Active Directory specific main data for Active Directory domains
Enter the following main data for Active Directory:
Table 25: Active Directory data
Domain name (pre Win2000) |
Pre-Windows 2000 computer name. |
Full domain name |
Name of the domain confirming to DNS syntax.
<name of this domain>.<name of parent domain>.<name of root domain>. |
Account manager |
Manager responsible for the domain.
To specify an account manager
- Click next to the field.
- In the Table menu, select the table that maps the account manager.
- In the Account manager menu, select the manager.
- Click OK.
|
Distinguished name |
Distinguished name of the domain. The distinguished name is determined using a template from the full domain name and cannot be edited. |
Forest |
The name of the forest to which the domain belongs. This name should be given if group memberships are mapped cross-domain. |
Enable recycling bin |
(As of functional level Windows Server 2008 R2) Specifies whether the recycling bin is enabled. The property is imported by the synchronization and should not be edited in One Identity Manager. |
Retention period |
(As of function level Windows Server 2008 R2) Retention period of objects in the recycling bin. The property is imported by the synchronization and should not be edited in One Identity Manager. |
Complex passwords |
Specifies whether complex passwords are implemented in the domain. Complex passwords must fulfill certain minimum prerequisites. For more information, see the documentation for implementing Windows Server.
For domains from the functional levels Windows Server 2008 R2 and above, it is possible to define this setting using account policies. |
Default home drive |
Default home drive to be connected when a user logs in. |
Structural object class |
Structural object class representing the object type. By default, the domains in One Identity Manager are created using the object class DOMAINDNS. |
Object class |
List of classes defining the attributes for this object. The object classes listed are read in from the database during synchronization with the Active Directory environment. You can also enter object classes in to the input field. |
Related topics
Defining categories for the inheritance of Active Directory groups
Groups and be selectively inherited by user accounts and contacts in One Identity Manager. The groups and user accounts (contacts) are divided into categories in the process. The categories can be freely selected and are specified using a mapping rule. Each category is given a specific position within the template. The mapping rule contains tables that map the user accounts (contact) and the groups. Specify your categories for user account (contacts) in the table for user accounts (contacts). Enter your categories fro groups in the group table. Each table contains the Position 1 to Position 31 category positions.
To define a category
-
In the Manager, select the Active Directory > Domains category.
-
Select the domain in the result list.
-
Select the Change main data task.
-
Select the Categories tab.
-
Expand the root in the respective table.
-
To enable the category, double-click .
-
Enter a category name for user accounts, contacts, and groups in your login language.
- Save the changes.
Detailed information about this topic
Displaying information about the Active Directory forest
The information about the forest is required in One Identity Manager to map trusted domains and group memberships across domains.
The information about the Active Directory forest is loaded into One Identity Manager during synchronization.
To display information about a forest
-
In the Manager, select the Active Directory > Forest category.
-
Select a forest in the result list.
-
To display a domain's forest, select the Forest overview task.
-
To display a forest's main data, select the Change main data task.
Related topics
Entering and testing trusted Active Directory domains
For an explanation of the concept of trusts in Active Directory, refer to your Windows Server documentation. Users can access resources in other domains depending on the domain trusts.
-
Explicit trusts are loaded into Active Directory by synchronizing with One Identity Manager. Domains which are trusted by the currently synchronized domains are found.
-
To declare implicit two-way trusts between domains within an Active Directory forest in One Identity Manager, ensure that the parent domain is entered in all child domains.
To enter the parent domain
-
In the Manager, select the Active Directory > Domains category.
-
Select the domain in the result list.
-
Select the Change main data task.
-
Enter the parent domain.
-
Save the changes.
Implicit trusts are created automatically.
To test trusted domains
-
In the Manager, select the Active Directory > Domains category.
-
Select the domain in the result list.
-
Select Specify trust relationships.
This shows domains that trust the selected domain.