立即与支持人员聊天
与支持团队交流

Active Roles 8.1.1 - Synchronization Service Administration Guide

Synchronization Service overview Deploying Synchronization Service Getting started Connections to external data systems
External data systems supported with built-in connectors
Working with Active Directory Working with an AD LDS (ADAM) instance Working with Skype for Business Server Working with Oracle Database Working with Oracle Database user accounts Working with Exchange Server Working with Active Roles Working with One Identity Manager Working with a delimited text file Working with Microsoft SQL Server Working with Micro Focus NetIQ Directory Working with Salesforce Working with ServiceNow Working with Oracle Unified Directory Working with an LDAP directory service Working with an OpenLDAP directory service Working with IBM DB2 Working with IBM AS/400 Working with IBM RACF Working with MySQL database Working with an OLE DB-compliant relational database Working with SharePoint Working with Microsoft 365 Working with Microsoft Azure Active Directory Configuring data synchronization with the SCIM Connector Configuring data synchronization with the Generic SCIM Connector Objects and operations supported by the SCIM Connector Example of using the Generic SCIM Connector for data synchronization
Using connectors installed remotely Creating a connection Renaming a connection Deleting a connection Modifying synchronization scope for a connection Using connection handlers Specifying password synchronization settings for a connection
Synchronizing identity data Mapping objects Automated password synchronization Synchronization history Scenarios of use Developing PowerShell scripts for attribute synchronization rules Using PowerShell script to transform passwords

Creating a provisioning step

To create a provisioning step

  1. In the Synchronization Service Console, open the Sync Workflows tab, and then click the AD to OneIM Sync workflow.
  2. Click Add synchronization step.
  3. On the Select an action page, select Creation, and then click Next.
  4. In the Specify source and criteria dialog, click Specify, click Add new connected system or Select existing connected system, and then step through the wizard to add the Active Directory Test AD as a connected system.
  5. Click Next.

  6. In the Specify target dialog, click Specify.

  7. Click Add new connected system or Select existing connected system, and then step through the wizard to add the target One Identity Manager domain as a connected system.
  8. Click Select, to add the required target object type.

  9. In the Select Object Type dialog, select the UNSAccountB object type from the list of object types and click OK.

Specifying synchronization rules

To specify the synchronization rules:

  1. In the Synchronization Service Console, open the Sync Workflows tab, and then click the AD to OneIM Sync workflow.
  2. Click Provision from Test AD to One Identity Manager Connection.

  3. Click Provisioning Rules and then click Initial Attribute Population Rules.

  4. From the drop-down, select Forward Sync Rule.

  5. In the Forward Sync Rule dialog, select the source attributes to be mapped to the target attributes, and then click OK.

    NOTE: For One Identity Manager workflows, the attribute configuration rule for CN is mandatory, else a constraint violation error is displayed and the workflow run fails.

  6. Click Save and Continue.

Running the workflow

To run the provisioning step:

  1. On the Sync Workflows tab, click Run now.
  2. In the Select sync workflow steps to run dialog, select the check box next to the step you created, and then to run the step, click Full Run.

    After the synchronization step run completes, the Synchronization Service Console displays a report that provides information about the objects that participated in the provisioning step. At this stage, the application does not commit changes to the target One Identity Manager domain.

Committing changes to One Identity Manager

To commit the changes to One Identity Manager

  • Click Commit.

An All changes committed message is displayed. The changes are committed from the source Active Directory Test AD to the target One Identity Manager.

相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级