지금 지원 담당자와 채팅
지원 담당자와 채팅

Active Roles 8.2.1 - Synchronization Service Administration Guide

Synchronization Service overview Deploying Synchronization Service Deploying Synchronization Service for use with AWS Managed Microsoft AD Getting started Connections to external data systems
External data systems supported with built-in connectors
Working with Active Directory Working with an AD LDS (ADAM) instance Working with Skype for Business Server Working with Oracle Database Working with Oracle Database user accounts Working with Exchange Server Working with Active Roles Working with One Identity Manager Working with a delimited text file Working with Microsoft SQL Server Working with Micro Focus NetIQ Directory Working with Salesforce Working with ServiceNow Working with Oracle Unified Directory Working with an LDAP directory service Working with an OpenLDAP directory service Working with IBM DB2 Working with IBM AS/400 Working with IBM RACF Working with MySQL database Working with an OLE DB-compliant relational database Working with SharePoint Working with Microsoft 365 Working with Microsoft Azure Active Directory Configuring data synchronization with the SCIM Connector Configuring data synchronization with the Generic SCIM Connector
Using connectors installed remotely Creating a connection Renaming a connection Deleting a connection Modifying synchronization scope for a connection Using connection handlers Specifying password synchronization settings for a connection
Synchronizing identity data Mapping objects Automated password synchronization Synchronization history Scenarios of use Developing PowerShell scripts for attribute synchronization rules Using PowerShell script to transform passwords

Providing the certificate’s thumbprint to Capture Agent

This step assumes that:

  • The same Group Policy object is linked to each OU holding the domain controllers on which the Capture Agent is installed. For more information on how to create and link a Group policy object, see the documentation for your version of Windows.

  • The SyncServiceCaptureAgent.adm administrative template file is linked to that Group Policy object.

For instructions on how to add an administrative template file to a Group Policy object, see Adding an administrative template to Group Policy object.

To provide the thumbprint to Capture Agent

On any computer joined to the domain where Capture Agent is installed, open Group Policy Object Editor, and connect to the Group Policy object to which you added the Administrative Template in Adding an administrative template to Group Policy object.

  1. In the Group Policy Object Editor console, expand the Group Policy object, and then expand the Computer Configuration node.

  2. Expand the Administrative Templates > Active Roles node to select Sync Service Capture Agent Settings.

  3. In the details pane, double-click Certificate to encrypt Capture Agent traffic.

  4. Select the Enabled option, and then paste the certificate’s thumbprint (the one you copied in Copying the certificate's thumbprint) in the Thumbprint text box. When finished, click OK.

  5. For the changes to take effect, refresh the Group Policy settings by running the following command at a command prompt:

    gpupdate /force

Providing the certificate’s thumbprint to Synchronization Service

Perform the next steps on each computer running the Synchronization Service that participates in the password sync operations.

To provide the thumbprint to Synchronization Service

  1. On the computer running the Synchronization Service, start Group Policy Object Editor, and then connect to the Local Computer Policy Group Policy object.

  2. In the Group Policy Object Editor console, expand the Local Computer Policy node, expand the Computer Configuration node, and select Administrative Templates.

  3. On the Action menu, point to All Tasks, and click Add/Remove Templates.

  4. In the Add/Remove Templates dialog, click Add, and then use the Policy Templates dialog to open the SyncService.adm file that holds the Administrative Template.

  5. By default, the SyncService.adm file is stored in <Active Roles installation folder>\SyncServiceCaptureAgent\Administrative Templates.

  6. Under Computer Configuration > Administrative Templates > Active Roles, select Sync Service Settings.

  7. In the details pane, double-click Certificate to encrypt Capture Agent traffic.

  8. Select the Enabled option, and then paste the certificate’s thumbprint (the one you copied in Copying the certificate's thumbprint) in the Thumbprint text box. When finished, click OK.

  9. For the changes to take effect, refresh the Group Policy settings by running the following command at a command prompt:

    gpupdate /force

Using PowerShell scripts with password synchronization

Optionally, you can configure the Synchronization Service to run your custom PowerShell script before, after, or instead of the password synchronization operation. To do so, create a connection handler. For instructions, see Using connection handlers.

Example of a PowerShell script run after password synchronization

After the password synchronization is complete, the following script sends a notification email message informing the administrator that the specified object password has been modified in the target connected system. The message provides the names of the source Active Directory object and its counterpart in the target connected system.

#---- Specify the SMTP Server name in your organization ----
$SmtpServer = "smtpServerName"
$smtp = new-object system.net.mail.smtpClient($SmtpServer)
$mail = new-object System.Net.Mail.MailMessage
# ---- Set the sender mail ----
$mail.From = "yourmail@mydomain.com"
# ---- Set the destination mail ----
$mail.To.Add("Administrator@mydomain.com")
# --- Specify the message subject ----
$mail.Subject = "Password was changed"
# ---- Set the message text ----
$body  = "The passwords were synchronized for the following object pair: "
$body  = $body + $srcObj.Name + "->" + $dstObj.Name
$mail.Body = $body
# ---- Send mail ----
$smtp.Send($mail)

Synchronization history

Synchronization Service Console provides the Synchronization History option that allows you to view the details of completed synchronization workflow runs, password synchronization rule runs, and map and unmap operations.

The synchronization history also helps you troubleshoot synchronization issues by providing information on the errors that were encountered during sync workflow runs, password sync rule runs, or map and unmap operations.

You can also selectively clean up entries from the synchronization history.

To access the synchronization history, use the Sync History tab in the Synchronization Service Console.

관련 문서

The document was helpful.

평가 결과 선택

I easily found the information I needed.

평가 결과 선택