Chat now with support
Chat with Support

Active Roles 8.0 LTS - Synchronization Service Administration Guide

Synchronization Service Overview Deploying Synchronization Service Getting started Connections to external data systems
External data systems supported with built-in connectors
Working with Active Directory Working with an AD LDS (ADAM) instance Working with Skype for Business Server Working with Oracle Working with Exchange Server Working with Active Roles Working with One Identity Manager Working with a delimited text file Working with Microsoft SQL Server Working with Micro Focus NetIQ Directory Working with Salesforce Working with ServiceNow Working with Oracle Unified Directory Working with an LDAP directory service Working with IBM DB2 Working with IBM AS/400 Working with an OpenLDAP directory service Working with IBM RACF connector Working with MySQL database Working with an OLE DB-compliant relational database Working with SharePoint Configuring data synchronization with the Office 365 Connector
Creating a Microsoft 365 connection Viewing or modifying a Microsoft 365 connection Microsoft 365 data supported for data synchronization
ClientPolicy object attributes supported for Microsoft 365 data synchronization ConferencingPolicy object attributes supported for Microsoft 365 data synchronization Contact object attributes supported for Microsoft 365 data synchronization DistributionGroup object attributes supported for Microsoft 365 data synchronization Domain object attributes supported for Microsoft 365 data synchronization DynamicDistributionGroup object attributes supported for Microsoft 365 data synchronization ExternalAccessPolicy object attributes supported for Microsoft 365 data synchronization HostedVoicemailPolicy object attributes supported for Microsoft 365 data synchronization LicensePlanService object attributes supported for Microsoft 365 data synchronization Mailbox object attributes supported for Microsoft 365 data synchronization MailUser object attributes supported for Microsoft 365 data synchronization PresencePolicy object attributes supported for Microsoft 365 data synchronization SecurityGroup object attributes supported for Microsoft 365 data synchronization SPOSite object attributes supported for Microsoft 365 data synchronization SPOSiteGroup object attributes supported for Microsoft 365 data synchronization SPOWebTemplate object attributes supported for Microsoft 365 data synchronization SPOTenant object attributes supported for Microsoft 365 data synchronization User object attributes supported for Microsoft 365 data synchronization VoicePolicy object attributes supported for Microsoft 365 data synchronization Microsoft 365 Group attributes supported for Microsoft 365 data synchronization Changing the display names of synchronized Microsoft 365 licenses and services
Objects and attributes specific to Microsoft 365 services How the Office 365 Connector works with data
Configuring data synchronization with the Microsoft Azure AD Connector Configuring data synchronization with the SCIM Connector Configuring data synchronization with the Generic SCIM Connector
Using connectors installed remotely Creating a connection Renaming a connection Deleting a connection Modifying synchronization scope for a connection Using connection handlers Specifying password synchronization settings for a connection
Synchronizing identity data Mapping objects Automated password synchronization Synchronization history Scenarios of use
About scenarios Scenario 1: Create users from a .csv file to an Active Directory domain Scenario 2: Use a .csv file to update user accounts in an Active Directory domain Scenario 3: Synchronizing data between One Identity Manager Custom Target Systems and an Active Directory domain Scenario 4: Deprovisioning between One Identity Manager Custom Target Systems and an Active Directory domain Scenario 5: Provisioning of Groups between One Identity Manager Custom Target Systems and an Active Directory domain Scenario 6: Enabling Delta Sync mode between One Identity Manager Custom Target Systems and an Active Directory domain Example of using the Generic SCIM Connector for data synchronization
Appendix A: Developing PowerShell scripts for attribute synchronization rules Appendix B: Using a PowerShell script to transform passwords

Steps to automate password synchronization

To automatically synchronize passwords from an Active Directory domain to another data system, complete these steps:

  1. Install Capture Agent on each domain controller in the Active Directory domain you want to be the source for password synchronization operations.

    Capture Agent tracks changes to the user passwords in the source Active Directory domain and provides this information to Synchronization Service, which in turn synchronizes passwords in the target connected systems you specify.

    For more information on how to install Capture Agent, see Managing Capture Agent.

  1. Connect the Synchronization Service to the Active Directory domain where you installed Capture Agent in step 1.

    Alternatively, you can configure a connection to Active Roles that manages the source Active Directory domain.

  1. Connect the Synchronization Service to the data system where you want to synchronize user object passwords with those in the source Active Directory domain.
    • For some target data systems (such as SQL Server) you must specify the data you want to participate in the password synchronization by configuring an SQL query.
    • If the target data system is an LDAP directory service accessed via the generic LDAP connector, you must specify the target object type for which you want to synchronize passwords and the attribute where you want to store object passwords.
  2. Ensure that user objects in the source Active Directory domain are properly mapped to their counterparts in the target connected system.

    For more information about mapping objects, see Mapping objects.

    Synchronization Service automatically maps objects between the source Active Directory domain and the target connected system if you configure sync workflows to manage the creation and deprovision operations between the source AD domain (or Active Roles that manages that domain) and the target connected system.

    For more information on sync workflows, see Synchronizing identity data.

  1. Create a password synchronization rule for the target connected system.

    For more information, see Creating a password sync rule.

After you complete the above steps, the Synchronization Service starts to automatically track user password changes in the source AD domain and synchronize passwords in the target connected system.

If necessary, you can fine-tune the password synchronization settings by completing these optional tasks:

Managing Capture Agent

Capture Agent is required to track changes to the user passwords in the Active Directory domain you want to be the authoritative source for password synchronization operations. To synchronize passwords, you must install Capture Agent on each domain controller in the source Active Directory domain.

Whenever a password changes in the source Active Directory domain, the agent captures that change and provides the changed password to the Synchronization Service. In turn, the Synchronization Service uses the provided information to synchronize passwords in the target connected systems according to your settings.

In this section:

Installing Capture Agent manually

You can use this method to manually deploy Capture Agent on each domain controller in the source Active Directory domain.

To manually install Capture Agent

  1. Run one of the following files supplied with the Synchronization Service installation package:
    • On a 32-bit domain controller, run the file SyncServiceCaptureAgent_8.0_x86.msi.
    • On a 64-bit domain controller, run the file SyncServiceCaptureAgent_8.0_x64.msi.

    You can find these files in the Solutions folder on the Active Roles distribution media.

  1. Step through the wizard to complete the agent installation.

You can perform an unattended installation of Capture Agent as follows.

To perform an unattended installation

On a 32-bit system, enter the following syntax at a command prompt:

msiexec /i "<Path to SyncServiceCaptureAgent_8.0_x86.msi>" /qb
INSTALLDIR="
<Path to installation folder>" REBOOT="<Value>"

On a 64-bit system, enter the following syntax at a command prompt:

msiexec /i "<Path to SyncServiceCaptureAgent_8.0_x64.msi>" /qb
INSTALLDIR="
<Path to installation folder>" REBOOT="<Value>"

In the above syntax:

 

Table 122: Arguments

Argument

Description

INSTALLDIR

Specifies the installation folder for the Capture Agent. When this argument is omitted, the following default installation folder is used:

%ProgramFiles%\One Identity\Active Roles\8.0 LTS\SyncServiceCaptureAgent

REBOOT

Allows you to suppress a system restart in a situation where a restart is required for the Capture Agent installation to complete.

To suppress the restart, use the following syntax: REBOOT="ReallySupress"

Using Group Policy to install Capture Agent

You can use this method to automatically deploy Capture Agent on each domain controller in the source Active Directory domain. This method is applicable in the following scenarios only:

Table 123: Prerequisites by scenario

Supported scenario

Prerequisites

Scenario 1: AD domain includes either 32- or 64-bit domain controllers

  • All the domain controllers must be held in a single organizational unit (for example, the built-in Domain Controllers OU).
  • At least one group policy object must be linked to the OU holding the domain controllers (for example, the built-in Default Domain Controllers Policy Group Policy object).

Scenario 2: AD domain includes both 32- and 64-bit domain controllers

  • The domain controllers must be held in two separate organizational units, each containing domain controllers of the same bitness.
  • At least one group policy object must be linked to each of the two organizational units.

To install Capture Agent by using Group Policy

  1. Save the SyncServiceCaptureAgent_8.0 LTS_x86.msi and SyncServiceCaptureAgent_8.0 LTS_x64.msi files to a network share accessible from each domain controller in the source Active Directory domain.
  2. Depending on your scenario, complete the steps in the table:
Table 124: Steps by scenario

Scenario 1: AD domain includes either 32- or 64-bit domain controllers

Scenario 2: AD domain includes both 32- and 64-bit domain controllers

  1. Use Group Policy Editor to open the group policy object linked to the OU holding the domain controllers on which you want to install Capture Agent.
  2. In the Group Policy Object Editor console tree, in Windows Server 2016 or later, expand the Computer Configuration node, then expand Policies, and select Software Settings.
  3. In the details pane, click Software Installation, on the Action menu point to New, and then click Package.
  4. Use the dialog box to open one of the following files:

    SyncServiceCaptureAgent_8.0 LTS_x86.msi if all your domain controllers are 32-bit.

    or

    SyncServiceCaptureAgent_8.0 LTS_x64.msi if all your domain controllers are 64-bit.

  5. In the Deploy Software dialog box, select Assigned, and then click OK.
  1. Use Group Policy Object Editor to open the group policy object linked to the OU holding the 32-bit domain controllers.
  2. In the Group Policy Object Editor console tree, in Windows Server 2016 or later, expand the Computer Configuration node, then expand Policies, and select Software Settings.
  3. In the details pane, click Software Installation, on the Action menu point to New, then click Package.
  4. Use the dialog box to open the SyncServiceCaptureAgent_8.0 LTS_x86.msi file.
  5. In the Deploy Software dialog box, select Assigned, and then click OK.
  6. Repeat steps 1-5 for the group policy object linked to the OU holding the 64-bit domain controllers. Use the SyncServiceCaptureAgent_8.0 LTS_x64.msi file to install Capture Agent on these domain controllers.
  1. Run the following command at a command prompt to refresh the Group Policy settings: gpupdate /force
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating