立即与支持人员聊天
与支持团队交流

Active Roles 8.1.1 - Synchronization Service Administration Guide

Synchronization Service overview Deploying Synchronization Service Getting started Connections to external data systems
External data systems supported with built-in connectors
Working with Active Directory Working with an AD LDS (ADAM) instance Working with Skype for Business Server Working with Oracle Database Working with Oracle Database user accounts Working with Exchange Server Working with Active Roles Working with One Identity Manager Working with a delimited text file Working with Microsoft SQL Server Working with Micro Focus NetIQ Directory Working with Salesforce Working with ServiceNow Working with Oracle Unified Directory Working with an LDAP directory service Working with an OpenLDAP directory service Working with IBM DB2 Working with IBM AS/400 Working with IBM RACF Working with MySQL database Working with an OLE DB-compliant relational database Working with SharePoint Working with Microsoft 365 Working with Microsoft Azure Active Directory Configuring data synchronization with the SCIM Connector Configuring data synchronization with the Generic SCIM Connector Objects and operations supported by the SCIM Connector Example of using the Generic SCIM Connector for data synchronization
Using connectors installed remotely Creating a connection Renaming a connection Deleting a connection Modifying synchronization scope for a connection Using connection handlers Specifying password synchronization settings for a connection
Synchronizing identity data Mapping objects Automated password synchronization Synchronization history Scenarios of use Developing PowerShell scripts for attribute synchronization rules Using PowerShell script to transform passwords

Verify on One Identity Manager

To verify if the data is synchronized to One Identity Manager

  1. Open the Synchronization Service Console.

  2. Verify that all the users from the AD are synchronized with One Identity Manager as per the provisioning rules that were set.

Scenario: Deprovisioning between One Identity Manager Custom Target Systems and an Active Directory domain

The deprovision operation in data synchronization using Synchronization Service allows you to modify or remove objects in the target data system after their counterparts have been disconnected from the source data system. You can configure Synchronization Service to remove target objects permanently or change them to a specific state. To specify the objects that will participate in the deprovision operation you can use object mapping rules. This scenario describes how to create a deprovisioning step for a workflow to modify or delete the synchronized objects in the target system based on the deprovisioning criteria that is set.

To create a deprovisioning step

  1. In the Synchronization Service Console, open the Sync Workflows tab, and then click the AD to OneIM Sync workflow.
  2. Click Add synchronization step.
  3. In the Select an action dialog, select Deprovision, and then click Next.

  4. In the Specify source and criteria dialog, click Specify, click Add new connected system or Select existing connected system, and then step through the wizard to add the Active Directory Test AD as a connected system.
  5. Specify a deprovisioning criteria by selecting one of the following:

    • Source object is deleted or out of synchronization scope

    • Source object deprovisioning is initiated in connected system

    • Source object meets these criteria - Add the criteria for the source objects to be deprovisioned in the target system

  6. Click Next.

  7. In the Specify target dialog, click Specify.

  8. Click Add new connected system or Select existing connected system, and then step through the wizard to add the target One Identity Manager domain as a connected system.

  9. Click Select, to add the required target object type.

  10. In the Select Object Type dialog, select the UNSAccountB object type from the list of object types and click OK.
  11. In the Specify deprovisioning action dialog, select the one of the following action to deprovision:

    • Delete target objects

    • Initiate the object deprovisioning in <target system>

    • Modify target objects - Click Forward Synch rule and select the attributes to modify the object attributes

  12. Click Next.

    Active Roles Synchronization Service then creates the deprovisioning step with the rules for the specified deprovisioning action.

Scenario: Provisioning of groups between One Identity Manager Custom Target Systems and an Active Directory domain

Synchronization Service allows you to ensure that group membership information is in sync in all connected data systems. For example, when provisioning a group object from an Active Directory domain to One Identity Manager domain, you can configure rules to synchronize the Member attribute from the source to the target domain.

This scenario describes how to create a provisioning step for a workflow to synchronize group objects between the source and target systems.

To create a group provisioning step:

  1. In the Synchronization Service Console, open the Sync Workflows tab, and then click the AD to OneIM Sync workflow.
  2. Click Add synchronization step.
  3. In the Select an action dialog, select Creation, then click Next.

  4. In the Specify source and criteria dialog, click Specify, click Add new connected system or Select existing connected system, then progress through the wizard to add the Active Directory Test AD as a connected system.

  5. In Specify object type field, click Select and from the Select Object type list, select Group, then click OK.

  6. In the Provisioning Criteria section, click Add.

  7. In the Select Container dialog, from the containers list, select the required container and click OK.

  8. Click Next.

  9. In the Specify target dialog, click Specify.

  10. Click Add new connected system or Select existing connected system, and then step through the wizard to add the target One Identity Manager domain as a connected system.

  11. Click Select, to add the required target object type.

  12. In the Select Object Type dialog, select the UNSGroupB object type from the list of object types.

  13. Click OK.

    Active Roles Synchronization Service then creates the group provisioning step.

Scenario: Enabling Delta Sync mode between One Identity Manager Custom Target Systems and an Active Directory domain

The Delta processing mode of the Synchronization Service allows you to synchronize identities between the source and the target systems for only the data that has changed in the source and target connected systems since their last synchronization.

This scenario describes how to enable the delta processing mode between the source (Active Directory domain) and target (One Identity Manager) systems.

To enable the delta processing mode

  1. Create a sync workflow for provisioning data synchronization between the source (Active Directory) and target (One Identity Manager) system.

  2. Add a creating step for the workflow to provision users from the source system to target system.

  3. Click on the synchronization step for provision of users.

  4. On the General Options tab, specify the delta process mode:

    1. Under Source Connected System, select Process delta from last run.

    2. Under Target Connected System select Process delta from last run.

  5. Click Save and continue.

    NOTE: Before any data has been processed from the source to the target system, the initial synchronization of data is always performed in the Process all delta mode.

  6. Run the configured creating step.

    The data for the users added or updated to the source since the previous run, is displayed under Processed Objects.

相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级