Samer,
The reason you are getting lock outs is because any logged in session has to renew it's Kerberos Ticket Granting Ticket (TGT) periodically. If the account password is changed, the TGT cannot be renewed and must be reissued. When the session requests a new TGT it uses the users long term key, which is no longer valid because the password was changed. This is identified as a failed authentication attempt and after several retries will lock the account.
There are ways to fix this by changing the expiration on the Kerberos tickets, but I would highly recommend not doing that to resolve this issue unless you really understand what your doing.
Fortunately this is a common issue for our customers that is easily resolved via group policy. Here are GPO settings we recommend for any Windows servers that you will access via PAM:
- GPO-Set time limit for disconnected sessions
- Enabled
- 3hrs
- GPO-Set time limit for active but idle Remote Desktop Sessions
- Enabled
- 3hrs
Obviously you will want to adjust for your environment, however the critical one for your issue is #1. This causes disconnected sessions to be logged out after 3 hours (or whatever value you set). This prevents a disconnected session from trying to renew the TGT and causing a lockout.
Original Message:
Sent: Sep 06, 2022 10:22 AM
From: Syed Khan
Subject: Privileged Accounts in AD getting Locked
Privileged Accounts are in Active Directory that are mainly used for RDP to servers. The Password View Policy is to "Change Password on Session End". Some Admins do not logout from servers (they just close the session) but they logout from PAM so the password for the Privileged Account is changed in AD. This is causing the Privileged Account to be locked out in AD as some server/s have the old password. Any best practice or suggestion to avoid this problem?
Thanks in advance.