Chat now with support
Chat with Support

Active Roles 7.6.3 - Synchronization Service Administration Guide

Synchronization Service Overview Deploying Synchronization Service Getting started Connections to external data systems
External data systems supported with built-in connectors
Working with Active Directory Working with an AD LDS (ADAM) instance Working with Skype for Business Server Working with Oracle Working with Exchange Server Working with Active Roles Working with One Identity Manager Working with a delimited text file Working with Microsoft SQL Server Working with Micro Focus NetIQ Directory Working with Salesforce Working with ServiceNow Working with Oracle Unified Directory Working with an LDAP directory service Working with IBM DB2 Working with IBM AS/400 Working with an OpenLDAP directory service Working with IBM RACF connector Working with MySQL database Working with an OLE DB-compliant relational database Working with SharePoint Working with Microsoft 365 Working with Microsoft Azure Active Directory Configuring data synchronization with the SCIM Connector Configuring data synchronization with the Generic SCIM Connector
Using connectors installed remotely Creating a connection Renaming a connection Deleting a connection Modifying synchronization scope for a connection Using connection handlers Specifying password synchronization settings for a connection
Synchronizing identity data Mapping objects Automated password synchronization Synchronization history Scenarios of use
About scenarios Scenario 1: Create users from a .csv file to an Active Directory domain Scenario 2: Use a .csv file to update user accounts in an Active Directory domain Scenario 3: Synchronizing data between One Identity Manager Custom Target Systems and an Active Directory domain Scenario 4: Deprovisioning between One Identity Manager Custom Target Systems and an Active Directory domain Scenario 5: Provisioning of Groups between One Identity Manager Custom Target Systems and an Active Directory domain Scenario 6: Enabling Delta Sync mode between One Identity Manager Custom Target Systems and an Active Directory domain Example of using the Generic SCIM Connector for data synchronization
Appendix A: Developing PowerShell scripts for attribute synchronization rules Appendix B: Using a PowerShell script to transform passwords

Step 7: Commit changes to One Identity Manager

To commit the changes to One Identity Manager:

Click Commit.

A message All changes committed is displayed. The changes are committed from the source Active Directory Test AD to the target One Identity Manager.

Step 8: Verify on One Identity Manager

To verify if the data is synchronized to One Identity Manager:

Open the One Identity Manager console and verify that all the users from the AD are synchronized with One Identity Manager as per the provisioning rules that were set.

Scenario 4: Deprovisioning between One Identity Manager Custom Target Systems and an Active Directory domain

The Deprovisioning operation in data synchronization using Synchronization Service allows you to modify or remove objects in the target data system after their counterparts have been disconnected from the source data system. Synchronization Servicecan be configured to remove target objects permanently or change them to a specific state. To specify the objects that will participate in the deprovision operation you can use object mapping rules. This scenario describes how to create a deprovisioning step for a workflow to modify or delete the synchronized objects in the target system based on the deprovisioning criteria that is set.

To create a deprovisioning step:

  1. In the Synchronization Service Administration Console, open the Sync Workflows tab, and then click the workflow AD to OneIM Sync.
  2. Click Add synchronization step.
  3. On the Select an action dialog box, select Deprovision, and then click Next.
  4. On the Specify source and criteria dialog box, click Specify, click Add new connected system or Select existing connected system, and then step through the wizard to add the Active Directory Test AD as a connected system.
  5. Specify a deprovisioning criteria by selecting one of the following:
    • Source object is deleted or out of synchronization scope
    • Source object deprovisioning is initiated in connected system
    • Source object meets these criteria - Add the criteria for the source objects to be deprovisioned in the target system
  6. Click Next.
  7. On the Specify target dialog box, click Specify.
  8. Click Add new connected system or Select existing connected system, and then step through the wizard to add the target One Identity Manager domain as a connected system.
  9. Click Select, to add the required target object type.
  10. On the Select Object Type dialog box, select the object type UNSAccountB from the list of object types and click Ok.
  11. On the Specify deprovisioning action dialog box, select the one of the following action to deprovision:
    • Delete target objects
    • Initiate the object deprovisioning in <target system>
    • Modify target objects - Click Forward Synch rule and select the attributes to modify the object attributes.
  12. Click Next.

    The Deprovisioning step with the rules for the specified deprovisioning action is created.

Scenario 5: Provisioning of Groups between One Identity Manager Custom Target Systems and an Active Directory domain

Synchronization Service allows you to ensure that group membership information is in sync in all connected data systems. For example, when provisioning a group object from an Active Directory domain to One Identity Manager domain, you can configure rules to synchronize the Member attribute from the source to the target domain.

This scenario describes how to create a provisioning step for a workflow to synchronize group objects between the source and target systems.

To create a group provisioning step:

  1. In the Synchronization Service Administration Console, open the Sync Workflows tab, and then click the workflow AD to OneIM Sync.
  2. Click Add synchronization step.
  3. On the Select an action dialog box, select Creation, and then click Next.
  4. On the Specify source and criteria dialog box, click Specify, click Add new connected system or Select existing connected system, and then step through the wizard to add the Active Directory Test AD as a connected system.
  5. In Specify object type field, click Select and from the Select Object type list, select Group and then click OK.
  6. In the Provisioning Criteria section, click Add.
  7. On the Select Container dialog box, from the containers list, select the required container and click OK.
  8. Click Next.
  9. On the Specify target dialog box, click Specify.
  10. Click Add new connected system or Select existing connected system, and then step through the wizard to add the target One Identity Manager domain as a connected system.
  11. Click Select, to add the required target object type.
  12. On the Select Object Type dialog box, select the object type UNSGroupB from the list of object types.
  13. Click Ok.

    The Group provisioning step is created.

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating