alternative, click Browse to locate the account with the Select Users, Computers, or Groups dialog box, and then click OK.
After you have the account name entered, click OK in the Add User or Group dialog box, and then click OK in the Deny Log on Locally Properties dialog box.
Repeat for User Right Log on as a batch job.
If Domain Controller Security Policies are not set to defined, as described in step 1, the RSCD agent creates Local Security Policies instead. In this situation, you must manually set the Domain Controller Security Policies to continue.
If you use a unique account name per domain controller, each account name must be present in the above policies.
- Continue with the relevant task:
Installing with the default account
Install the RSCD agent on the PDC emulator.Click here for installation instructions
This example uses TrueSight Server Automation version 8.9.03; however, the process is applicable to all versions 8.9.03 and later.
Step Example screen 1
- Extract the BSA89-SP3-RSCDAgents.zip file that you downloaded from the EPD website to obtain the rscd folder. Different installers are provided for 32-bit and 64-bit Windows. (Installation program names follow the convention: RSCDversion-platform.)
- Navigate to the windows_64 folder, which is inside the rscd folder, and run the BSA89-SP3-WIN64 installer file.
Note: if you have installed the PXE/TFTP server on a Linux machine, you need to navigate to the appropriate Linux RSCD installer file in the rscd folder.
- Click Run.
The installation wizard is displayed.
TrueSight Server Automation 8.9.03 uses BSA<version_number>-RSCDAgents.zip file.
- Accept the license agreement, and click Next.
The Installation Type panel is displayed.
- Select the Typical option for installation, to use the default installation location for the RSCD agent, log files, security preferences, and logging.
- The Custom installation is used when you want to change the default settings.
- Click Next.
Click Install to begin the RSCD agent installation.
NEW IN 8.9.02The installer checks whether Microsoft Visual C++ 2015 Redistributable Update 3 is installed on the server. If this is not installed, the installation program aborts installation with an error message.
You can select the Show the Windows Installer log option to view a detailed report of the installation process.
Click Finish to exit the wizard.
- The account will be created on agent startup. After the default account is created, force replication from Active Directory Sites and Services to the other domain controllers.
- Install the RSCD agent on the other domain controllers.
Installing or modifying an existing installation with an alternate or per-server account
If the RSCD agent is already installed and running on the target Domain controller(s), stop the RSCD service (see Starting and stopping the RSCD agent).
On the PDC emulator in the domain, add (if this is a fresh installation) or modify (pre-existing installation) the registry value HKEY_LOCAL_MACHINE\SOFTWARE\BladeLogic\RSCD Agent\BladelogicRSCDUser. The registry value should be of type REG_SZ (string value), and be set to the desired account name.
- If you will be using the same account name on other domain controllers in the domain, complete the following steps:
- On the other domain controllers in the domain, add or modify the same registry value and use the same account name as on the PDC emulator.
- Install the RSCD agent or start the RSCD service on the PDC emulator.
- After the service has started and the service account exists, force replication to the other domain controllers from the Active Directory Sites and Services menu.
- Install or start the the RSCD agent on the other domain controllers.
- If you will use a unique account name for each domain controller, complete the following steps:
- On the other domain controllers in the domain, add or modify the same registry value and use the unique account name.
- Install or start the RSCD agent on each domain controller after making the registry change (there is no concern about replication or order here as each system gets its own account).
- If the RSCD does not fully start, even though the User Rights have been set and allowed to replicate, you may need to reset the BladelogicRSCDDC account, as follows:
- Stop the TrueSight Server Automation RSCD Agent service on all domain controllers.
- On the PDC, delete the BladelogicRSCDDC user.
- Wait for (or force) replication.
- Start the TrueSight Server Automation RSCD Agent service on the PDC.
- Check the rscd.log file.
- If it is error free, you can start the TrueSight Server Automation RSCD Agent on the other domain controllers.
- Windows Domain Controllers have no local users. To set up user privilege mapping on Windows Domain Controllers, map users to a member of a first-level group, such as BuiltIn\Administrators. The mapped user cannot receive administrative privileges via a group within another group. For example, if the mapped account is in Domain Admins and Domain Admins is in BuiltIn\Administrators, the mapping will not work. The default UPM mapping cannot traverse multiple groups. For details about user privilege mapping, see Impersonation and privilege mapping.
- If you change the password in a domain environment, and then subsequently need to install an RSCD agent on another domain controller in the same domain, use the
agentctlutility to set the password on the new domain controller. For more information, see Changing the BladeLogicRSCDDC account password on domain controllers.