Converse agora com nosso suporte
Chat com o suporte

Active Roles 7.6.1 - Synchronization Service Administration Guide

Synchronization Service Overview Deploying Synchronization Service Getting started Connections to external data systems
External data systems supported with built-in connectors
Working with Active Directory Working with an AD LDS (ADAM) instance Working with Skype for Business Server Working with Oracle Working with Exchange Server Working with Active Roles Working with One Identity Manager Working with a delimited text file Working with Microsoft SQL Server Working with Micro Focus NetIQ Directory Working with Salesforce Working with ServiceNow Working with Oracle Unified Directory Working with an LDAP directory service Working with IBM DB2 Working with IBM AS/400 Working with an OpenLDAP directory service Working with IBM RACF connector Working with MySQL database Working with an OLE DB-compliant relational database Working with SharePoint Working with Microsoft Office 365 Configuring data synchronization with the Microsoft Azure AD Connector Configuring data synchronization with the SCIM Connector Configuring data synchronization with the Generic SCIM Connector
Using connectors installed remotely Creating a connection Renaming a connection Deleting a connection Modifying synchronization scope for a connection Using connection handlers Specifying password synchronization settings for a connection
Synchronizing identity data Mapping objects Automated password synchronization Synchronization history Scenarios of use
About scenarios Scenario 1: Create users from a .csv file to an Active Directory domain Scenario 2: Use a .csv file to update user accounts in an Active Directory domain Scenario 3: Synchronizing data between One Identity Manager Custom Target Systems and an Active Directory domain Scenario 4: Deprovisioning between One Identity Manager Custom Target Systems and an Active Directory domain Scenario 5: Provisioning of Groups between One Identity Manager Custom Target Systems and an Active Directory domain Scenario 6: Enabling Delta Sync mode between One Identity Manager Custom Target Systems and an Active Directory domain Example of using the Generic SCIM Connector for data synchronization
Appendix A: Developing PowerShell scripts for attribute synchronization rules Appendix B: Using a PowerShell script to transform passwords

Using Group Policy to install Capture Agent

You can use this method to automatically deploy Capture Agent on each domain controller in the source Active Directory domain. This method is applicable in the following scenarios only:

Table 123: Prerequisites by scenario

Supported scenario

Prerequisites

Scenario 1: AD domain includes either 32- or 64-bit domain controllers

  • All the domain controllers must be held in a single organizational unit (for example, the built-in Domain Controllers OU).
  • At least one group policy object must be linked to the OU holding the domain controllers (for example, the built-in Default Domain Controllers Policy Group Policy object).

Scenario 2: AD domain includes both 32- and 64-bit domain controllers

  • The domain controllers must be held in two separate organizational units, each containing domain controllers of the same bitness.
  • At least one group policy object must be linked to each of the two organizational units.

To install Capture Agent by using Group Policy

  1. Save the SyncServiceCaptureAgent_7.6.1_x86.msi and SyncServiceCaptureAgent_7.6.1_x64.msi files to a network share accessible from each domain controller in the source Active Directory domain.
  2. Depending on your scenario, complete the steps in the table:
Table 124: Steps by scenario

Scenario 1: AD domain includes either 32- or 64-bit domain controllers

Scenario 2: AD domain includes both 32- and 64-bit domain controllers

  1. Use Group Policy Editor to open the group policy object linked to the OU holding the domain controllers on which you want to install Capture Agent.
  2. In the Group Policy Object Editor console tree, in Windows Server 2016 or later, expand the Computer Configuration node, then expand Policies, and select Software Settings.
  3. In the details pane, click Software Installation, on the Action menu point to New, and then click Package.
  4. Use the dialog box to open one of the following files:

    SyncServiceCaptureAgent_7.6.1_x86.msi if all your domain controllers are 32-bit.

    or

    SyncServiceCaptureAgent_7.6.1_x64.msi if all your domain controllers are 64-bit.

  5. In the Deploy Software dialog box, select Assigned, and then click OK.
  1. Use Group Policy Object Editor to open the group policy object linked to the OU holding the 32-bit domain controllers.
  2. In the Group Policy Object Editor console tree, in Windows Server 2016 or later, expand the Computer Configuration node, then expand Policies, and select Software Settings.
  3. In the details pane, click Software Installation, on the Action menu point to New, then click Package.
  4. Use the dialog box to open the SyncServiceCaptureAgent_7.6.1_x86.msi file.
  5. In the Deploy Software dialog box, select Assigned, and then click OK.
  6. Repeat steps 1-5 for the group policy object linked to the OU holding the 64-bit domain controllers. Use the SyncServiceCaptureAgent_7.6.1_x64.msi file to install Capture Agent on these domain controllers.
  1. Run the following command at a command prompt to refresh the Group Policy settings: gpupdate /force

Uninstalling Capture Agent

To uninstall Capture Agent

  1. To open the list of installed programs on the computer where Capture Agent is installed, in Control Panel, open Programs and Features.
  2. In the list of installed programs, select One Identity Active Roles 7.6.1 - Synchronization Service Capture Agent x64 or One Identity Active Roles 7.6.1 - Synchronization Service Capture Agent x86.
  3. Click Uninstall to uninstall the agent.
  4. Follow the on-screen instructions to uninstall Capture Agent.

Managing password sync rules

To synchronize passwords from an Active Directory domain to other connected systems, you need to create and configure a password synchronization rule for each target connected system where you want to synchronize passwords.

A password synchronization rule allows you to specify the following:

  • The Active Directory domain you want to be the source for password synchronization operations.
  • The source object type for password synchronization operations (typically, this is the user object type in Active Directory).
  • The target connected system in which you want to synchronize passwords with the source Active Directory domain.
  • The target object type for password synchronization operations.

Optionally, you can configure a password synchronization rule to modify attribute values of the target connected system objects whose passwords are being synchronized.

This section covers:

Creating a password sync rule

To create a password sync rule

  1. In the Synchronization Service Administration Console, open the Password Sync tab.
  2. Click Add password sync rule.
  3. On the Specify source for password sync page, do the following:
    1. In the Source connected system option, specify the Active Directory domain you want to be the source for password synchronization operations. Alternatively, you can select the Active Roles instance that manages such an Active Directory domain.
    2. In the Connected system object type option, select the object type you want to be the source for password synchronization.
  4. Click Next.
  5. On the Specify target for password sync page, do the following:
    1. In the Target connected system option, specify the target connected system in which you want to synchronize passwords.
    2. In the Connected system object type option, select the object type you want to be the target for password synchronization.
    3. Optionally, you can click the Password Sync Settings button and then use the following tabs to configure more password sync settings:
      • Password Sync Retry Options. Use this tab to specify how many times you want Synchronization Service to retry the password synchronization operation in the event of a password synchronization failure. You can select one of the following options:
      • Unlimited number of times. Causes Synchronization Service to retry the password synchronization operation until it succeeds.
      • This maximum number of times. Specify the maximum number of times you want Synchronization Service to retry the password synchronization operation.
      • Password Transformation Script. Use this tab to type a PowerShell script that transforms source Active Directory user passwords into object passwords for the target connected system. Use this item if you want the object passwords in the source and target connected systems to be different. If you do not want to transform passwords, leave the text box blank.
      • Rules to Modify Object Attributes. Use this tab to specify rules for modifying attribute values on the target connected system objects. These rules will only apply to the objects on which Synchronization Service modifies passwords in the target connected system.
    4. When you are finished, click OK.
  6. Click Finish to create the password sync rule.
Documentos relacionados

The document was helpful.

Selecione a classificação

I easily found the information I needed.

Selecione a classificação