지금 지원 담당자와 채팅
지원 담당자와 채팅

Identity Manager 8.1.4 - Administration Guide for Connecting to Active Directory

Managing Active Directory environments Setting up Active Directory synchronization Basic data for managing an Active Directory environment
Account definitions for Active Directory user accounts Password policies for Active Directory user accounts Initial password for new Active Directory user accounts Email notifications about login data User account names Target system managers Editing a server
Active Directory domains Active Directory user accounts
Linking user accounts to employees Supported user account types Entering master data for Active Directory user accounts Additional tasks for managing Active Directory user accounts Automatic assignment of employees to Active Directory user accounts Updating employees when Active Directory user account are modified Automatic creation of departments and locations based on user account information Disabling Active Directory user accounts Deleting and restoring Active Directory user accounts
Active Directory contacts Active Directory groups
Entering master data for Active Directory groups Validity of group memberships Assigning Active Directory groups to Active Directory user accounts, Active Directory contacts, and Active Directory computers Additional tasks for managing Active Directory groups Deleting Active Directory groups Default solutions for requesting Active Directory groups and group memberships
Active Directory security IDs Active Directory container structures Active Directory computers Active Directory printers Active Directory locations Reports about Active Directory objects Configuration parameters for managing an Active Directory environment Default project template for Active Directory

Users and permissions for synchronizing with Active Directory

The following users are involved in synchronizing One Identity Manager with Active Directory.

Table 2: Users for synchronization
User Permissions
User for accessing Active Directory You must provide a user account with the following authorizations for full synchronization of Active Directory objects with the supplied One Identity Manager default configuration.
  • Member of the Active Directory group Domain administrators

NOTE: In a hierarchical domain structure, the user account of the One Identity Manager Service child domain must be a member of the Enterprise Admins.

We cannot recommend any practical minimum configuration with different permissions in terms of user administration from a member of the group Domain administrators.

One Identity Manager Service user account

The user account for One Identity Manager Service requires permissions to carry out operations at file level. For example, assigning permissions and creating and editing directories and files.

The user account must belong to the Domain users group.

The user account must have the Login as a service extended user permissions.

The user account requires access permissions to the internal web service.

NOTE: If One Identity Manager Service runs under the network service (NT Authority\NetworkService), you can issue access permissions for the internal web service with the following command line call:

netsh http add urlacl url=http://<IP address>:<port number>/ user="NT AUTHORITY\NETWORKSERVICE"

The user account needs full access to the One Identity Manager Service installation directory in order to automatically update One Identity Manager.

In the default installation, One Identity Manager is installed under:

  • %ProgramFiles(x86)%\One Identity (on 32-bit operating systems)
  • %ProgramFiles%\One Identity (on 64-bit operating systems)

Setting Remote Access Service (RAS) properties requires Remote Procedure Calls (RPC) which are executed in the context of the One Identity Manager Service user account. To read or write these properties, the One Identity Manager Service user account must have the necessary permissions.

User for accessing the One Identity Manager database

The Synchronization default system user is provided to execute synchronization with an application server.

Necessary access rights explained

The synchronization base object in Active Directory requires the following access rights:

  • Read
  • Write

If the base object is the domain object, these access rights are required for reading and setting domain properties like, for example, password guidelines.

The following access rights are required for working unrestricted below the base object:

  • Create All Child Objects
  • Delete All Child Objects

In order to enable editing of specific properties in a user object that result in a change to the permission list of an Active Directory object (for example, the property Password cannot be changed), the following permissions are required:

  • Read Permissions
  • Modify Permissions

Prerequisite for further privileges:

  • Modify Owner

Normally only group administrators have this privilege. If the One Identity Manager Service user account is not a member of this group or any equivalent group, it must put in a position to cope with accounts without any permissions.

The following access rights are required because all an object's values can, in principle, be modified through One Identity Manager:

  • Read All Properties
  • Write All Properties
  • All Extended Rights
  • DeleteSubTree

Essentially user account functionality is partially stored as an entry in the permissions list (DACL) of an Active Directory object. The One Identity Manager Service user account must be able to modify this DACL. Example of properties maintained using DACL are UserCanNotChangePassword for the user account, or AllowWriteMembers for the group.

Modifying a DACL assumes a wide range of permissions. If a user account that does not have the Full Control permissions for the corresponding Active Directory object is used for changing a DACL, the change is only accepted under the following conditions.

  • The user account is the owner of the object.

    – OR –

  • The user account is member of the same primary group as the object owner. This is usually the Domain administrators group.

Otherwise the modifications are rejected. If the Take Ownership permission is assigned to the user account, it is possible to initiate a change of owner and change the DACL accordingly. However, this falsifies the permissions state of the Active Directory object and is not recommended.

Furthermore, you require domain administrator permissions to use the delete and restore functions of the Active Directory recycling bin and for dealing with specially protected user account and groups.

Notes for read permissions

In theory, the part of the synchronization with the Active Directory that imports the Active Directory objects into the One Identity Manager database also functions if only Read permissions and not Write permissions are assigned to the structure.

The following problems may occur:

  • To include a user account for which only Read permissions exist in a group that is not the primary group of the user account, the One Identity Manager Service must have at least Write permissions for the group object.
  • Error states between the One Identity Manager database and Active Directory data occur, if One Identity Manager administration tools or database imports result in the creation of, or changes to objects in the Active Directory for which only Read permissions exist. These cases can be excluded with the suitable menu navigation in the administration tools, One Identity Manager object access rights and by taking appropriate precautions when importing.
Notes on the One Identity Manager Active Directory edition

For the One Identity Manager Active Directory edition, full Read permissions are required, as well as permissions for creating, changing, and deleting groups.

Communications ports and firewall configuration

One Identity Manager is made up of several components that can be executed in different network segments. In addition, One Identity Manager requires access to various network services, which can also be installed in different network segments. You must open various ports depending on which components and services you want to install behind the firewall.

The following ports are required:

Table 3: Communications port
Default port Description

1433

Port for communicating with the One Identity Manager database.

1880

Port for the HTTP protocol of One Identity Manager Service.

2880

Port for access tests with the Synchronization Editor, such as in the target system browser or for simulating synchronization.

80

Port for accessing web applications.

88

Kerberos authentication system. (if Kerberos authentication is implemented). Required for authentication against Active Directory.

135 Microsoft End Point Mapper (EPMAP) (also, DCE/RPC Locator Service).
137 NetBIOS Name Service.
139 NetBIOS Session Service.
389 Lightweight Directory Access Protocol (LDAP Standard). Target system server communications port.
445 Microsoft-DS Active Directory, Windows shares. Required for synchronization (TCP/UDP)
53 Domain Name System (DNS), mainly through UDP. Required for access to the Active Directory total structure.

636

Lightweight Directory Access Protocol using TLS/SSL (LDAP S). Required for access to the Active Directory total structure.

3268

Global catalog. Required for searching in the global catalog. Either port 3268 or 3269 should be open depending on the connection settings.

3269

Global catalog over SSL. Required for searching in the global catalog. Either port 3268 or 3269 should be open depending on the connection settings.

Setting up the synchronization server

To set up synchronization with an Active Directory environment, a server has to be available that has the following software installed on it:

  • Windows operating system

    The following versions are supported:

    • Windows Server 2008 R2 (non-Itanium based 64-bit) service pack 1 or later

    • Windows Server 2012

    • Windows Server 2012 R2

    • Windows Server 2016

    • Windows Server 2019

  • Microsoft .NET Framework Version 4.7.2 or later

    NOTE: Take the target system manufacturer's recommendations into account.
  • One Identity Manager Service, Active Directory connector
    • Install One Identity Manager components with the installation wizard.
      1. Select the Select installation modules with existing database option.
      2. Select the Server | Job server | Active Directory machine role.

All One Identity Manager Service actions are executed against the target system environment on the synchronization server. Data entries required for synchronization and administration with the One Identity Manager database are processed by the synchronization server. The synchronization server must be declared as a Job server in One Identity Manager.

NOTE: If several target system environments of the same type are synchronized under the same synchronization server, it is recommended that you set up a Job server for each target system for performance reasons. This avoids unnecessary swapping of connections to target systems because a Job server only has to process tasks of the same type (re-use of existing connections).

Use the One Identity Manager Service to install the Server Installer. The program executes the following steps:

  • Sets up a Job server.

  • Specifies machine roles and server function for the Job server.

  • Remotely installs One Identity Manager Service components corresponding to the machine roles.

  • Configures the One Identity Manager Service.

  • Starts the One Identity Manager Service.

NOTE: To generate processes for the Job server, you need the provider, connection parameters, and the authentication data. By default, this information is determined from the database connection data. If the Job server runs through an application server, you must configure extra connection data in the Designer. For detailed information about setting up Job servers, see the One Identity Manager Configuration Guide.

NOTE: The program performs a remote installation of the One Identity Manager Service. Local installation of the service is not possible with this program. Remote installation is only supported within a domain or a trusted domain.

To remotely install the One Identity Manager Service, you must have an administrative workstation on which the One Identity Manager components are installed. For detailed information about installing a workstation, see the One Identity Manager Installation Guide.

To remotely install and configure One Identity Manager Service on a server

  1. Start the Server Installer program on your administrative workstation.

  2. On the Database connection page, enter the valid connection credentials for the One Identity Manager database.

  3. On the Server properties page, specify the server on which you want to install the One Identity Manager Service.

    1. Select a Job server from the Server menu.

      - OR -

      To create a new Job server, click Add.

    2. Enter the following data for the Job server.

      • Server: Name of the Job server.

      • Queue: Name of the queue to handle the process steps. Each One Identity Manager Service within the network must have a unique queue identifier. The process steps are requested by the Job queue using this unique queue identifier. The queue identifier is entered in the One Identity Manager Service configuration file.

      • Full server name: Full server name in accordance with DNS syntax.

        Syntax:

        <Name of servers>.<Fully qualified domain name>

      NOTE: You can use the Extended option to make changes to other properties for the Job server. You can also edit the properties later with the Designer.

  4. On the Machine roles page, select Active Directory.

  5. On the Server functions page, select Active Directory connector.

  6. On the Service Settings page, enter the connection data and check the One Identity Manager Service configuration.

    NOTE: The initial service configuration is predefined. If further changes need to be made to the configuration, you can do this later with the Designer. For detailed information about configuring the service, see the One Identity Manager Configuration Guide.

    • For a direct connection to the database:

      1. Select Process collection | sqlprovider.

      2. Click the Connection parameter entry, then click the Edit button.

      3. Enter the connection data for the One Identity Manager database.

    • For a connection to the application server:

      1. Select Process collection, click the Insert button and select AppServerJobProvider.

      2. Click the Connection parameter entry, then click the Edit button.

      3. Enter the connection data for the application server.

      4. Click the Authentication data entry and click the Edit button.

      5. Select the authentication module. Depending on the authentication module, other data may be required, such as user and password. For detailed information about the One Identity Manager authentication modules, see the One Identity Manager Authorization and Authentication Guide.

  7. To configure remote installations, click Next.

  8. Confirm the security prompt with Yes.

  9. On the Select installation source page, select the directory with the install files.

  10. On the Select private key file page, select the file with the private key.

    NOTE: This page is only displayed when the database is encrypted.

  11. On the Service access page, enter the service's installation data.

    • Computer: Name or IP address of the server that the service is installed and started on.

    • Service account: User account data for the One Identity Manager Service.

      • To start the service under the NT AUTHORITY\SYSTEM account, set the Local system account option.

      • To start the service under another account, disable the Local system account option and enter the user account, password and password confirmation.

    • Installation account: Data for the administrative user account to install the service.

      • To use the current user’s account, set the Current user option.

      • To use another user account, disable the Current user option and enter the user account, password and password confirmation.

    • To change the install directory, names, display names, or description of the One Identity Manager Service, use the other options.

  12. Click Next to start installing the service.

    Installation of the service occurs automatically and may take some time.

  13. Click Finish on the last page of the Server Installer.

    NOTE: In a default installation, the service is entered in the server’s service management with the name One Identity Manager Service.

Creating a synchronization project for initial synchronization of an Active Directory domain

Use the Synchronization Editor to configure synchronization between the One Identity Manager database and Active Directory environment. The following describes the steps for initial configuration of a synchronization project. For more detailed information about setting up synchronization, see the One Identity Manager Target System Synchronization Reference Guide.

After the initial configuration, you can customize and configure workflows within the synchronization project. Use the workflow wizard in the Synchronization Editor for this. The Synchronization Editor also provides different configuration options for a synchronization project.

Have the following information available for setting up a synchronization project.

Important: The domain controller and the domain must be resolved by DNS query for successful authentication. If the DNS cannot be resolved, the target system connection is refused.

Table 4: Information required for setting up a synchronization project
Data Explanation

Full domain name

Full domain name.

Example:

Docu.Testlab.dd

User account and password for domain login

User account and password for domain login. This user account is used to access the domain. Make a user account available with sufficient permissions. For more information, see Users and permissions for synchronizing with Active Directory.

DNS name of the domain controller.

Full name of the domain controller for connecting to the synchronization server to provide access to Active Directory objects.

Example:

Server.Doku.Testlab.dd

Communications port on the domain controller

Communications port on the domain controller. LDAP default communications port is 389.

Authentication type

You can only connect to a target system if the correct type of authentication is selected. The Secure authentication type is used by default.

For more information about authentication types, see the MSDN Library.

Synchronization server for Active Directory

All One Identity Manager Service actions are executed against the target system environment on the synchronization server. Data entries required for synchronization and administration with the One Identity Manager database are processed by the synchronization server.

The One Identity Manager Service must be installed on the synchronization server with the Active Directory connectorActive Roles.

The synchronization server must be declared as a Job server in One Identity Manager. Use the following properties when you set up the Job server.

Table 5: Additional properties for the Job server
Property Value
Server function

Active Directory connector

Machine role Server/Jobserver/Active Directory

For more information, see Setting up the synchronization server.

One Identity Manager database connection data
  • Database server

  • Database

  • SQL Server login and password

  • Specifies whether integrated Windows authentication is used. This type of authentication is not recommended. If you decide to use it anyway, ensure that your environment supports Windows authentication.

Remote connection server

To configure synchronization with a target system, One Identity Manager must load the data from the target system. One Identity Manager communicates directly with the target system to do this. Sometimes direct access from the workstation, on which the Synchronization Editor is installed, is not possible. For example, because of the firewall configuration or the workstation does not fulfill the necessary hardware and software requirements. If direct access is not possible from the workstation, you can set up a remote connection.

The remote connection server and the workstation must be in the same Active Directory domain.

Remote connection server configuration:

  • One Identity Manager Service is started

  • RemoteConnectPlugin is installed

  • Active Directory connector is installed

  • Target system specific components are installed

The remote connection server must be declared as a Job server in One Identity Manager. The Job server name is required.

TIP: The remote connection server requires the same configuration as the synchronization server (with regard to the installed software and entitlements). Use the synchronization as remote connection server at the same time, by simply installing the RemoteConnectPlugin as well.

For more detailed information about setting up a remote connection, see the One Identity Manager Target System Synchronization Reference Guide.

NOTE: The following sequence describes how to configure a synchronization project if the Synchronization Editor is both:
  • Executed in default mode

  • Started from the Launchpad

If you execute the project wizard in expert mode or directly from the Synchronization Editor, additional configuration settings can be made. Follow the project wizard instructions through these steps.

To set up an initial synchronization project for Active Directory domains

  1. Start the Launchpad and log in to the One Identity Manager database.

    NOTE: If synchronization is executed by an application server, connect the database through the application server.
  2. Select the Target system type Active Directory entry and click Start.

    This starts the Synchronization Editor's project wizard.

  1. On the System access page, specify how One Identity Manager can access the target system.

    • If access is possible from the workstation on which you started the Synchronization Editor, do not change any settings.

    • If access is not possible from the workstation on which you started the Synchronization Editor, you can set up a remote connection.

      Enable the Connect using remote connection server option and select the server to be used for the connection under Job server.

  1. On the Domain selection page, specify the Active Directory domain to synchronize.
    • Select the domain in the Domain list or enter the full domain name.
  2. Enter the user account for accessing the domain on the Credentials page. This user account is used to synchronize Active Directory objects.

    1. To use a specified user account, enter the user account and password for logging into the target system.

      If the currently logged in user account is used, leave this field empty. The user account running under the One Identity Manager Service requires the permissions described in Users and permissions for synchronizing with Active Directory.

      NOTE: If this setting is used, the current user account is also used in the Synchronization Editor during configuration. This user account may be different to the One Identity Manager Service's user account

      In this case, it is recommended you use the RemoteConnectPlugin. This ensures that the same user account is used during configuration with the Synchronization Editor as is used in the service context.

    2. Click Test in the Verify credentials pane to test the connection to the domain.

  3. Enter the domain controller for synchronization on the Configure connection options page and set the connection options.
    • In the Binding options view, you define the authentication type for login to the target system. The Secure authentication type is used by default.
    • In the Enter or select domain controller view, you define the domain controller.
      1. In the Domain controller menu, select an existing domain controller or enter the full name of the domain controller directly.
      2. In the Port input field, enter the communications post on the domain controller. LDAP default communications port is 389.
      3. With the Use SSL option, define whether a secure connection should be used.
      4. Click Test to test the connection. The system tries to establish a connection to the domain controller.
  4. Specify additional synchronization settings on the Connector features page. Enter the following settings.
    Table 6: Additional settings
    Property Description
    When restoring objects with the same Distinguished Name or GUID from the recycle bin. Specifies whether deleted Active Directory objects are taken into account on insertion. Set this option if, when adding an object, the system first checks whether the object is in the Active Directory recycling bin and must be restored.
    Allow read and write access to Remote Access Service (RAS) properties. Specifies whether Remote Access Service (RAS) properties are synchronized. If the option is not set, default values are taken for synchronization. However, no properties are written or read. You can set these options are a later date.
    Allow read and write access to the terminal service properties. Specifies whether Remote Access Service (RAS) are synchronized. If the option is not set, default values are taken for synchronization. However, no properties are written or read. You can set these options are a later date.

    NOTE: The import of terminal server properties and RAS properties may slow the synchronization.

  1. On the One Identity Manager Connection tab, test the data for connecting to the One Identity Manager database. The data is loaded from the connected database. Reenter the password.

    NOTE: If you use an unencrypted One Identity Manager database and have not yet saved any synchronization projects to the database, you need to enter all connection data again. This page is not shown if a synchronization project already exists.
  2. The wizard loads the target system schema. This may take a few minutes depending on the type of target system access and the size of the target system.

  1. On the Restrict target system access page, specify how system access should work. You have the following options:
    Table 7: Specify target system access
    Option Meaning

    Read-only access to target system.

    Specifies that a synchronization workflow is only to be set up for the initial loading of the target system into the One Identity Manager database.

    The synchronization workflow has the following characteristics:

    • Synchronization is in the direction of One Identity Manager.
    • Processing methods in the synchronization steps are only defined for synchronization in the direction of One Identity Manager.

    Read/write access to target system. Provisioning available.

    Specifies whether a provisioning workflow is to be set up in addition to the synchronization workflow for the initial loading of the target system.

    The provisioning workflow displays the following characteristics:

    • Synchronization is in the direction of the Target system.
    • Processing methods are only defined in the synchronization steps for synchronization in the direction of the Target system.
    • Synchronization steps are only created for such schema classes whose schema types have write access.
  1. On the Synchronization server page, select a synchronization server to execute synchronization.

    If the synchronization server is not declared as a Job server in the One Identity Manager database yet, you can add a new Job server.

    1. Click to add a new Job server.

    2. Enter a name for the Job server and the full server name conforming to DNS syntax.

    3. Click OK.

      The synchronization server is declared as a Job server for the target system in the One Identity Manager database.

      NOTE: After you save the synchronization project, ensure that this server is set up as a synchronization server.
  1. To close the project wizard, click Finish.

    This creates and allocates a default schedule for regular synchronization. Enable the schedule for regular synchronization.

    The synchronization project is created, saved, and enabled immediately.

    NOTE: If enabled, a consistency check is carried out. If errors occur, a message appears. You can decide whether the synchronization project can remain activated or not.

    Check the errors before you use the synchronization project. To do this, in the General view on the Synchronization Editor‘s start page, click Verify project.

    NOTE: If you do not want the synchronization project to be activated immediately, disable the Activate and save the new synchronization project automatically option. In this case, save the synchronization project manually before closing the Synchronization Editor.

    NOTE: The connection data for the target system is saved in a variable set and can be modified in the Configuration | Variables category in the Synchronization Editor.

NOTE:

Following a synchronization, employees are automatically created for the user accounts in the default installation. If an account definition for the domain is not yet known at the time of synchronization, user accounts are linked with employees. However, account definitions are not assigned. The user accounts are therefore in a Linked state.

To manage the user accounts using account definitions, assign an account definition and a manage level to these user accounts.

To select user accounts through account definitions

  1. Create an account definition.
  2. Assign an account definition to the domain.
  3. Assign a user account in the Linked state to the account definition. The account definition's default manage level is applied to the user account.
    1. In the Manager, select the Active Directory | User accounts | Linked but not configured | <Domain> category.

      - OR -

      In the Manager, select the Active Directory | Contacts | Linked but not configured | <Domain> category.

    2. Select the Assign account definition to linked accounts task.
    3. In the Account definition menu, select the account definition.

    4. Select the user accounts that contain the account definition.

    5. Save the changes.
Related topics
관련 문서

The document was helpful.

평가 결과 선택

I easily found the information I needed.

평가 결과 선택