Chatta subito con l'assistenza
Chat con il supporto

Identity Manager 9.2 - Administration Guide for Connecting to Active Directory

Managing Active Directory environments Synchronizing an Active Directory environment
Setting up initial synchronization with an Active Directory domain Adjusting the synchronization configuration for Active Directory environments Running synchronization Tasks following synchronization Troubleshooting Ignoring data error in synchronization Pausing handling of target system specific processes (Offline mode)
Managing Active Directory user accounts and identities
Account definitions for Active Directory user accounts and Active Directory contacts Assigning identities automatically to Active Directory user accounts Supported user account types Updating identities when Active Directory user account are modified Automatic creation of departments and locations based on user account information Specifying deferred deletion for Active Directory user accounts and Active Directory contacts
Managing memberships in Active Directory groups Login credentials for Active Directory user accounts Mapping Active Directory objects in One Identity Manager
Active Directory domains Active Directory container structures Active Directory user accounts Active Directory contacts Active Directory groups Active Directory computers Active Directory security IDs Active Directory printers Active Directory sites Reports about Active Directory objects
Handling of Active Directory objects in the Web Portal Basic data for managing an Active Directory environment Configuration parameters for managing an Active Directory environment Default project template for Active Directory Processing methods of Active Directory system objects Active Directory connector settings

Automatic creation of departments and locations based on user account information

You can create new departments and locations in One Identity Manager based on user account department and location data. Furthermore, departments, and locations are assigned to identities of the user accounts as primary department and primary location. These identities can obtain their company resources through these assignments if One Identity Manager is configured correspondingly.

Prerequisites for using this method

Identities must be created automatically when user accounts are added or modified. At least one of the following configuration parameters must be activated and the corresponding method implemented.

Table 13: Configuration Parameter for automatic identity assignment
Configuration parameter Effect when set

TargetSystem | ADS | PersonAutoDefault

Automatic identity assignment for user accounts added to the database outside synchronization based on the given mode.

TargetSystem | ADS | PersonAutoFullsync

Based on the given mode, automatic identity assignment is carried out on user accounts created or updated in the database by synchronization.

TargetSystem | ADS | PersonUpdate

Identities are updated continuously from linked user accounts.

To implement this method

  • In the Designer, set the TargetSystem | ADS | AutoCreateDepartment configuration parameter to generate departments from the user account information.

  • In the Designer, set the TargetSystem | ADS | AutoCreateLocality configuration parameter to generate locations from the user account information.

Related topics

Specifying deferred deletion for Active Directory user accounts and Active Directory contacts

You can use deferred deletion to specify how long the user accounts remain in the database after deletion is triggered before they are finally removed. By default, user accounts are finally deleted from the database after 30 days. First, the user accounts are disabled or locked. You can reenable the user accounts up until deferred deletion runs. After deferred deletion is run, the user accounts are deleted from the database and cannot be restored anymore.

You have the following options for configuring deferred deletion.

  • Global deferred deletion: Deferred deletion applies to user accounts in all target system. The default value is 30 days.

    In the Designer, enter a different value for deferred deletion in the Deferred deletion [days] property of the ADSAccount and the ADSContact tables.

  • Object-specific deferred deletion: Deferred deletion can be configured depending on certain properties of the accounts.

    To use object-specific deferred deletion, in the Designer, create a Script (deferred deletion) for the ADSAccount and ADContact tables.

    Example:

    Deferred deletion of privileged user accounts is 10 days. The following Script (deferred deletion) is entered in the table.

    If Not $IsPrivilegedAccount:Bool$ Then

    Value = 10

    End If

For more information on editing table definitions and configuring deferred deletion in the Designer, see the One Identity Manager Configuration Guide.

Managing memberships in Active Directory groups

Active Directory user accounts, Active Directory contacts, and Active Directory computers can be grouped into Active Directory groups that can be used to regulate access to resources.

In One Identity Manager, you can assign Active Directory groups directly to user accounts, contacts, and computers or they can be inherited through departments, cost centers, locations, or business roles. Users can also request the groups through the Web Portal. To do this, groups are provided in the IT Shop.

Detailed information about this topic

Assigning Active Directory groups to Active Directory user accounts, Active Directory contacts, and Active Directory computers

Active Directory groups can be assigned directly or indirectly to Active Directory user accounts, Active Directory contacts, and Active Directory computers.

Identities (workdesks or devices) and Active Directory groups are grouped into hierarchical roles in the case of indirect assignment. The number of Active Directory groups assigned to an identity (workdesk or device) is calculated from the position within the hierarchy and inheritance direction.

  • If you add an identity to roles and that identity owns an Active Directory user account, the Active Directory user account is added to the Active Directory group.

  • If you add an identity to roles and that identity owns an Active Directory contact, the Active Directory contact is added to the Active Directory group.

  • If you add a device to roles, the Active Directory computer that references the device is added to the Active Directory groups.

  • If a device owns a workdesk and you add the workdesk to roles, the Active Directory computer, which references this device, is also added to all Active Directory groups of the workdesk's roles.

Furthermore, Active Directory groups can be requested through the Web Portal. To do this, add identities to a shop as customers. All Active Directory groups are assigned to this shop can be requested by the customers. Requested Active Directory groups are assigned to the identities after approval is granted.

Through system roles, Active Directory groups can be grouped together and assigned to identities and workdesks as a package. You can create system roles that contain only Active Directory groups. You can also group any number of company resources into a system role.

To react quickly to special requests, you can also assign Active Directory groups directly to Active Directory user accounts and Active Directory computers.

For more information see the following guides:

Topic

Guide

Basic principles for assigning and inheriting company resources

One Identity Manager Identity Management Base Module Administration Guide

One Identity Manager Business Roles Administration Guide

Assigning company resources through IT Shop requests

One Identity Manager IT Shop Administration Guide

System roles

One Identity Manager System Roles Administration Guide

Detailed information about this topic
Related Documents

The document was helpful.

Seleziona valutazione

I easily found the information I needed.

Seleziona valutazione