BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.com//bsides-limburg//speaker//3HBHSS
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-bsides-limburg-FTJVLF@pretalx.com
DTSTART;TZID=CET:20260313T113000
DTEND;TZID=CET:20260313T123000
DESCRIPTION:Throughout the years\, Microsoft has developed 3 different vers
 ions of Managed Service Accounts\, and all with the goal of improving pass
 word security and management. While the first attempt of “Managed Servic
 e Accounts (MSAs)” (introduced in Windows Server 2008 R2) was a good sta
 rt\, it was very limited. The next reincarnation\, “Group Managed Servic
 e Accounts (gMSAs)” (introduced in Windows Server 2012) removed the bigg
 est limitation and allowed a gMSA to be used across multiple servers. Whil
 e gMSAs were easier to adopt\, there are still a few “gotchas”. An app
 lication must support the use of a gMSA and/or the migration of a regular 
 service user account to a gMSA could be a (very) complex and cumbersome ex
 ercise. With the next reincarnation\, “Delegated Managed Service Account
 s (dMSAs)” (introduced in Windows Server 2025)\, removed the previously 
 mentioned gotchas. No more gotchas to deal with. Right?
DTSTAMP:20260501T095827Z
LOCATION:Main Stage
SUMMARY:Demystifying Managed Service Accounts: Unveiling Best Practices And
  Security Measures To Reduce Risk And Impact - Jorge de Almeida Pinto
URL:https://pretalx.com/bsides-limburg/talk/FTJVLF/
END:VEVENT
END:VCALENDAR
