Chat now with support
Chat with Support

Active Roles 8.0.1 LTS - Synchronization Service Administration Guide

Synchronization Service Overview Deploying Synchronization Service Getting started Connections to external data systems
External data systems supported with built-in connectors
Working with Active Directory Working with an AD LDS (ADAM) instance Working with Skype for Business Server Working with Oracle Working with Exchange Server Working with Active Roles Working with One Identity Manager Working with a delimited text file Working with Microsoft SQL Server Working with Micro Focus NetIQ Directory Working with Salesforce Working with ServiceNow Working with Oracle Unified Directory Working with an LDAP directory service Working with IBM DB2 Working with IBM AS/400 Working with an OpenLDAP directory service Working with IBM RACF connector Working with MySQL database Working with an OLE DB-compliant relational database Working with SharePoint Working with Microsoft 365
Creating a Microsoft 365 connection Modifying a Microsoft 365 connection Microsoft 365 data supported for data synchronization
ClientPolicy object attributes supported for Microsoft 365 data synchronization ConferencingPolicy object attributes supported for Microsoft 365 data synchronization Contact object attributes supported for Microsoft 365 data synchronization DistributionGroup object attributes supported for Microsoft 365 data synchronization Domain object attributes supported for Microsoft 365 data synchronization DynamicDistributionGroup object attributes supported for Microsoft 365 data synchronization ExternalAccessPolicy object attributes supported for Microsoft 365 data synchronization HostedVoicemailPolicy object attributes supported for Microsoft 365 data synchronization LicensePlanService object attributes supported for Microsoft 365 data synchronization Mailbox object attributes supported for Microsoft 365 data synchronization MailUser object attributes supported for Microsoft 365 data synchronization PresencePolicy object attributes supported for Microsoft 365 data synchronization SecurityGroup object attributes supported for Microsoft 365 data synchronization SPOSite object attributes supported for Microsoft 365 data synchronization SPOSiteGroup object attributes supported for Microsoft 365 data synchronization SPOWebTemplate object attributes supported for Microsoft 365 data synchronization SPOTenant object attributes supported for Microsoft 365 data synchronization User object attributes supported for Microsoft 365 data synchronization VoicePolicy object attributes supported for Microsoft 365 data synchronization Microsoft 365 Group attributes supported for Microsoft 365 data synchronization Changing the display names of synchronized Microsoft 365 licenses and services
Objects and attributes specific to Microsoft 365 services How the Microsoft 365 Connector works with data
Working with Microsoft Azure Active Directory Configuring data synchronization with the SCIM Connector Configuring data synchronization with the Generic SCIM Connector
Using connectors installed remotely Creating a connection Renaming a connection Deleting a connection Modifying synchronization scope for a connection Using connection handlers Specifying password synchronization settings for a connection
Synchronizing identity data Mapping objects Automated password synchronization Synchronization history Scenarios of use
About scenarios Scenario 1: Create users from a .csv file to an Active Directory domain Scenario 2: Use a .csv file to update user accounts in an Active Directory domain Scenario 3: Synchronizing data between One Identity Manager Custom Target Systems and an Active Directory domain Scenario 4: Deprovisioning between One Identity Manager Custom Target Systems and an Active Directory domain Scenario 5: Provisioning of Groups between One Identity Manager Custom Target Systems and an Active Directory domain Scenario 6: Enabling Delta Sync mode between One Identity Manager Custom Target Systems and an Active Directory domain Example of using the Generic SCIM Connector for data synchronization
Appendix A: Developing PowerShell scripts for attribute synchronization rules Appendix B: Using a PowerShell script to transform passwords

Specify naming attributes

Every object in an LDAP directory service has a naming attribute from which the object name is formed. When you create a connection to an LDAP directory service, a default naming attribute is selected for each object type in the data system. You can use the Specify Naming Attributes item to view the naming attribute currently selected for each object type in the data system and optionally specify a different naming attribute.

This expandable item provides following options:

  • Default naming attribute. Displays the default naming attribute currently selected for each object type.
  • Add. Adds a new naming attribute for the selected object type.
  • Edit. Allows you to edit the name of the naming attribute currently specified for the selected object type.
  • Remove. Removes the currently selected entry from the list.

Specify attributes to identify objects

This expandable item provides the following options that allow you to specify the attributes with which you wish to uniquely identify each object in the connected LDAP directory service:

  • Available attributes. Lists the attributes that are available in the external data system. Use this list to select the attributes whose values you want to use to generate a unique identifier for each object in the external data system. You can filter attributes by typing in the text box at the top of this list. To select multiple attributes, hold down CTRL and click to select attributes in the list.
  • UniqueID attributes. Lists the attributes whose values are currently used to generate a unique identifier for each object in the external data system.
  • Add->. Moves the selected attributes from the Available attributes list to the UniqueID attributes list.
  • <-Remove. Moves the selected attributes from the UniqueID attributes list to the Available attributes list.
  • Constructed UniqueID. Displays a combination of the attributes whose values will make up a unique identifier for each object in the external data system.

Specify password sync parameters for LDAP directory service

To synchronize passwords in an LDAP directory service connected to Synchronization Service through the Generic LDAP Connector, you must specify the following parameters:

  • The target object type for which you want to synchronize passwords.

  • The object attribute for storing passwords in the LDAP directory service.

To specify the target object type and attribute for storing passwords

  1. Click the Connection settings link below the LDAP directory service connection for which you want to specify the target object type and attribute for storing passwords.
  2. Open the Password tab.
  3. Make sure the Synchronize and manage passwords check box is selected.
  4. Use the Synchronize passwords for objects of this type option to specify the object type in LDAP directory service for which you want to synchronize passwords.
  5. Use the Store password in this attribute option to specify the attribute in which you want to store passwords.
  6. Click Save.

Working with IBM DB2

This section describes how to create or modify a connection to IBM DB2 so that Synchronization Service could work with data in that data system.

To create a connection to IBM DB2, you need to use Synchronization Service in conjunction with a special connector called IBM DB2 Connector. This connector is included in the Synchronization Service package.

The IBM DB2 Connector supports the following features:

 

Table 63:  Supported features

Feature

Supported

Bidirectional synchronization

Allows you to read and write data in the connected data system.

Yes

Delta processing mode

Allows you to process only the data that has changed in the connected data system since the last synchronization operation, thereby reducing the overall synchronization operation time.

No

Password synchronization

Allows you to synchronize user passwords from an Active Directory domain to the connected data system.

Yes

In this section:

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating