Chat now with support
Chat mit Support

Identity Manager 8.1.3 - Administration Guide for Connecting to LDAP

Managing LDAP environments Synchronizing LDAP directories
Setting up initial LDAP directory synchronization Customizing the synchronization configuration Executing synchronization Tasks after a synchronization Troubleshooting
Basic configuration data LDAP domains LDAP user accounts LDAP groups LDAP container structures LDAP computers Reports about LDAP objects Configuration parameters for managing an LDAP environment Default project template for LDAP Generic LDAP connector settings

Master data for an account definition

Enter the following data for an account definition:

Table 11: Master data for an account definition

Property

Description

Account definition

Account definition name.

User account table

Table in the One Identity Manager schema that maps user accounts.

Target system

Target system to which the account definition applies.

Required account definition

Required account definition. Define the dependencies between account definitions. When this account definition is requested or assigned, the required account definition is automatically requested or assigned with it.

Leave empty for LDAP domains.

Description

Text field for additional explanation.

Manage level (initial)

Manage level to use by default when you add new user accounts.

Risk index

Value for evaluating the risk of account definition assignments to employees. Enter a value between 0 and 1. This input field is only visible if the QER | CalculateRiskIndex configuration parameter is set.

For more detailed information, see the One Identity Manager Risk Assessment Administration Guide.

Service item

Service item through which you can request the account definition in the IT Shop. Assign an existing service item or add a new one.

IT Shop

Specifies whether the account definition can be requested through the IT Shop. The account definition can be ordered by an employee over the Web Portal and distributed using a defined approval process. The account definition can also be assigned directly to employees and roles outside the IT Shop.

Only for use in IT Shop

Specifies whether the account definition can only be requested through the IT Shop. The account definition can be ordered by an employee over the Web Portal and distributed using a defined approval process. This means, the account definition cannot be directly assigned to roles outside the IT Shop.

Automatic assignment to employees

Specifies whether the account definition is assigned automatically to all internal employees. The account definition is assigned to every employee not marked as external, on saving. New employees automatically obtain this account definition as soon as they are added.

IMPORTANT: Only set this option if you can ensure that all current internal employees in the database and all pending newly added internal employees obtain a user account in this target system.

Disable this option to remove automatic assignment of the account definition to all employees. The account definition cannot be reassigned to employees from this point on. Existing account definition assignments remain intact.

Retain account definition if permanently disabled

Specifies the account definition assignment to permanently disabled employees.

Option set: the account definition assignment remains in effect. The user account stays the same.

Option not set: the account definition assignment is not in effect. The associated user account is deleted.

Retain account definition if temporarily disabled

Specifies the account definition assignment to temporarily disabled employees.

Option set: the account definition assignment remains in effect. The user account stays the same.

Option not set: the account definition assignment is not in effect. The associated user account is deleted.

Retain account definition on deferred deletion

Specifies the account definition assignment on deferred deletion of employees.

Option set: the account definition assignment remains in effect. The user account stays the same.

Option not set: the account definition assignment is not in effect. The associated user account is deleted.

Retain account definition on security risk

Specifies the account definition assignment to employees posing a security risk.

Option set: the account definition assignment remains in effect. The user account stays the same.

Option not set: the account definition assignment is not in effect. The associated user account is deleted.

Resource type

Resource type for grouping account definitions.

Spare field 01 - spare field 10

Additional company-specific information. Use the Designer to customize display names, formats, and templates for the input fields.

Creating manage levels

Specify the manage level for an account definition for managing user accounts. The user account’s manage level specifies the extent of the employee’s properties that are inherited by the user account. This allows an employee to have several user accounts in one target system, for example:

  • Default user account that inherits all properties from the employee.
  • Administrative user account that is associated to an employee but should not inherit the properties from the employee.

One Identity Manager supplies a default configuration for manage levels:

  • Unmanaged: User accounts with the Unmanaged manage level are linked to the employee but they do no inherit any further properties. When a new user account is added with this manage level and an employee is assigned, some of the employee's properties are transferred initially. If the employee properties are changed at a later date, the changes are not passed onto the user account.

  • Full managed: User accounts with the Full managed manage level inherit defined properties of the assigned employee. When a new user account is created with this manage level and an employee is assigned, the employee's properties are transferred in an initial state. If the employee properties are changed at a later date, the changes are passed onto the user account.

NOTE: The Full managed and Unmanaged manage levels are analyzed in templates. You can customize the supplied templates in the Designer.

You can define other manage levels depending on your requirements. You need to amend the templates to include manage level approaches.

Specify the effect of temporarily or permanently disabling, deleting, or the security risk of an employee on its user accounts and group memberships for each manage level. For detailed information about manage levels, see the One Identity Manager Target System Base Module Administration Guide.

  • Employee user accounts can be locked when they are disabled, deleted, or rated as a security risk so that permissions are immediately withdrawn. If the employee is reinstated at a later date, the user accounts are also reactivated.
  • You can also define group membership inheritance. Inheritance can be discontinued if desired when, for example, the employee’s user accounts are disabled and therefore cannot be members in groups. During this time, no inheritance processes should be calculated for this employee. Existing group memberships are deleted.

To assign manage levels to an account definition

  1. In the Manager, select the LDAP | Basic configuration data | Account definitions | Account definitions category.

  2. Select an account definition in the result list.
  3. Select the Assign manage level task.
  4. In the Add assignments pane, assign the manage levels.

    - OR -

    In the Remove assignments pane, remove the manage levels.

  5. Save the changes.
IMPORTANT: The Unmanaged manage level is assigned automatically when you create an account definition and it cannot be removed.

To edit a manage level

  1. In the Manager, select the LDAP | Basic configuration data | Account definitions | Manage levels category.

  2. Select the manage level in the result list. Select the Change master data task.

    - OR -

    Click in the result list.

  3. Edit the manage level's master data.

  4. Save the changes.
Related topics

Master data for manage levels

Enter the following data for a manage level.

Table 12: Master data for manage levels
Property Description

Manage level

Name of the manage level.

Description

Text field for additional explanation.

IT operating data overwrites

Specifies whether user account data formatted from IT operating data is automatically updated. Permitted values are:

  • Never: Data is not updated.

  • Always: Data is always updated.

  • Only initially: Data is only determined at the start.

Retain groups if temporarily disabled

Specifies whether user accounts of temporarily disabled employees retain their group memberships.

Lock user accounts if temporarily disabled

Specifies whether user accounts of temporarily disabled employees are locked.

Retain groups if permanently disabled

Specifies whether user accounts of permanently disabled employees retain group memberships.

Lock user accounts if permanently disabled

Specifies whether user accounts of permanently disabled employees are locked.

Retain groups on deferred deletion

Specifies whether user accounts of employees marked for deletion retain their group memberships.

Lock user accounts if deletion is deferred

Specifies whether user accounts of employees marked for deletion are locked.

Retain groups on security risk

Specifies whether user accounts of employees posing a security risk retain their group memberships.

Lock user accounts if security is at risk

Specifies whether user accounts of employees posing a security risk are locked.

Retain groups if user account disabled

Specifies whether disabled user accounts retain their group memberships.

Creating a formatting rule for IT operating data

An account definition specifies which rules are used to form the IT operating data and which default values will be used if no IT operating data can be found through the employee's primary roles.

The following IT operating data is used in the One Identity Manager default configuration for automatically creating user accounts for an employee in the target system and modifying them.

  • LDAP container

  • Groups can be inherited

  • Identity

  • Privileged user account

To create a mapping rule for IT operating data

  1. In the Manager, select the LDAP | Basic configuration data | Account definitions | Account definitions category.

  2. Select an account definition in the result list.

  3. Select the Edit IT operating data mapping task and enter the following data.

    Table 13: Mapping rule for IT operating data

    Property

    Description

    Column

    User account property for which the value is set. In the menu, you can select the columns that use the TSB_ITDataFromOrg script in their template. For detailed information, see the One Identity Manager Target System Base Module Administration Guide.

    Source

    Specifies which roles to use in order to find the user account properties. You have the following options:

    • Primary department

    • Primary location

    • Primary cost center

    • Primary business roles

      NOTE: Only use the primary business role if the Business Roles Module is installed.

    • Empty

      If you select a role, you must specify a default value and set the Always use default value option.

    Default value

    Default value of the property for an employee's user account if the value is not determined dynamically from the IT operating data.

    Always use default value

    Specifies whether user account properties are always filled with the default value. IT operating data is not determined dynamically from a role.

    Notify when applying the standard

    Specifies whether email notification to a defined mailbox is sent when the default value is used. The Employee - new user account with default properties created mail template is used. To change the mail template, adjust the TargetSystem | LDAP | Accounts | MailTemplateDefaultValues configuration parameter.

  4. Save the changes.

Related topics
Verwandte Dokumente