What are some reasons not to install DRA 8.x versions on a domain controller?
Is it recommended or 'best practice' to install DRA 8.x versions on domain controllers?
If DRA 8.x versions are installed on domain controllers as opposed to member servers, one specific item to note is that the ADAM service (instance) will run under the credentials of the Network Service account instead of the DRA service account.
There is a Microsoft Technet article that recommends to run ADAM under an AD account that does not have administrative priviledges in that situation.
To help maintain ADAM replication security, the following best practices are recommended:
- Use the highest level of replication security that your environment can support.
- In Active Directory environments, run ADAM on member servers, rather than on domain controllers, whenever possible.
- If you run ADAM on a domain controller in an Active Directory environment, do not use the Network Service account as the ADAM service account. Instead, use a domain user account that does not have administrative privileges.
- In workgroup and Windows NT 4.0 environments, do not use an account with administrative privileges as an ADAM service account.
- Use separate configuration sets for applications with strict isolation requirements.
See the Microsoft article below for general advice on installing applications on domain controllers. While it can be done, even Microsoft recommends for security and performance that additional applications on domain controllers be avoided. This would apply to most any software (Security Protection, Management, Backup, etc.) which would include DRA.