지금 지원 담당자와 채팅
지원 담당자와 채팅

Identity Manager 8.2 - Administration Guide for Connecting to Active Directory

Managing Active Directory environments Synchronizing an Active Directory environment
Setting up initial synchronization with an Active Directory domain Adjusting the synchronization configuration for Active Directory environments Running synchronization Tasks following synchronization Troubleshooting Ignoring data error in synchronization
Managing Active Directory user accounts and employees
Account definitions for Active Directory user accounts and Active Directory contacts Assigning employees automatically to Active Directory user accounts Supported user account types Updating employees when Active Directory user account are modified Automatic creation of departments and locations based on user account information Specifying deferred deletion for Active Directory user accounts and Active Directory contacts
Managing memberships in Active Directory groups Login information for Active Directory user accounts Mapping of Active Directory objects in One Identity Manager
Active Directory domains Active Directory container structures Active Directory user accounts Active Directory contacts Active Directory groups Active Directory computers Active Directory security IDs Active Directory printers Active Directory sites Reports about Active Directory objects
Handling of Active Directory objects in the Web Portal Basic data for managing an Active Directory environment Configuration parameters for managing an Active Directory environment Default project template for Active Directory Processing methods of Active Directory system objects Active Directory connector settings

Supporting multiple profile directories

The different Windows operating system versions use different repositories for roaming user profiles. For exact information about storing roaming profile, see the MicrosoftTechNet Library.

To map the roaming user profile in One Identity Manager.

  • Provide a template structure for the user profile on the profile server.

    Example of a template structure for user profiles on a profile server

    PROFILE

    UserProfile

    All required folders/files

    UserProfile.V2

    All required folders/files

    UserProfile.V3

    All required folders/files

    UserProfile.V4

    All required folders/files

  • In the Designer, set the TargetSystem | ADS | Accounts | ProfileFixedString configuration parameter and define the part of the user profile directory that you want to attach to the default profile path. The default value is UserProfile.

As a result, the directory paths for the user profiles are mapped as follows in the default installation.

  • If the profile directory is created in the home directory:

    \\Servername\HOMES\Username$\PROFILES\UserProfile

  • If the profile directory is not created in the home directory:

    \\Servername\PROFILES\Username\UserProfile

The following directories exist after handling the processes.

  • If the profile directory is created in the home directory:

    \\Servername\HOMES\Username$\PROFILES\UserProfile

    \\Servername\HOMES\Username$\PROFILES\UserProfile.v2

    \\Servername\HOMES\Username$\PROFILES\UserProfile.v3

    \\Servername\HOMES\Username$\PROFILES\UserProfile.v4

  • If the profile directory is not created in the home directory:

    \\Servername\PROFILES\Username\UserProfile

    \\Servername\PROFILES\Username\UserProfile.v2

    \\Servername\PROFILES\Username\UserProfile.v3

    \\Servername\PROFILES\Username\UserProfile.v4

The directory paths for the repository on the terminal server are mapped in the same way. In this case, in the Designer, change the TargetSystem | ADS | Accounts | TProfileFixedString configuration parameter accordingly. Specify in this configuration parameter the part of the user profile directory path which is appended to the default profile path on a terminal server. The default value is UserProfile.

Home and profile directory access permissions

Table 65: Configuration parameters for setting up user directories
Configuration parameter Meaning

QER | Person | User | AccessRights

Configuration of permissions for accessing user directories.

NOTE: To assign permissions to directories and files, it is sometimes necessary to define user account names such as Administrators, Everyone, or Domain Users in specific languages. The default language for the user accounts names is English.

To grant access permissions for the home directory

  • In the Designer, set the QER | Person | User | AccessRights | HomeDir and its configuration subparameters, and enter the access permissions in the configuration parameters.

    Granting access permissions to the home directory is done by the One Identity Manager Service.

    Table 66: Configuration parameters for home directory access permissions
    Configuration parameter Effect when set

    QER | Person | User | AccessRights | HomeDir

    Configuration of access permissions for the user’s home directory. To set the permissions, the configuration parameter and subparameters need to be set.

    QER | Person | User | AccessRights | HomeDir | EveryOne

    Everyone has permissions to access a user’s home directory.

    Default: -r-w-x

    QER | Person | User | AccessRights | HomeDir | User

    Defines the user’s home directory permissions.

    Default: +r+w-x

To grant access permission for the profile directory

  • In the Designer, set the QER | Person | User | AccessRights | ProfileDir configuration parameter and its configuration subparameters, and enter the access permissions in the configuration parameters.

    Granting access permissions to the profile directory is done by the One Identity Manager Service.

    Table 67: Configuration parameters for profile directory access permissions
    Configuration parameter Effect when set

    QER | Person | User | AccessRights | ProfileDir

    Configuration of access permissions for the user’s profile directory. To set the permissions, the configuration parameter and subparameters need to be set.

    QER | Person | User | AccessRights | ProfileDir | EveryOne

    Everyone has permission to access a user’s profile directory.

    Default: -r-w-x

    QER | Person | User | AccessRights | ProfileDir | User

    Defines the user’s profile directory permissions.

    Default: +r+w-x

To grant access permissions for the home directory on a terminal server

  • In the Designer, set the QER | Person | User | AccessRights | TerminalHomeDir and its configuration subparameters, and enter the access permissions in the configuration parameters.

    Granting access permissions to the home directory is done by the One Identity Manager Service.

    Table 68: Configuration parameters for access permissions to the home directory on a terminal server
    Configuration parameter Effect when set

    QER | Person | User | AccessRights | TerminalHomeDir

    Configuration of access permissions for an Active Directory user account’s terminal server home directory. To set the permissions, the configuration parameter and subparameters need to be set.

    QER | Person | User | AccessRights | TerminalHomeDir | EveryOne

    Everyone has permission to access a user’s terminal server home directory.

    Default: -r-w-x

    QER | Person | User | AccessRights | TerminalHomeDir | User

    Defines the user’s terminal server home directory permissions.

    Default: +r+w-x

To grant access permissions for the profile directory on a terminal server

  • In the Designer, set the QER | Person | User | AccessRights | TerminalProfileDir and its configuration subparameters, and enter the access permissions in the configuration parameters.

    Granting access permissions to the profile directory is done by the One Identity Manager Service.

    Table 69: Configuration parameters for access permissions to the profile directory on a terminal server
    Configuration parameter Effect when set

    QER | Person | User | AccessRights | TerminalProfileDir

    Configuration of access permissions for an Active Directory user account’s terminal server profile directory. To set permissions, the configuration parameter and subparameters need to be set.

    QER | Person | User | AccessRights | TerminalProfileDir | EveryOne

    Everyone has permissions to access a user’s terminal server profile directory.

    Default: -r-w-x

    QER | Person | User | AccessRights | TerminalProfileDir | User

    Terminal server profile directory permissions.

    Default: +r+w-x

Related topics

Configuration parameters for managing an Active Directory environment

The following configuration parameters are additionally available in One Identity Manager after the module has been installed.

Table 70: Configuration parameters
Configuration parameters Description

QER | ITShop | GroupAutoPublish

Preprocessor relevant configuration parameter for automatically adding groups to the IT Shop. Specifies whether all Active Directory target systems groups are automatically transferred to the IT Shop. Changes to this parameter require the database to be recompiled.

If you disable the configuration parameter at a later date, model components and scripts that are not longer required, are disabled. SQL procedures and triggers are still carried out. For more information about the behavior of preprocessor relevant configuration parameters and conditional compiling, see the One Identity Manager Configuration Guide.

QER | ITShop | GroupAutoPublish | ADSGroupExcludeList

List of all groups that are not be automatically assigned to the IT Shop. Names are listed in a pipe (|) delimited list that is handled as a regular search pattern.

Example:

.*Administrator.*|Exchange.*|.*Admins|.*Operators|IIS_IUSRS

TargetSystem | ADS

Preprocessor relevant configuration parameter for controlling the database model components for the administration of the Active Directory target system. If the parameter is set, the target system components are available. Changes to this parameter require the database to be recompiled.

If you disable the configuration parameter at a later date, model components and scripts that are not longer required, are disabled. SQL procedures and triggers are still carried out. For more information about the behavior of preprocessor relevant configuration parameters and conditional compiling, see the One Identity Manager Configuration Guide.

TargetSystem | ADS | Accounts

Allows configuration of user account data.

TargetSystem | ADS | Accounts | InitialRandomPassword

Specifies whether a random password is generated when a new user account is added. The password must contain at least those character sets that are defined in the password policy.

TargetSystem | ADS | Accounts | InitialRandomPassword | SendTo

Employee to receive an email with the random generated password (manager cost center/department/location/business role, employee’s manager or XUserInserted). If no recipient can be found, the password is sent to the address stored in the configuration parameter TargetSystem | ADS | DefaultAddress.

TargetSystem | ADS | Accounts | InitialRandomPassword | SendTo | MailTemplateAccountName

Mail template name that is sent to supply users with the login credentials for the user account. The Employee - new user account created mail template is used.

TargetSystem | ADS | Accounts | InitialRandomPassword | SendTo | MailTemplatePassword

Mail template name that is sent to supply users with the initial password. The Employee - initial password for new user account mail template is used.

TargetSystem | ADS | Accounts | MailTemplateDefaultValues

Mail template used to send notifications about whether default IT operating data mapping values are used for automatically creating a user account. The Employee - new user account with default properties created mail template is used.

TargetSystem | ADS | Accounts | NotRequirePassword

Specifies whether a password is required when creating new Active Directory user accounts in One Identity Manager. If the configuration parameter is not set, entry of a password that meets the defined password guidelines is requested when a new Active Directory user account is created. If the configuration parameter is set, it is not necessary to specify a password when creating new Active Directory user accounts.

TargetSystem | ADS | Accounts | PrivilegedAccount

Allows configuration of privileged Active Directory user account settings.

TargetSystem | ADS | Accounts |
PrivilegedAccount | SAMAccountName_Postfix

Postfix for formatting the login name of privileged user accounts.

TargetSystem | ADS | Accounts | PrivilegedAccount |
SAMAccountName_Prefix

Prefix for formatting a login name of privileged user accounts.

TargetSystem | ADS | Accounts | ProfileFixedString

Fixed string appended to the default profile path of a user profile.

TargetSystem | ADS | Accounts | TransferJPegPhoto

Specifies whether changes to the employee's picture are published in existing user accounts. The picture is not part of default synchronization. It is only published when employee data is changed.

TargetSystem | ADS | Accounts | TransferSIDHistory

Specifies whether the SID history is loaded from the target system.

TargetSystem | ADS | Accounts | TSProfileFixedString

Fixed string appended to the default profile path of a user profile on a terminal server.

TargetSystem | ADS | Accounts | UnlockByCentralPassword

Specifies whether the employee's Active Directory user account is unlocked when the central password is synchronized.

TargetSystem | ADS | Accounts | UserMustChangePassword

Specifies whether the Change password at next login option is enabled when a new user account is created.

TargetSystem | ADS | AuthenticationDomains

Pipe (|) delimited list of domains to be used by the manual Active Directory authentication module to authenticate users. The list is processed in the given order. This list should only contain domains to be synchronized.

Example:

MyDomain|MyOtherDomain

For more information about One Identity Manager authentication modules, see the One Identity Manager Authorization and Authentication Guide.

TargetSystem | ADS | AutoCreateDepartment

Specifies whether departments are automatically created when user accounts are modified or synchronized.

TargetSystem | ADS | AutoCreateLocality

Specifies whether locations are automatically created when user accounts are modified or synchronized.

TargetSystem | ADS | AutoCreateHardwaretype

Specifies whether corresponding device types are created automatically in the database for imported printer objects.

TargetSystem | ADS | AutoCreateServers

Specifies whether entries for missing home servers and profile servers are created automatically when user accounts are synchronized.

TargetSystem | ADS | AutoCreateServers | PreferredLanguage

Language of automatically created servers.

TargetSystem | ADS | DefaultAddress

Default email address of the recipient for notifications about actions in the target system.

TargetSystem | ADS | HardwareInGroupFromOrg

Specifies whether computers are added to groups based on group assignment to roles.

TargetSystem | ADS | MaxFullsyncDuration

Maximum runtime of a synchronization in minutes. No recalculation of group memberships by the DBQueue Processor can take place during this time. If the maximum runtime is exceeded, group membership are recalculated.

TargetSystem | ADS | MembershipAssignCheck

Specifies whether membership validity is verified on saving when group memberships are assigned in the One Identity Manager database.

Disable this configuration parameter if several trusted domains with access across memberships are managed in the database.

TargetSystem | ADS | MemberShipRestriction

General configuration parameter for restricting membership in Active Directory.

TargetSystem | ADS | MemberShipRestriction | Container

Number of Active Directory objects allowed per container before warning email is sent.

TargetSystem | ADS | MemberShipRestriction | Group

Number of Active Directory objects allowed per group before warning email is sent.

TargetSystem | ADS | MemberShipRestriction | MailNotification

Default mail address for sending warning emails.

TargetSystem | ADS | PersonAutoDefault

Mode for automatic employee assignment for user accounts added to the database outside synchronization.

TargetSystem | ADS | PersonAutoDisabledAccounts

Specifies whether employees are automatically assigned to disabled user accounts. User accounts are not given an account definition.

TargetSystem | ADS | PersonAutoFullSync

Mode for automatic employee assignment for user accounts that are added to or updated in the database by synchronization.

TargetSystem | ADS | PersonExcludeList

Listing of all user account without automatic employee assignment. Names are listed in a pipe (|) delimited list that is handled as a regular search pattern.

Example:

ADMINISTRATOR|GUEST|KRBTGT|TSINTERNETUSER|IUSR_.*|IWAM_.*|SUPPORT_.*|.* | $

TargetSystem | ADS | PersonUpdate

Specifies whether employees are updated if their user accounts are changed. This configuration parameter is set to allow ongoing update of employee objects from associated user accounts.

TargetSystem | ADS | ReplicateImmediately

Speeds up synchronization of modifications between two domain controllers When set, the accumulated modifications in Active Directory are immediately replicated between domain controllers.

TargetSystem | ADS | VerifyUpdates

Specifies whether changed properties are checked when the system is updated. If this parameter is set, the objects in the target system are verified after every update.

Default project template for Active Directory

A default project template ensures that all required information is added in One Identity Manager. This includes mappings, workflows, and the synchronization base object. If you do not use a default project template you must declare the synchronization base object in One Identity Manager yourself.

Use a default project template for initially setting up the synchronization project. For custom implementations, you can extend the synchronization project with the Synchronization Editor.

The project template uses mappings for the following schema types.

Table 71: Mapping Active Directory schema types to tables in the One Identity Manager schema
Schema type in Active Directory Table in the One Identity Manager Schema

builtInDomain

ADSContainer

computer

ADSMachine

contact

ADSContact

container

ADSContainer

domainDNS

ADSDomain

forest (virtual schema type)

ADSForest

group

ADSGroup

inetOrgPerson

ADSAccount

msDS-PasswordSettings

ADSPolicy

organizationalUnit

ADSContainer

printQueue

ADSPrinter

serverInSite

ADSMachineInADSSite

site

ADSSite

trustedDomain

DomainTrustsDomain

user

ADSAccount

관련 문서

The document was helpful.

평가 결과 선택

I easily found the information I needed.

평가 결과 선택