banner



How To Create Service Account In Windows 8

This page explains how to create and manage service accounts using the Identity and Access Management (IAM) API, the Google Cloud console, and the gcloud command- line tool.

Past default, each project tin can have up to 100 service accounts that control access to your resource. Y'all tin request a quota increase if necessary. Learn more about quotas and limits.

Before yous begin

  • Enable the IAM API.

    Enable the API

  • Understand IAM service accounts

  • Install the Google Deject CLI

Required roles

To get the permissions that you demand to manage service accounts, ask your administrator to grant you lot the post-obit IAM roles on the project:

  • To view service accounts and service account metadata: View Service Accounts (roles/iam.serviceAccountViewer)
  • To view and create service accounts: Create Service Accounts (roles/iam.serviceAccountCreator)
  • To view and delete service accounts: Delete Service Accounts (roles/iam.serviceAccountDeleter)
  • To fully manage (view, create, update, disable, enable, delete, undelete, and manage access to) service accounts: Service Account Admin (roles/iam.serviceAccountAdmin)

For more data nearly granting roles, come across Manage admission.

To larn more about these roles, see Service Accounts roles.

IAM basic roles also comprise permissions to manage service accounts. You should not grant basic roles in a product environment, just you can grant them in a evolution or test environment.

Creating a service business relationship

When yous create a service account, you must provide an alphanumeric ID ( SA_NAME in the samples beneath), such as my-service-business relationship. The ID must exist between 6 and 30 characters, and can contain lowercase alphanumeric characters and dashes. After y'all create a service business relationship, you cannot change its name.

The service account's name appears in the e-mail address that is provisioned during creation, in the format SA_NAME@PROJECT_ID.iam.gserviceaccount.com.

Each service account also has a permanent, unique numeric ID, which is generated automatically.

You likewise provide the following information when you create a service account:

  • SA_DESCRIPTION is an optional description for the service account.
  • SA_DISPLAY_NAME is a friendly proper noun for the service account.
  • PROJECT_ID is the ID of your Google Cloud project.

Subsequently you lot create a service account, you lot might demand to wait for 60 seconds or more before y'all employ the service account. If y'all try to apply a service account immediately later on you create it, and you receive an error, y'all can retry the asking with exponential backoff.

Console

  1. In the Cloud panel, go to the Create service business relationship folio.

    Get to Create service account

  2. Select a Cloud project.

  3. Enter a service business relationship proper noun to brandish in the Cloud panel.

    The Cloud console generates a service business relationship ID based on this name. Edit the ID if necessary. Y'all cannot change the ID afterward.

  4. Optional: Enter a description of the service account.

  5. If yous do not desire to ready access controls now, click Done to finish creating the service account.

    To set up admission controls at present, click Create and keep and go on to the next stride.

  6. Optional: Cull ane or more IAM roles to grant to the service account on the project.

  7. When you are done adding roles, click Continue.

  8. Optional: In the Service business relationship users function field, add members that can impersonate the service account.

  9. Optional: In the Service account admins role field, add together members that can manage the service account.

  10. Click Done to end creating the service account.

gcloud

  1. To create the service business relationship, run the gcloud iam service-accounts create command:

    gcloud iam service-accounts create                  SERVICE_ACCOUNT_ID                  \     --clarification="DESCRIPTION" \     --display-name="DISPLAY_NAME"                

    Replace the following values:

    • SERVICE_ACCOUNT_ID : the ID for the service business relationship
    • DESCRIPTION : an optional description of the service account
    • DISPLAY_NAME : a service business relationship name to display in the Cloud console
  2. Optional: To grant your service business relationship an IAM office on your projection, run the gcloud projects add together-iam-policy-binding command:

    gcloud projects add together-iam-policy-binding                  PROJECT_ID                  \     --member="serviceAccount:SERVICE_ACCOUNT_ID@PROJECT_ID.iam.gserviceaccount.com" \     --office="ROLE_NAME"                

    Replace the following values:

    • PROJECT_ID : the project ID
    • SERVICE_ACCOUNT_ID : the service account ID
    • ROLE_NAME : a role name, such as roles/compute.osLogin
  3. Optional: To allow users to impersonate the service business relationship, run the gcloud iam service-accounts add-iam-policy-binding command to grant a user the Service Business relationship User role (roles/iam.serviceAccountUser) on the service business relationship:

    gcloud iam service-accounts add-iam-policy-binding \                  SERVICE_ACCOUNT_ID@PROJECT_ID.iam.gserviceaccount.com \     --fellow member="user:USER_EMAIL" \     --role="roles/iam.serviceAccountUser"                

    Replace the following values:

    • PROJECT_ID : the project ID
    • SERVICE_ACCOUNT_ID : the service account ID
    • USER_EMAIL : the e-mail accost for the user

REST

The serviceAccounts.create method creates a service account.

Before using whatsoever of the request data, make the following replacements:

  • PROJECT_ID : Your Google Cloud projection ID. Projection IDs are alphanumeric strings, like my-project.
  • SA_NAME : The alphanumeric ID of your service account. This proper noun must be between 6 and 30 characters, and can incorporate lowercase alphanumeric characters and dashes.
  • SA_DESCRIPTION : Optional. A description for the service account.
  • SA_DISPLAY_NAME : A homo-readable proper noun for the service account.

HTTP method and URL:

POST https://iam.googleapis.com/v1/projects/PROJECT_ID/serviceAccounts

Asking JSON trunk:

{   "accountId": "SA_NAME",   "serviceAccount": {     "description": "SA_DESCRIPTION",     "displayName": "SA_DISPLAY_NAME"   } }              

To send your request, expand one of these options:

You should receive a JSON response similar to the following:

{   "name": "projects/my-project/serviceAccounts/my-service-account@my-project.iam.gserviceaccount.com",   "projectId": "my-project",   "uniqueId": "123456789012345678901",   "email": "my-service-account@my-project.iam.gserviceaccount.com",   "displayName": "My service business relationship",   "etag": "BwUp3rVlzes=",   "description": "A service account for running jobs in my project",   "oauth2ClientId": "987654321098765432109" }              

C++

To learn how to install and use the client library for IAM, see IAM client libraries. For more data, see the IAM C++ API reference documentation.

C#

To learn how to install and use the client library for IAM, run across IAM customer libraries. For more information, run across the IAM C# API reference documentation.

Go

To learn how to install and use the client library for IAM, see IAM client libraries. For more data, come across the IAM Go API reference documentation.

Coffee

To learn how to install and use the client library for IAM, come across IAM client libraries. For more than information, run into the IAM Java API reference documentation.

Python

To learn how to install and utilize the client library for IAM, see IAM customer libraries. For more information, see the IAM Python API reference documentation.

After you create a service account, grant one or more than roles to the service business relationship so that it can act on your behalf.

Likewise, if the service account needs to admission resource in other projects, you commonly must enable the APIs for those resources in the project where you created the service business relationship.

Listing service accounts

You lot can list your service accounts to help yous audit service accounts and keys, or as part of a custom tool for managing service accounts.

Panel

  1. In the Cloud console, go to the Service accounts folio.

    Go to Service accounts

  2. Select a project.

    The Service accounts page lists all of the user-managed service accounts in the project you selected. The folio does not list Google-managed service accounts.

gcloud

Execute the gcloud iam service-accounts list command to list all service accounts in a project.

Command:

              gcloud iam service-accounts list                          

The output is the listing of all service accounts in the project:

Proper noun                    E-mail              SA_DISPLAY_NAME_1              SA_NAME_1@PROJECT_ID.iam.gserviceaccount.com              SA_DISPLAY_NAME_2              SA_NAME_2@PROJECT_ID.iam.gserviceaccount.com            

REST

The serviceAccounts.list method lists every service account in your projection.

Before using any of the request data, make the following replacements:

  • PROJECT_ID : Your Google Cloud project ID. Project IDs are alphanumeric strings, like my-project.

HTTP method and URL:

GET https://iam.googleapis.com/v1/projects/PROJECT_ID/serviceAccounts

To ship your request, aggrandize i of these options:

You should receive a JSON response similar to the following:

{   "accounts": [     {       "proper name": "projects/my-project/serviceAccounts/sa-one@my-project.iam.gserviceaccount.com",       "projectId": "my-project",       "uniqueId": "123456789012345678901",       "email": "sa-1@my-project.iam.gserviceaccount.com",       "description": "My first service business relationship",       "displayName": "Service business relationship 1",       "etag": "BwUpTsLVUkQ=",       "oauth2ClientId": "987654321098765432109"     },     {       "name": "projects/my-project/serviceAccounts/sa-two@my-project.iam.gserviceaccount.com",       "projectId": "my-project",       "uniqueId": "234567890123456789012",       "electronic mail": "sa-2@my-projection.iam.gserviceaccount.com",       "clarification": "My second service account",       "displayName": "Service account 2",       "etag": "UkQpTwBVUsL=",       "oauth2ClientId": "876543210987654321098"     }   ] }              

C++

To learn how to install and use the client library for IAM, see IAM customer libraries. For more information, see the IAM C++ API reference documentation.

C#

To acquire how to install and use the customer library for IAM, see IAM customer libraries. For more information, see the IAM C# API reference documentation.

Go

To learn how to install and use the customer library for IAM, see IAM customer libraries. For more information, encounter the IAM Go API reference documentation.

Coffee

To larn how to install and utilize the customer library for IAM, run into IAM customer libraries. For more data, see the IAM Java API reference documentation.

Python

To acquire how to install and use the client library for IAM, see IAM client libraries. For more information, see the IAM Python API reference documentation.

Updating a service account

The display proper noun (friendly name) and description of a service account are normally used to capture additional data about the service account, such equally the purpose of the service account or a contact person for the account.

Console

  1. In the Cloud console, become to the Service accounts page.

    Go to Service accounts

  2. Select a project.

  3. Click the email address of the service business relationship that you want to rename.

  4. Enter the new proper noun in the Name box, so click Save.

gcloud

Execute the gcloud iam service-accounts update command to update a service account.

Command:

gcloud iam service-accounts update \              SA_NAME@PROJECT_ID.iam.gserviceaccount.com \     --description="UPDATED_SA_DESCRIPTION" \     --display-name="UPDATED_DISPLAY_NAME"            

The output is the renamed service account:

clarification:              UPDATED_SA_DESCRIPTION              displayName:              UPDATED_DISPLAY_NAME              proper name: projects/PROJECT_ID/serviceAccounts/SA_NAME@PROJECT_ID.iam.gserviceaccount.com            

REST

The serviceAccounts.patch method updates a service account.

Before using whatsoever of the request data, make the following replacements:

  • PROJECT_ID : Your Google Cloud projection ID. Project IDs are alphanumeric strings, like my-project.
  • SA_ID : The ID of your service account. This can either be the service business relationship's email address in the form SA_NAME@PROJECT_ID.iam.gserviceaccount.com, or the service account's unique numeric ID.
  • SA_NAME : The alphanumeric ID of your service business relationship. This name must be between half dozen and 30 characters, and can contain lowercase alphanumeric characters and dashes.
  • Replace at to the lowest degree one of the following:
    • UPDATED_DISPLAY_NAME : A new brandish name for your service account.
    • UPDATED_DESCRIPTION : A new description for your service account.

HTTP method and URL:

PATCH https://iam.googleapis.com/v1/projects/PROJECT_ID/serviceAccounts/SA_ID              

Asking JSON body:

{   "serviceAccount": {     "email": "SA_NAME@PROJECT_ID.iam.gserviceaccount.com",     "displayName": "UPDATED_DISPLAY_NAME",     "clarification": "UPDATED_DESCRIPTION"   },   "updateMask": "displayName,description" }              

To send your request, expand one of these options:

Yous should receive a JSON response like to the following:

{   "name": "projects/my-project/serviceAccounts/my-service-account@my-projection.iam.gserviceaccount.com",   "displayName": "My updated service business relationship",   "description": "An updated description of my service business relationship" }              

C++

To learn how to install and use the client library for IAM, see IAM client libraries. For more information, run into the IAM C++ API reference documentation.

C#

To learn how to install and apply the customer library for IAM, run across IAM customer libraries. For more than information, see the IAM C# API reference documentation.

Go

To learn how to install and use the client library for IAM, see IAM client libraries. For more than information, run into the IAM Become API reference documentation.

Java

To learn how to install and employ the client library for IAM, come across IAM customer libraries. For more information, see the IAM Coffee API reference documentation.

Python

To learn how to install and use the client library for IAM, see IAM client libraries. For more information, see the IAM Python API reference documentation.

Disabling a service account

Like to deleting a service account, when you lot disable a service account, applications will no longer have access to Google Cloud resources through that service business relationship. If you lot disable the default App Engine and Compute Engine service accounts, the instances volition no longer have admission to resources in the project. If you lot effort to disable an already disabled service business relationship, it will have no effect.

Unlike deleting a service business relationship, disabled service accounts tin hands exist re-enabled equally necessary. We recommend disabling a service account before deleting it to make sure no disquisitional applications are using the service account.

Console

  1. In the Cloud console, go to the Service accounts page.

    Go to Service accounts

  2. Select a projection.

  3. Click the proper name of the service account that you desire to disable.

  4. Under Service account status, click Disable service account, then click Disable to confirm the alter.

gcloud

Execute the gcloud iam service-accounts disable command to disable a service account.

Control:

gcloud iam service-accounts disable              SA_NAME@PROJECT_ID.iam.gserviceaccount.com            

Output:

Disabled service account              SA_NAME@PROJECT_ID.iam.gserviceaccount.com            

REST

The serviceAccounts.disable method immediately disables a service account.

Before using any of the request information, make the following replacements:

  • PROJECT_ID : Your Google Cloud project ID. Project IDs are alphanumeric strings, like my-project.
  • SA_ID : The ID of your service account. This can either be the service account'southward email address in the form SA_NAME@PROJECT_ID.iam.gserviceaccount.com, or the service account's unique numeric ID.

HTTP method and URL:

POST https://iam.googleapis.com/v1/projects/PROJECT_ID/serviceAccounts/SA_ID:disable

To send your asking, expand one of these options:

If successful, the response trunk will be empty.

C++

To learn how to install and utilize the customer library for IAM, see IAM client libraries. For more information, come across the IAM C++ API reference documentation.

C#

To learn how to install and use the client library for IAM, meet IAM client libraries. For more than data, meet the IAM C# API reference documentation.

Go

To learn how to install and employ the client library for IAM, see IAM customer libraries. For more than information, run across the IAM Go API reference documentation.

Coffee

To learn how to install and use the client library for IAM, see IAM client libraries. For more information, run across the IAM Java API reference documentation.

Python

To learn how to install and utilise the customer library for IAM, encounter IAM client libraries. For more than information, see the IAM Python API reference documentation.

Enabling a service account

After enabling a disabled service account, applications will regain access to Google Cloud resources through that service business relationship.

Yous tin enable a disabled service account whenever you lot demand to. If you lot attempt to enable an already enabled service business relationship, information technology will accept no effect.

Console

  1. In the Cloud console, become to the Service accounts page.

    Go to Service accounts

  2. Select a project.

  3. Click the name of the service account that you want to enable.

  4. Under Service account status, click Enable service account, then click Enable to ostend the change.

gcloud

Execute the gcloud iam service-accounts enable command to enable a service account.

Command:

gcloud iam service-accounts enable              SA_NAME@PROJECT_ID.iam.gserviceaccount.com            

Output:

Enabled service account              SA_NAME@PROJECT_ID.iam.gserviceaccount.com            

REST

The serviceAccounts.enable method enables a previously disabled service account.

Earlier using whatever of the asking data, make the following replacements:

  • PROJECT_ID : Your Google Cloud project ID. Project IDs are alphanumeric strings, like my-project.
  • SA_ID : The ID of your service account. This can either exist the service account's email address in the class SA_NAME@PROJECT_ID.iam.gserviceaccount.com, or the service account's unique numeric ID.

HTTP method and URL:

Mail https://iam.googleapis.com/v1/projects/PROJECT_ID/serviceAccounts/SA_ID:enable

To ship your request, aggrandize one of these options:

If successful, the response body will be empty.

C++

To larn how to install and use the client library for IAM, come across IAM client libraries. For more than data, see the IAM C++ API reference documentation.

C#

To learn how to install and utilize the client library for IAM, see IAM customer libraries. For more than data, run into the IAM C# API reference documentation.

Go

To learn how to install and use the customer library for IAM, run into IAM customer libraries. For more information, see the IAM Go API reference documentation.

Java

To learn how to install and utilise the customer library for IAM, see IAM client libraries. For more information, see the IAM Java API reference documentation.

Python

To acquire how to install and utilize the client library for IAM, run across IAM client libraries. For more than information, run across the IAM Python API reference documentation.

Deleting a service account

When you delete a service business relationship, applications volition no longer have admission to Google Cloud resources through that service business relationship. If y'all delete the default App Engine and Compute Engine service accounts, the instances volition no longer have access to resources in the project.

Delete with caution; make sure your critical applications are no longer using a service account before deleting it. If y'all're not sure whether a service account is being used, we recommend disabling the service account before deleting it. Disabled service accounts tin be easily re-enabled if they are even so in use.

If yous delete a service account, and so create a new service business relationship with the aforementioned name, the new service account is treated every bit a split identity; it does not inherit the roles granted to the deleted service account. In contrast, when you lot delete a service account, then undelete it, the service account's identity does not change, and the service account retains its roles.

When a service account is deleted, its function bindings are not immediately removed; they are automatically purged from the arrangement after a maximum of 60 days. Until that time, the service account appears in function bindings with a deleted: prefix and a ?uid=NUMERIC_ID suffix, where NUMERIC_ID is a unique numeric ID for the service business relationship.

Deleted service accounts do not count towards your service account quota.

Panel

  1. In the Deject console, go to the Service accounts page.

    Get to Service accounts

  2. Select a project.

  3. Select the service account you want to delete, so click Delete .

gcloud

Execute the gcloud iam service-accounts delete command to delete a service account.

Command:

gcloud iam service-accounts delete \              SA_NAME@PROJECT_ID.iam.gserviceaccount.com            

Output:

Deleted service account              SA_NAME@PROJECT_ID.iam.gserviceaccount.com            

Residue

The serviceAccounts.delete method deletes a service business relationship.

Earlier using whatever of the request data, make the following replacements:

  • PROJECT_ID : Your Google Cloud projection ID. Project IDs are alphanumeric strings, like my-project.
  • SA_ID : The ID of your service business relationship. This tin either exist the service account'due south email address in the class SA_NAME@PROJECT_ID.iam.gserviceaccount.com, or the service account'southward unique numeric ID.

HTTP method and URL:

DELETE https://iam.googleapis.com/v1/projects/PROJECT_ID/serviceAccounts/SA_ID              

To transport your request, expand one of these options:

If successful, the response trunk will be empty.

C++

To acquire how to install and use the customer library for IAM, see IAM client libraries. For more information, run into the IAM C++ API reference documentation.

C#

To learn how to install and utilize the client library for IAM, come across IAM customer libraries. For more information, run across the IAM C# API reference documentation.

Go

To learn how to install and use the client library for IAM, see IAM client libraries. For more than information, run across the IAM Get API reference documentation.

Java

To learn how to install and use the client library for IAM, see IAM client libraries. For more information, run into the IAM Java API reference documentation.

Python

To acquire how to install and use the customer library for IAM, encounter IAM client libraries. For more information, see the IAM Python API reference documentation.

Undeleting a service account

In some cases, you can utilise the undelete command to undelete a deleted service business relationship. You tin usually undelete a deleted service business relationship if it meets these criteria:

  • The service account was deleted less than thirty days ago.

    After 30 days, IAM permanently removes the service account. Google Cloud cannot recover the service account after it is permanently removed, even if y'all file a support asking.

  • There is no existing service account with the same name as the deleted service account.

    For example, suppose that you lot accidentally delete the service account my-service-account@project-id.iam.gserviceaccount.com. You still need a service account with that proper name, so y'all create a new service account with the same name, my-service-account@projection-id.iam.gserviceaccount.com.

    The new service account does not inherit the permissions of the deleted service account. In result, information technology is completely separate from the deleted service account. However, you cannot undelete the original service account, because the new service account has the aforementioned proper name.

    To accost this effect, delete the new service business relationship, and so try to undelete the original service account.

If you are not able to undelete the service account, you lot can create a new service account with the same name; revoke all of the roles from the deleted service business relationship; and grant the same roles to the new service account. For details, meet Policies with deleted principals.

Finding a deleted service business relationship'south numeric ID

When yous undelete a service account, you must provide its numeric ID. The numeric ID is a 21-digit number, such as 123456789012345678901, that uniquely identifies the service business relationship. For example, if you delete a service account, then create a new service account with the same proper noun, the original service business relationship and the new service business relationship will accept different numeric IDs.

If yous know that a binding in an allow policy includes the deleted service account, you tin become the allow policy, and then find the numeric ID in the allow policy. The numeric ID is appended to the name of the deleted service account. For example, in this allow policy, the numeric ID for the deleted service business relationship is 123456789012345678901:

{   "version": 1,   "etag": "BwUjMhCsNvY=",   "bindings": [     {       "members": [          "deleted:serviceAccount:my-service-account@project-id.iam.gserviceaccount.com?uid=123456789012345678901"          ],       "part": "roles/iam.serviceAccountUser"     },   ] }        

Numeric IDs are but appended to the names of deleted principals.

Alternatively, you can search your inspect logs for the DeleteServiceAccount operation that deleted the service account:

  1. In the Deject console, go to the Logs explorer folio.

    Get to Logs explorer

  2. In the query editor, enter the following query, replacing SERVICE_ACCOUNT_EMAIL with the email address of your service account (for example, my-service-account@project-id.iam.gserviceaccount.com):

    resource.type="service_account" resource.labels.email_id="SERVICE_ACCOUNT_EMAIL" "DeleteServiceAccount"            
  3. If the service account was deleted more than an hour ago, click schedule Last 1 60 minutes, select a longer catamenia of time from the drop-downwards listing, and then click Employ.

  4. Click Run query. The Logs Explorer displays the DeleteServiceAccount operations that affected service accounts with the proper name y'all specified.

  5. Detect and note the numeric ID of the deleted service account by doing one of the following:

    • If the search results include but 1 DeleteServiceAccount operation, find the numeric ID in the Unique ID field of the Log fields pane.

    • If the search results show more than than ane log, practise the following:

      1. Find the right log entry. To find the correct log entry, click the expander arrow next to a log entry. Review the details of the log entry and determine whether the log entry shows the functioning that you want to undo. Repeat this process until you find the correct log entry.

      2. In the correct log entry, locate the service account'south numeric ID. To locate the numeric ID, expand the log entry's protoPayload field, then observe the resourceName field.

        The numeric ID is everything later on serviceAccounts in the resourceName field.

Undeleting the service account by numeric ID

After you find the numeric ID for the deleted service account, you can try to undelete the service business relationship.

gcloud

Execute the gcloud beta iam service-accounts undelete command to undelete a service account.

Command:

gcloud beta iam service-accounts undelete              ACCOUNT_ID            

Output:

restoredAccount:   email:              SA_NAME@PROJECT_ID.iam.gserviceaccount.com   etag: BwWWE7zpApg=   name: projects/PROJECT_ID/serviceAccounts/SA_NAME@PROJECT_ID.iam.gserviceaccount.com   oauth2ClientId: '123456789012345678901'   projectId:              PROJECT_ID              uniqueId: 'ACCOUNT_ID'            

Residue

The serviceAccounts.undelete method restores a deleted service account.

Before using any of the request data, make the following replacements:

  • PROJECT_ID : Your Google Cloud project ID. Project IDs are alphanumeric strings, like my-project.
  • SA_NUMERIC_ID : The unique numeric ID of the service account.

HTTP method and URL:

Mail service https://iam.googleapis.com/v1/projects/PROJECT_ID/serviceAccounts/SA_NUMERIC_ID:undelete

To transport your request, expand one of these options:

If the account tin be undeleted, yous receive a 200 OK response lawmaking with details about the restored service account, like the post-obit:

{   "restoredAccount": {     "proper name": "projects/my-project/serviceAccounts/my-service-account@my-project.iam.gserviceaccount.com",     "projectId": "my-project",     "uniqueId": "123456789012345678901",     "email": "my-service-business relationship@my-project.iam.gserviceaccount.com",     "displayName": "My service account",     "etag": "BwUp3rVlzes=",     "clarification": "A service account for running jobs in my project",     "oauth2ClientId": "987654321098765432109"   } }              

What'southward next

  • Learn how to create and manage service account keys.
  • Review the process for granting IAM roles to all types of principals, including service accounts.
  • Explore how you can use part recommendations to downscope permissions for all principals, including service accounts.
  • Empathise how to allow principals to impersonate service accounts.

If yous're new to Google Cloud, create an account to evaluate how our products perform in existent-earth scenarios. New customers also go $300 in free credits to run, exam, and deploy workloads.

Get started for free

How To Create Service Account In Windows 8,

Source: https://cloud.google.com/iam/docs/creating-managing-service-accounts

Posted by: changthatera1965.blogspot.com

0 Response to "How To Create Service Account In Windows 8"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel