Synchronizing user passwords between two AD domains
You can automatically synchronize user passwords from one Active Directory domain to the other by using . The next procedure assumes that is already connected to the source and target domains. For more information, see Creating an Active Directory connection.
To synchronize user passwords between two AD domains
- Install Capture Agent on all domain controllers in the source and target Active Directory domains.
- Use the pwdHash attribute to perform an initial synchronization of user passwords between the source and target domains:
- Create a new or choose an existing creating or updating synchronization step for the source and target domains.
- If you use an updating synchronization step, ensure that user objects in the source domain are properly mapped to their counterparts in the target domain. For more information on mapping objects, see Mapping objects.
- In the creating or updating synchronization step, configure a rule to synchronize the pwdHash attribute value from the user objects in the source domain to their counterparts in the target domain.
- Run the creating or updating synchronization step to perform an initial synchronization of user passwords from the source to the target domain.
Step 2 allows you to synchronize user passwords only once. If you want to synchronize all subsequent password changes on a permanent basis, complete step 3.
- Create a recurring run schedule for the synchronization step you configured in step 1 of this procedure. For instructions, see Running a sync workflow on a recurring schedule.
- To synchronize all subsequent password changes from the source to the target domain, do one of the following:
- Configure a password sync rule to automate the password synchronization between the two Active Directory domains. For instructions, see Automated password synchronization.
Synchronizing SID history of users or groups
You can use to synchronize SID history between user or group objects in two Active Directory domains. For example, you can synchronize SID history when migrating users from one Active Directory domain to the other.
Before you start synchronizing SID history, consider the following:
- To read SID data in the source Active Directory domain, you can use the sIDHistory or objectSid attribute.
- To write SID data to the target Active Directory domain, always use the sIDHistory attribute.
To synchronize SID history of users or groups
- Install Capture Agent on all domain controllers in the source and target Active Directory domains you want to participate in the SID history synchronization.
For instructions on how to install Capture Agent, see Managing Capture Agent.
- Use the Specified domain controller option to connect to the source and target domains.
For instructions on how to connect to an Active Directory domain, see Creating an Active Directory connection.
- Create a new or choose an existing creating or updating synchronization step for the source and target domains.
If you use an updating synchronization step, ensure that user or group objects in the source domain are properly mapped to their counterparts in the target domain. For more information on mapping objects, see Mapping objects.
- Configure the synchronization step to do the following:
- Read SID data in the source Active Directory domain. For this purpose, you can use the sIDHistory attribute or the objectSid attribute, or both.
- Write SID data to the target Active Directory domain by using the sIDHistory attribute.
To read attribute values in the source domain and write them to the target domain, you can configure attribute modification rules in your sync workflow step. For detailed instructions, see Modifying attribute values by using rules.
- Run the created step to synchronize SID history.
Working with an AD LDS (ADAM) instance
This section explains how to create or modify a connection to an AD LDS (ADAM) instance so that could work with data in that data system.
To create a connection to an AD LDS (ADAM) instance, you need to use in conjunction with a special connector called AD LDS (ADAM) Connector. This connector is included in the package.
The AD LDS (ADAM) Connector supports the following features:
Table 7: Supported features
Bidirectional synchronization
Allows you to read and write data in the connected data system. |
Yes |
Delta processing mode
Allows you to process only the data that has changed in the connected data system since the last synchronization operation, thereby reducing the overall synchronization operation time. |
Yes |
Password synchronization
Allows you to synchronize user passwords from an Active Directory domain to the connected data system. |
Yes |
In this section:
Creating an AD LDS (ADAM) instance connection
To create a new connection
- In the Administration Console, open the Connections tab.
- Click Add connection, and then use the following options:
- Connection name. Type a descriptive name for the connection.
- Use the specified connector. Select AD LDS (ADAM) Connector.
- Click Next.
- On the Specify connection settings page, use the following options:
- Server. Type the fully qualified domain name of the computer on which the AD LDS (ADAM) instance to which you want to connect is running.
- Port. Type the LDAP communication port number used by the AD LDS (ADAM) instance.
- Access AD LDS (ADAM) instance using. Use this option to select one of the following:
- Synchronization Service account. Allows you to access the target AD LDS (ADAM) instance in the security context of the account under which the is running.
- Windows account. Allows you to access the target AD LDS (ADAM) instance in the security context of the account whose user name and password you specify below this option.
- Advanced. Click to specify advanced settings for connecting to the AD LDS (ADAM) instance.
- Test Connection. Click this button to verify the specified connection settings.
- Click Finish to create a connection to the AD LDS (ADAM) instance.