Tchater maintenant avec le support
Tchattez avec un ingénieur du support

Active Roles On Demand Hosted - Synchronization Service Administration Guide

Synchronization Service Overview Deploying Synchronization Service Getting started Connections to external data systems
External data systems supported out of the box
Working with Active Directory Working with an AD LDS (ADAM) instance Working with Skype for Business Server Working with Oracle Working with Exchange Server Working with Active Roles Working with One Identity Manager Working with a delimited text file Working with Microsoft SQL Server Working with Micro Focus NetIQ Directory Working with Salesforce Working with ServiceNow Working with Oracle Unified Directory Working with an LDAP directory service Working with IBM DB2 Working with IBM AS/400 Working with an OpenLDAP directory service Working with IBM RACF connector Working with MySQL database Working with an OLE DB-compliant relational database Working with SharePoint Working with Microsoft Office 365 Working with Microsoft Azure Active Directory Working with SCIM
Using connectors installed remotely Creating a connection Renaming a connection Deleting a connection Modifying synchronization scope for a connection Using connection handlers Specifying password synchronization settings for a connection
Synchronizing identity data Mapping objects Automated password synchronization Synchronization history Scenarios of use Appendix A: Developing PowerShell scripts for attribute synchronization rules Appendix B: Using a PowerShell script to transform passwords

Configuring Active Roles Synchronization Service

Configuring Synchronization Service

You can modify the default values of the Synchronization Service parameters related to password synchronization. These parameters and their default values are described in the next table.


Table 125: Synchronization Service parameters



Default Value

Interval between attempts to reset password

The Capture Agent sends information on changes made to Active Directory user passwords to Synchronization Service. After receiving this information, Synchronization Service tries to reset passwords in the target connected systems you specified.

This parameter determines the time interval (in minutes) between attempts to reset passwords in the target connected systems.

10 minutes

Synchronization Service connection point update period

Synchronization Service publishes its connection point in Active Directory.

This parameter determines the frequency of updates (in minutes) of the Synchronization Service connection point.

60 minutes

Certificate to encrypt Capture Agent traffic

This parameter specifies the thumbprint of the certificate used to encrypt the password sync traffic between Capture Agent and Synchronization Service. The same certificate must be used for the Capture Agent and the Synchronization Service.

By default, a built-in certificate is used.

You can modify the Synchronization Service parameters using Group Policy and the Administrative Template supplied with Synchronization Service.

To modify Synchronization Service parameters using Group Policy

  1. On the computer running the Synchronization Service, start Group Policy Object Editor, and then connect to the Local Computer Policy Group Policy object.
  2. In the Group Policy Object Editor console, expand the Local Computer Policy node, expand the Computer Configuration node, and select Administrative Templates.
  3. On the Action menu, point to All Tasks, and click Add/Remove Templates.
  4. In the Add/Remove Templates dialog box, click Add, and then use the Policy Templates dialog box to open the SyncService.adm file that holds the Administrative Template.

    By default, the SyncService.adm file is stored in <Active Roles installation folder>\SyncService\Administrative Templates

  1. Under Computer Configuration\Administrative Templates\Active Roles, select Sync Service Settings, and then in the details pane, configure the appropriate group policy settings.

    The names of group policy settings correspond to the names of the Synchronization Service parameters provided in the table in Configuring Capture Agent.

  1. For the changes to take effect, refresh the Group Policy settings by running the following command at a command prompt: gpupdate /force

Specifying a custom certificate for encrypting password sync traffic

By default, Synchronization Service uses a built-in certificate to encrypt password sync traffic between the Capture Agent and the Synchronization Service. If necessary, you can use a custom certificate for this purpose.


  • SSL certificates signed with MD5 algorithm are not supported.
  • Backward compatibility for Quick Connect v5.5 with Active Roles Synchronization Service Capture Agent v7.5 can be achieved through custom certificate signed with SHA algorithm.

This section illustrates how to use a custom certificate for encrypting the password synchronization traffic in Windows Server (2016 or later).

Complete the following steps:

Step 1: Obtain and install a certificate

To obtain and install a certificate, you have to make a certificate request. There are two methods to request a certificate in Windows Server (2016 or later):

  • Request certificates using the Certificate Request Wizard. To request certificates from a Windows Server enterprise certification authority, you can use the Certificate Request Wizard.
  • Request certificates using the Windows Server Certificate Services Web interface. Each certification authority that is installed on a computer running Windows Server has a Web interface that allows the users to submit certificate requests. By default, the Web interface is accessible at http://servername/certsrv, where servername refers to the name of the computer running Windows Server.

This section provides steps to request certificates using the Windows Server Certificate Services Web interface. For detailed information about the Certificate Request Wizard, refer to the documentation on Certification Authority.

To request a certificate using the Windows Server Certificate Services Web interface

  1. Use a Web browser to open to http://servername/certsrv, where servername refers to the name of the Web server running Windows Server where the certification authority that you want to access is located.
  2. On the Welcome Web page, click Request a certificate.
  3. On the Request a Certificate Web page, click advanced certificate request.
  4. On the Advanced Certificate Request Web page, click Create and submit a certificate request to this CA.
  5. On the Web page that opens, do the following:
    • Select the Store certificate in the local computer certificate store check box.
    • Under Additional Options, select the PKCS10 option, and in the Friendly Name text box, specify a name for your certificate (such as My QC Certificate).

    Keep default values for all other options.

  1. Click Submit.
  2. On the Certificate Issued Web page, click Install this certificate.

After you install the certificate, it becomes available in the Certificates snap-in, in the Personal/Certificates store.

Step 2: Export custom certificate to a file

In this step, you export the issued certificate to a file. You will need the file to install the certificate on each domain controller running Capture Agent and on each computer running Synchronization Service.

To export the certificate

  1. On the computer where you installed the certificate in step 1, open the Certificates - Local Computers snap-in.
  2. In the console tree, click the Personal/Certificates store.
  3. In the details pane, click the issued certificate you want to export.
  4. On the Action menu, point to All Tasks, and then click Export.
  5. Step through the wizard.
  6. On the Export Private Key page, select Yes, export the private key, and then click Next.

    This option is available only if the private key is marked as exportable and you have access to the private key.

  1. On the Export File Format page, do the following, and then click Next:
    • To include all certificates in the certification path, select the Include all certificates in the certification path if possible check box.
    • To enable strong protection, select the Enable strong protection (requires IE 5.0, NT 4.0 SP4 or above) check box.
  2. On the Password page, use the Password text box to type a password to encrypt the private key you are exporting. In Confirm password, type the same password again, and then click Next.
  3. On the File to Export page, use the File name text box to specify the PKCS #12 file to which you want to export the certificate along with the private key, and click Next.
  4. On the Completion page, revise the specified settings and click Finish to create the file and close the wizard.
Documents connexes

The document was helpful.

Sélectionner une évaluation

I easily found the information I needed.

Sélectionner une évaluation