Remote access to a target system might be necessary if:
-
A synchronization projectA collection of all data required for synchronizingThe processSequence of process steps for mappingList of object matching rules and property mapping rules which map the schema properties of two connected systems to one another. an operational workflow. The process steps are connected to one another by predecessor/successor relationships. This functionality allows flexibility when linking up actions and sequences on object events. of comparing data between One Identity Manager and a target system. Objects and their properties are compared by fixed rules. Synchronization results in the identical data situation in the target system and One Identity Manager database. and provisioning a target system. Connection data, schema classes and properties, mappings, and synchronization workflows all belongs to this. must be set up.
-
An existing synchronization project must be configured but there is generally no direct access to the target system.
-
A existing synchronization project must be configured but there is temporarily no direct access to the target system.
One IdentityAn identity usually represents a real person. In addition, identities that do not represent real people, such as machine identities or service identities, can be mapped in One Identity Manager. (see also virtual identity; see also main identity/subidentity) Manager requires a connection to the target system to update the target system schema, to define the scope, or to test the object matching rules, for example. A message appears if you cannot connect to the target system when editing the synchronization configuration. Then you can decide whether you want to connect through a remote connection server, temporarily. In this case, a remote connection dialog opens.
-
An existing synchronization project needs to be configured but some connection data is encrypted and the encryption values are not known to the Synchronization EditorOne Identity Manager tool for configuring target system synchronizationPost processing of objects that were marked as outstanding by synchronization.. user.
To set up a remote connection for a new synchronization project.
-
In the project wizard, on the System access page, set the Connect using remote connection server option.
-
Enter the remote connection properties.
The remote connection stays connected as long as the project wizard is open.
To set up a remote connection for an existing synchronization project.
-
In the Synchronization Editor, open the synchronization project.
-
In the Synchronization Editor toolbar, click Remote connection.
This opens the remote connection dialog.
-
Enter the remote connection properties.
-
Click Connect.
The remote connection remains established as long as the synchronization project is open in the Synchronization Editor.
To close a remote connection
-
In the Synchronization Editor toolbar, click Remote connection.
Remote connection properties
-
Access parameters
-
Server: Full server name or IP address of the server.
To select an existing Job serverServer with the One Identity Manager Service installed. as the remote connection server, click and select the server from the menu. This displays all the Job servers that have the One Identity Manager ServiceSystem service on servers that handle One Identity Manager processes. installed server function selected.
-
Port: Port that is configured for the RemoteConnectPlugin.
-
-
Authentication
If SecretAuthentication is configured for the RemoteConnectPlugin:
-
Secret: Secret used by the Synchronization Editor to authenticate on the RemoteConnectPlugin.
If ADGroupAuthentication is configured for the RemoteConnectPlugin, no data is required.
-
-
Options
-
RequestRequest for products in the IT ShopIT Shop structure to which shelves and customers are assigned. Together with shelves, products, and shopping centers, shops form a hierarchically structured IT Shop solution.. Products can be company resourcesEquipment that is necessary for an identity's work efficiency, for example, mobile phones, desks, company cars, or keys. Resources can be any equipment that is not system entitlements, devices, or software., such as system rolessee: hierarchical role or system entitlements, or membership in hierarchical rolesA collection of departments, cost centers, locations, and business roles. Through membership in hierarchical roles, company resources can be inherited by identities.. Requests follow a defined approval processProcess of granting or denying approval for IT Shop requests. An approval process starts with a product request and ends with the request being finally granted or denied approval. Details of approval processes are specified in approval policiesDetermines which approval workflow is applied to an attestation case or an request, renewal, or unsubscription in the IT Shop. and approval workflows. that determines whether a product may be assigned or not. timeout: Maximum time allowed for a server query in seconds. If the time is exceeded, the request is canceled.
-
Accept self-signed certificates: Specifies whether self-signed certificates can be accepted.
-