SynchronizationThe process of comparing data between One Identity Manager and a target system. Objects and their properties are compared by fixed rules. Synchronization results in the identical data situation in the target system and One Identity Manager database. projects, in which a
One Identity Manager tool for configuring target system synchronization. is not started with its full functionality. You cannot run certain functions, such as, running synchronization or simulation, starting the target system browser and others.
|
NOTE: The Manager is locked for editing throughout. To edit objects in the Manager, close the Synchronization Editor. |
To open an existing synchronization project in the Synchronization Editor
You manage user account in One Identity Manager with LDAP. A user can login in to a domain with a user account and receive group memberships and access rights to network resources.
The central component of the One Identity Manager is to map employees and their master data with permissions through which they have control over different target systems. For this purpose, information about user accounts and permissions can be read from the target system into the One Identity Manager database and linked to employees. This gives an overview of the permissions for each employees in all of the connected target systems. One Identity Manager provides the possibility to manage user accounts and their permissions. You can provision modifications in the target systems. Employees are supplied with the necessary permissions in the connected target systems according to their function in the company. Regular synchronization keeps data consistent between target systems and the One Identity Manager database.
Because requirements vary between companies, the One Identity Manager offers different methods for supplying user accounts to employees. One Identity Manager supports the following method for linking employees and their user accounts.
Employees can automatically obtain their account definitions using user account resources. If an employee does not have a user account in
When you manage account definitions through user accounts, you can specify the way user accounts behave when employees are enabled or deleted.
|
NOTE: If employees obtain their user accounts through account definitions, they have to have a central user account |
Different types of user accounts, such as default user accounts, administrative user accounts or service accounts, can be mapped in One Identity Manager.
The following properties are used for mapping different user account types.
The identity describes the type of user account.
Identity | Description | Value of the column "IdentityType" |
---|---|---|
Primary identity | Employee's default user account. | Primary |
Organizational identity | Secondary user account used for various roles within the organization, f. ex. In sub-agreements with other functional areas. | Organizational |
Personalized admin identity | User account with administration rights used by one person. | Admin |
Sponsored identity | User account used for example for training purposes. | Sponsored |
Shared identity | User account with administration rights used by several people. | Shared |
Service identity | Service account. | Service |
Use this option to flag user accounts with special, privileged permissions. This includes administrative user accounts or service accounts, for example. This option is not used to flag default user accounts.
Normally, each employee obtains a default user account, which has the permissions they require for their regular work. The user accounts are linked to the employee. The effect of the link and the scope of the employee’s inherited properties on the user accounts can be configured through an account definition and its manage levels.
To create default user accounts through account definitions
An account definition specifies which rules are used to generate the IT operating data for example, whether the container for a user account is made up of the employee's department, cost center, location or business role and which default values will be used if no IT operating data can be found through the employee's primary roles.
Which IT operating data is required, depends on the target system. The following setting are recommended for default user accounts:
Specify in the departments, cost centers, locations or business roles, which IT operating data should apply when you set up a user account.
When the account definition is assigned to an employee, a new user account is created through the inheritance mechanism and subsequent processing.
An administrative user account must be used for certain administrative tasks. Administrative user accounts are normally predefined in the target system and have fixed identifiers and login names, for example, "Administrator".
Administrative user accounts are loaded through synchronization into the One Identity Manager. To assign a manager to administrative user accounts, assign an employee to the user account in One Identity Manager.
|
NOTE: You can automatically label administrative user accounts as privileged user accounts. To do this, set the schedule "Mark selected user accounts as privileged" in the Designer. |
Privileged user accounts are used to provide employees with additional privileges. This includes administrative user accounts or service accounts, for example. The user accounts are marked with the property Privileged user account (IsPrivilegedAccount).
|
NOTE: The criteria used to label user accounts automatically as privileged, are defined as extensions to the view definition (ViewAddOn) on the table TSBVAccountIsPrivDetectRule (table type "Union"). The evaluation is done in the script TSB_SetIsPrivilegedAccount. |
To create privileged users through account definitions
An account definition specifies which rules are used to generate the IT operating data for example, whether the container for a user account is made up of the employee's department, cost center, location or business role and which default values will be used if no IT operating data can be found through the employee's primary roles.
Which IT operating data is required, depends on the target system. The following settings are recommended for privileged user accounts:
Specify in the departments, cost centers, locations or business roles, which IT operating data should apply when you set up a user account.
When the account definition is assigned to an employee, a new user account is created through the inheritance mechanism and subsequent processing.
|
NOTE: Specify a formatting rule for a naming schema if it is required by the company for privileged user account login names. To use a prefix with a login name, set the configuration parameter These configuration parameters are evaluated in the default installation, if a user account is marked with the property Privileged user account (IsPrivilegedAccount). The user account login names are renamed according to the formatting rules. This also takes place if the user accounts are labeled as privileged by the schedule "Mark selected user accounts as privileged". |
© 2023 One Identity LLC. ALL RIGHTS RESERVED. Feedback Terms of Use Privacy