Chatee ahora con Soporte
Chat con el soporte

Active Roles 8.0.1 LTS - Synchronization Service Administration Guide

Synchronization Service Overview Deploying Synchronization Service Getting started Connections to external data systems
External data systems supported with built-in connectors
Working with Active Directory Working with an AD LDS (ADAM) instance Working with Skype for Business Server Working with Oracle Working with Exchange Server Working with Active Roles Working with One Identity Manager Working with a delimited text file Working with Microsoft SQL Server Working with Micro Focus NetIQ Directory Working with Salesforce Working with ServiceNow Working with Oracle Unified Directory Working with an LDAP directory service Working with IBM DB2 Working with IBM AS/400 Working with an OpenLDAP directory service Working with IBM RACF connector Working with MySQL database Working with an OLE DB-compliant relational database Working with SharePoint Working with Microsoft 365
Creating a Microsoft 365 connection Modifying a Microsoft 365 connection Microsoft 365 data supported for data synchronization
ClientPolicy object attributes supported for Microsoft 365 data synchronization ConferencingPolicy object attributes supported for Microsoft 365 data synchronization Contact object attributes supported for Microsoft 365 data synchronization DistributionGroup object attributes supported for Microsoft 365 data synchronization Domain object attributes supported for Microsoft 365 data synchronization DynamicDistributionGroup object attributes supported for Microsoft 365 data synchronization ExternalAccessPolicy object attributes supported for Microsoft 365 data synchronization HostedVoicemailPolicy object attributes supported for Microsoft 365 data synchronization LicensePlanService object attributes supported for Microsoft 365 data synchronization Mailbox object attributes supported for Microsoft 365 data synchronization MailUser object attributes supported for Microsoft 365 data synchronization PresencePolicy object attributes supported for Microsoft 365 data synchronization SecurityGroup object attributes supported for Microsoft 365 data synchronization SPOSite object attributes supported for Microsoft 365 data synchronization SPOSiteGroup object attributes supported for Microsoft 365 data synchronization SPOWebTemplate object attributes supported for Microsoft 365 data synchronization SPOTenant object attributes supported for Microsoft 365 data synchronization User object attributes supported for Microsoft 365 data synchronization VoicePolicy object attributes supported for Microsoft 365 data synchronization Microsoft 365 Group attributes supported for Microsoft 365 data synchronization Changing the display names of synchronized Microsoft 365 licenses and services
Objects and attributes specific to Microsoft 365 services How the Microsoft 365 Connector works with data
Working with Microsoft Azure Active Directory Configuring data synchronization with the SCIM Connector Configuring data synchronization with the Generic SCIM Connector
Using connectors installed remotely Creating a connection Renaming a connection Deleting a connection Modifying synchronization scope for a connection Using connection handlers Specifying password synchronization settings for a connection
Synchronizing identity data Mapping objects Automated password synchronization Synchronization history Scenarios of use
About scenarios Scenario 1: Create users from a .csv file to an Active Directory domain Scenario 2: Use a .csv file to update user accounts in an Active Directory domain Scenario 3: Synchronizing data between One Identity Manager Custom Target Systems and an Active Directory domain Scenario 4: Deprovisioning between One Identity Manager Custom Target Systems and an Active Directory domain Scenario 5: Provisioning of Groups between One Identity Manager Custom Target Systems and an Active Directory domain Scenario 6: Enabling Delta Sync mode between One Identity Manager Custom Target Systems and an Active Directory domain Example of using the Generic SCIM Connector for data synchronization
Appendix A: Developing PowerShell scripts for attribute synchronization rules Appendix B: Using a PowerShell script to transform passwords

Step 8: Verify on One Identity Manager

To verify if the data is synchronized to One Identity Manager:

Open the One Identity Manager console and verify that all the users from the AD are synchronized with One Identity Manager as per the provisioning rules that were set.

Scenario 4: Deprovisioning between One Identity Manager Custom Target Systems and an Active Directory domain

Scenario 4: Deprovisioning between One Identity Manager Custom Target Systems and an Active Directory domain

The Deprovisioning operation in data synchronization using Synchronization Service allows you to modify or remove objects in the target data system after their counterparts have been disconnected from the source data system. Synchronization Servicecan be configured to remove target objects permanently or change them to a specific state. To specify the objects that will participate in the deprovision operation you can use object mapping rules. This scenario describes how to create a deprovisioning step for a workflow to modify or delete the synchronized objects in the target system based on the deprovisioning criteria that is set.

To create a deprovisioning step:

  1. In the Synchronization Service Administration Console, open the Sync Workflows tab, and then click the workflow AD to OneIM Sync.
  2. Click Add synchronization step.
  3. On the Select an action dialog box, select Deprovision, and then click Next.
  4. On the Specify source and criteria dialog box, click Specify, click Add new connected system or Select existing connected system, and then step through the wizard to add the Active Directory Test AD as a connected system.
  5. Specify a deprovisioning criteria by selecting one of the following:
    • Source object is deleted or out of synchronization scope
    • Source object deprovisioning is initiated in connected system
    • Source object meets these criteria - Add the criteria for the source objects to be deprovisioned in the target system
  6. Click Next.
  7. On the Specify target dialog box, click Specify.
  8. Click Add new connected system or Select existing connected system, and then step through the wizard to add the target One Identity Manager domain as a connected system.
  9. Click Select, to add the required target object type.
  10. On the Select Object Type dialog box, select the object type UNSAccountB from the list of object types and click Ok.
  11. On the Specify deprovisioning action dialog box, select the one of the following action to deprovision:
    • Delete target objects
    • Initiate the object deprovisioning in <target system>
    • Modify target objects - Click Forward Synch rule and select the attributes to modify the object attributes.
  12. Click Next.

    The Deprovisioning step with the rules for the specified deprovisioning action is created.

Scenario 5: Provisioning of Groups between One Identity Manager Custom Target Systems and an Active Directory domain

Scenario 5: Provisioning of Groups between One Identity Manager Custom Target Systems and an Active Directory domain

Synchronization Service allows you to ensure that group membership information is in sync in all connected data systems. For example, when provisioning a group object from an Active Directory domain to One Identity Manager domain, you can configure rules to synchronize the Member attribute from the source to the target domain.

This scenario describes how to create a provisioning step for a workflow to synchronize group objects between the source and target systems.

To create a group provisioning step:

  1. In the Synchronization Service Administration Console, open the Sync Workflows tab, and then click the workflow AD to OneIM Sync.
  2. Click Add synchronization step.
  3. On the Select an action dialog box, select Creation, and then click Next.
  4. On the Specify source and criteria dialog box, click Specify, click Add new connected system or Select existing connected system, and then step through the wizard to add the Active Directory Test AD as a connected system.
  5. In Specify object type field, click Select and from the Select Object type list, select Group and then click OK.
  6. In the Provisioning Criteria section, click Add.
  7. On the Select Container dialog box, from the containers list, select the required container and click OK.
  8. Click Next.
  9. On the Specify target dialog box, click Specify.
  10. Click Add new connected system or Select existing connected system, and then step through the wizard to add the target One Identity Manager domain as a connected system.
  11. Click Select, to add the required target object type.
  12. On the Select Object Type dialog box, select the object type UNSGroupB from the list of object types.
  13. Click Ok.

    The Group provisioning step is created.

Scenario 6: Enabling Delta Sync mode between One Identity Manager Custom Target Systems and an Active Directory domain

Scenario 6: Enabling Delta Sync mode between One Identity Manager Custom Target Systems and an Active Directory domain

The Delta processing mode of the Synchronization Service allows you to synchronize identities between the source and the target systems for only the data that has changed in the source and target connected systems since their last synchronization.

This scenario describes how to enable the delta processing mode between the source (Active Directory domain) and target (One Identity Manager) systems.

To enable the delta processing mode:

  1. Step 1: Create a sync workflow for provisioning data synchronization between the source (Active Directory) and target (One Identity Manager) system.
  2. Step 2: Add a creating step for the workflow to provision users from the source system to target system.
  3. Click on the synchronization step for provision of users.
  4. In the General Options tab, specify the delta process mode:
    1. Under Source Connected System select the option Process delta from last run.
    2. Under Target Connected System select the option Process delta from last run.
  5. Click Save and continue.

    NOTE: Before any data has been processed from the source to the target system, the initial synchronization of data is always performed in the Process all delta mode.

  1. Step 3: Run the configured creating step.

    The data for the users added or updated to the source since the previous run, is displayed under Processed Objects.

 

Documentos relacionados

The document was helpful.

Seleccionar calificación

I easily found the information I needed.

Seleccionar calificación