Chat now with support
Chat mit Support

Identity Manager 8.1.3 - Administration Guide for Connecting to LDAP

Managing LDAP environments Synchronizing LDAP directories
Setting up initial LDAP directory synchronization Customizing the synchronization configuration Executing synchronization Tasks after a synchronization Troubleshooting
Basic configuration data LDAP domains LDAP user accounts LDAP groups LDAP container structures LDAP computers Reports about LDAP objects Configuration parameters for managing an LDAP environment Default project template for LDAP Generic LDAP connector settings

Editing search criteria for automatic employee assignment

The criteria for employee assignments are defined for the domain. In this case, you specify which user account properties must match the employee’s properties such that the employee can be assigned to the user account. You can limit search criteria further by using format definitions. The search criterion is written in XML notation to the Search criteria for automatic employee assignment column (AccountToPersonMatchingRule) in the LDAPDomain table.

Search criteria are evaluated when employees are automatically assigned to user accounts. Furthermore, you can create a suggestion list for assignments of employees to user accounts based on the search criteria and make the assignment directly.

NOTE: When the employees are assigned to user accounts on the basis of search criteria, user accounts are given the default manage level of the account definition entered in the user account's target system. You can customize user account properties depending on how the behavior of the manage level is defined.

It is not recommended to make assignments to administrative user accounts based on search criteria. Use Change master data to assign employees to administrative user accounts for the respective user account.

NOTE: One Identity Manager supplies a default mapping for employee assignment. Only carry out the following steps when you want to customize the default mapping.

To specify criteria for employee assignment

  1. In the Manager, select the LDAP | Domains category.
  2. Select the domain in the result list.
  3. Select the Define search criteria for employee assignment task.
  4. Specify which user account properties must match with which employee so that the employee is linked to the user account.
    Table 31: Standard search criteria for user accounts
    Apply to Column for employee Column for user account
    LDAP user accounts Central user account (CentralAccount) Login name (UserID)
  5. Save the changes.
Direct assignment of employees to user accounts based on a suggestion list

In the Assignments pane, you can create a suggestion list for assignments of employees to user accounts based on the search criteria and make the assignment directly. User accounts are grouped in different views for this.

Table 32: Manual assignment view

View

Description

Suggested assignments

This view lists all user accounts to which One Identity Manager can assign an employee. All employees are shown who were found using the search criteria and can be assigned.

Assigned user accounts

This view lists all user accounts to which an employee is assigned.

Without employee assignment

This view lists all user accounts to which no employee is assigned and for which no employee was found using the search criteria.

TIP: By double-clicking on an entry in the view, you can view the user account and employee master data.

To apply search criteria to user accounts

  • Click Reload.

    All possible assignments based on the search criteria are found in the target system for all user accounts. The three views are updated.

To assign employees directly using a suggestion list

  1. Click Suggested assignments.
    1. Check the Selection box of all the user accounts to which you want to assign the suggested employees. Multi-select is possible.
    2. Click Assign selected.
    3. Confirm the security prompt with Yes.

      The employees found using the search criteria are assigned to the selected user accounts.

    – OR –

  2. Click No employee assignment.
    1. Click the Select employee option of the user account to which you want to assign an employee. Select an employee from the menu.
    2. Check the Selection box of all the user accounts to which you want to assign the selected employees. Multi-select is possible.
    3. Click Assign selected.
    4. Confirm the security prompt with Yes.

      The employees displayed in the Employee column are assigned to the selected user accounts.

To remove assignments

  1. Click Assigned user accounts.
    1. Click the Selection box of all user accounts you want to delete the employee assignment from. Multi-select is possible.
    2. Click Remove selected.
    3. Confirm the security prompt with Yes.

      The assigned employees are removed from the selected user accounts.

For more detailed information about defining search criteria, see the One Identity Manager Target System Base Module Administration Guide.

Related topics

Assigning account definitions to linked LDAP user accounts

An account definition can be subsequently assigned to user accounts with Linked status. This may be necessary, for example, if:

  • Employees and user accounts were linked manually.

  • Automatic employee assignment is configured, but when a user account is inserted, no account definition is assigned in the domain.

To select user accounts through account definitions

  1. Create an account definition.
  2. Assign an account definition to the domain.
  3. Assign a user account in the Linked state to the account definition. The account definition's default manage level is applied to the user account.
    1. In the Manager, select the LDAP | User accounts | Linked but not configured | <Domain> category.
    2. Select the Assign account definition to linked accounts task.
    3. In the Account definition menu, select the account definition.

    4. Select the user accounts that contain the account definition.

    5. Save the changes.
Detailed information about this topic

Disabling LDAP user accounts

The way you disable user accounts depends on how they are managed.

Scenario:
  • The user account is linked to employees and is managed through account definitions.

User accounts managed through account definitions are disabled when the employee is temporarily or permanently disabled. The behavior depends on the user account manage level. Accounts with the Full managed manage level are disabled depending on the account definition settings. For user accounts with a manage level, configure the required behavior using the template in the LDAPAccount.AccountDisabled column.

Scenario:
  • The user accounts are linked to employees. No account definition is applied.

User accounts managed through user account definitions are disabled when the employee is temporarily or permanently disabled. The behavior depends on the QER | Person | TemporaryDeactivation configuration parameter

  • If the configuration parameter is set, the employee’s user accounts are disabled when the employee is permanently or temporarily disabled.

  • If the configuration parameter is not set, the employee’s properties do not have any effect on the associated user accounts.

To disable the user account when the configuration parameter is disabled

  1. In the Manager, select the LDAP | User accounts category.

  2. Select the user account in the result list.

  3. Select the Change master data task.

  4. On the General tab, set the Account is disabled option.

  5. Save the changes.
Scenario:
  • User accounts not linked to employees.

To disable a user account that is no longer linked to an employee

  1. In the Manager, select the LDAP | User accounts category.

  2. Select the user account in the result list.

  3. Select the Change master data task.

  4. On the General tab, set the Account is disabled option.

  5. Save the changes.
Related topics

Deleting and restoring LDAP user accounts

NOTE: As long as an account definition for an employee is valid, the employee retains the user account that was created by it. If the assignment of an account definition is removed, the user account that was created from this account definition is deleted.

To delete a user account

  1. In the Manager, select the LDAP | User accounts category.

  2. Select the user account in the result list.

  3. Delete the user account.

  4. Confirm the security prompt with Yes.

To restore a user account

  1. In the Manager, select the LDAP | User accounts category.

  2. Select the user account in the result list.

  3. Click Undo delete in the result list toolbar.

Configuring deferred deletion

By default, user accounts are finally deleted from the database after 30 days.The user accounts are initially disabled. You can reenable the user accounts until deferred deletion is run. After deferred deletion is run, the user accounts are deleted from the database and cannot be restored anymore. In the Designer, you can set an alternative delay on the LDAPAccount table.

Related topics
Verwandte Dokumente