Assigning extended properties to Active Directory contacts
Extended properties are meta objects, such as operating codes, cost codes, or cost accounting areas that cannot be mapped directly in One Identity Manager.
To assign extended properties for a contact
- Select the Active Directory | Contacts category.
- Select the contact in the result list.
- Select the Assign extended properties task.
-
In the Add assignments pane, assign extended properties.
TIP: In the Remove assignments pane, you can remove assigned extended properties.
To remove an assignment
- Select the extended property and double-click .
- Save the changes.
For detailed information about using extended properties, see the One Identity Manager Identity Management Base Module Administration Guide.
Deleting and restoring Active Directory contacts
One Identity Manager uses various methods to delete contacts. For more information, see Deleting and restoring Active Directory user accounts.
NOTE: As long as an account definition for an employee is valid, the employee retains the contact that was created by it. If the account definition assignment is removed, the contact created through this account definition, is deleted.
To delete a contact
- Select the Active Directory | Contacts category.
- Select the contact in the result list.
- Delete the contact.
- Confirm the security prompt with Yes.
To restore a contact
- Select the Active Directory | Contacts category.
- Select the contact in the result list.
- Click Undo delete in the result list toolbar.
Configuring deferred deletion
By default, Active Directory contacts are finally deleted from the database after 30 days. During this period you have the option to reactivate the contacts. A restore is not possible once deferred deletion has expired. In the Designer, you can set an alternative delay on the ADSContact table.
Active Directory groups
Read the documentation for your Active Directory for an explanation of group concepts under Windows Server.
In Active Directory, contacts, computers, and groups can be collected into groups for which the access to resources can be regulated not only within a domain but across domains.
We distinguish between two group types:
- Security groups
Authorizations are issued through security groups. User accounts, computers, and other groups are added to security groups and which makes administration easier. Security groups are also used for email distribution groups.
- Distribution groups
Distribution groups can be used as email-enabled distribution groups. Distribution groups do not have any security.
In addition, a group area is defined for each group type. Permitted group types are:
- Universal
Groups within this scope are described as universal groups. Universal groups can be used to make cross-domain authorizations available. Universal group members can be user accounts and groups from all domains in one domain structure.
- Local domain
Groups in this scope are described as groups of the local domain. Local groups are used when authorizations are issued within the same domain. Members of a domain local group can be user accounts, computers, or groups in any domain.
- Global
Groups within this scope are described as global groups. Global groups can be used to make cross-domain authorizations available. Members of a global group are only user accounts, computers, and groups belonging to the global group’s domain.
Related topics
Entering master data for Active Directory groups
To edit group master data
-
In the Manager, select the Active Directory | Groups category.
-
Select the group in the result list and run the Change master data task.
-
On the master data form, edit the master data for the group.
- Save the changes.
Detailed information about this topic