立即与支持人员聊天
与支持团队交流

Identity Manager 9.2.1 - Administration Guide for Connecting to Active Directory

Managing Active Directory environments Synchronizing an Active Directory environment
Setting up initial synchronization with an Active Directory domain Adjusting the synchronization configuration for Active Directory environments Running synchronization Tasks following synchronization Troubleshooting Ignoring data error in synchronization Pausing handling of target system specific processes (Offline mode)
Managing Active Directory user accounts and identities
Account definitions for Active Directory user accounts and Active Directory contacts Assigning identities automatically to Active Directory user accounts Supported user account types Updating identities when Active Directory user account are modified Automatic creation of departments and locations based on user account information Specifying deferred deletion for Active Directory user accounts and Active Directory contacts
Managing memberships in Active Directory groups Login credentials for Active Directory user accounts Mapping Active Directory objects in One Identity Manager
Active Directory domains Active Directory container structures Active Directory user accounts Active Directory contacts Active Directory groups Active Directory computers Active Directory security IDs Active Directory printers Active Directory sites Reports about Active Directory objects
Handling of Active Directory objects in the Web Portal Basic data for managing an Active Directory environment Configuration parameters for managing an Active Directory environment Default project template for Active Directory Processing methods of Active Directory system objects Active Directory connector settings

Assigning identities automatically to Active Directory user accounts

When you add a user account, an existing identity can automatically be assigned to it. If necessary, a new identity can be created. The identity main data is created on the basis of existing user account main data. This mechanism can be triggered after a new user account is created either manually or through synchronization.

Define criteria for finding identities to apply to automatic identity assignment. If a user account is linked to an identity through the current mode, the user account is given, through an internal process, the default manage level of the account definition entered in the user account's target system. You can customize user account properties depending on how the behavior of the manage level is defined.

If you run this procedure during working hours, automatic assignment of identities to user accounts takes place from that moment onwards. If you disable the procedure again later, the changes only affect user accounts added or updated after this point in time. Existing identity assignments to user accounts remain intact.

NOTE: It is not recommended to assign identities using automatic identity assignment in the case of administrative user accounts. Use Change main data to assign identities to administrative user accounts for the respective user account.

For more information about assigning identities automatically, see the One Identity Manager Target System Base Module Administration Guide.

Run the following tasks to assign identities automatically.

  • If you want identities to be assigned during the synchronization of user accounts, in the Designer, set the TargetSystem | ADS | PersonAutoFullsync configuration parameter and select the required mode.

  • If you want identities to be assigned outside synchronization, in the Designer, set the TargetSystem | ADS | PersonAutoDefault configuration parameter and select the required mode.

  • In the TargetSystem | ADS | PersonExcludeList configuration parameter, define the user accounts for which no automatic assignment to identities shall take place.

    Example:

    ADMINISTRATOR|GUEST|KRBTGT|TSINTERNETUSER|IUSR_.*|IWAM_.*|SUPPORT_.*|.* | $

    TIP: You can edit the value of the configuration parameter in the Exclude list for automatic identity assignment dialog.

  • Use the TargetSystem | ADS | PersonAutoDisabledAccounts configuration parameter to specify whether identities can be automatically assigned to disabled user accounts. User accounts do not obtain an account definition.

  • Assign an account definition to the domain. Ensure that the manage level to be used is entered as the default manage level.

  • Define the search criteria for identities assigned to the domain.

NOTE:

The following applies for synchronization:

  • Automatic identity assignment takes effect if user accounts are added or updated.

The following applies outside synchronization:

  • Automatic identity assignment takes effect if user accounts are added.

NOTE:

In the default installation, after synchronizing, identities are automatically created for the user accounts. If an account definition for the domain is not known at the time of synchronization, user accounts are linked with identities. However, account definitions are not assigned. The user accounts are therefore in a Linked state.

To manage the user accounts using account definitions, assign an account definition and a manage level to these user accounts.

For more information, see Managing Active Directory user accounts and Active Directory contacts through account definitions.

Related topics

Editing search criteria for automatic identity assignment

NOTE: One Identity Manager supplies a default mapping for identity assignment. Only carry out the following steps when you want to customize the default mapping.

The criteria for identity assignments are defined for the domain. You specify which user account properties must match the identity’s properties such that the identity can be assigned to the user account. You can limit search criteria further by using format definitions.

The search criterion is written in XML notation to the Search criteria for automatic identity assignment column (AccountToPersonMatchingRule) in the ADSDomain table.

Search criteria are evaluated when identities are automatically assigned to user accounts. Furthermore, you can create a suggestion list for assignments of identities to user accounts based on the search criteria and make the assignment directly.

NOTE: Object definitions for user accounts that can have search criteria applied to them are predefined. For example, if you require other objects definitions that limit a preselection of user accounts, set up the respective custom object definitions in the Designer. For more information, see the One Identity Manager Configuration Guide.

To specify criteria for identity assignment

  1. In the Manager, select the Active Directory > Domains category.

  2. Select the domain in the result list.

  3. Select the Define search criteria for identity assignment task.

  4. Specify which user account properties must match with which identity so that the identity is linked to the user account.

    Table 11: Default search criteria for user accounts and contacts
    Apply to Identity column Column for user account/contact

    Active Directory user accounts

    Central user account (CentralAccount)

    Login name (pre Win2000)(SAMAccountName)

    Active Directory contacts

    Central user account (CentralAccount)

    Name (Cn)

  5. Save the changes.

For more information about defining search criteria, see the One Identity Manager Target System Base Module Administration Guide.

Related topics

Finding identities and directly assigning them to user accounts

Based on the search criteria, you can create a suggestion list for the assignment of identities to user accounts and make the assignment directly. User accounts are grouped in different views for this.

  • Suggested assignments: This view lists all user accounts to which One Identity Manager can assign an identity. All identities are shown that were found using the search criteria and can be assigned.

  • Assigned user accounts: This view lists all user accounts to which an identity is assigned.

  • No identity assignment: This view lists all user accounts to which no identity is assigned and for which no identity was found using the search criteria.

NOTE: To display disabled user accounts or deactivated identities in the view, enable the Even locked accounts are mapped option.

If you assign a deactivated identity to a user account, it might be locked or deleted depending on the configuration.

To apply search criteria to user accounts

TIP: By double-clicking on an entry in the view, you can view the user account and identity main data.

The assignment of identities to user accounts creates connected user accounts (Linked state). To create managed user accounts (Linked configured state), you can assign an account definition at the same time.

To assign identities directly to user accounts

  • Click Suggested assignments.

    1. Click the Selection box of all user accounts to which you want to assign the suggested identities. Multi-select is possible.

    2. (Optional) Select an account definition in the Assign this account definition menu, and select a manage level in the Assign this account manage level menu.

    3. Click Assign selected.

    4. Confirm the security prompt with Yes.

      The identities determined using the search criteria are assigned to the selected user accounts. If an account definition was selected, this is assigned to all selected user accounts.

    - OR -

  • Click No identity assignment.

    1. Click Select identity for the user account to which you want to assign an identity. Select an identity from the menu.

    2. Click the Selection box of all user accounts to which you want to assign the selected identities. Multi-select is possible.

    3. (Optional) Select an account definition in the Assign this account definition menu, and select a manage level in the Assign this account manage level menu.

    4. Click Assign selected.

    5. Confirm the security prompt with Yes.

      The identities displayed in the Identity column are assigned to the selected user accounts. If an account definition was selected, this is assigned to all selected user accounts.

To remove assignments

  • Click Assigned user accounts.

    1. Click the Selection box of all the user accounts with the identity assignment you want to delete. Multi-select is possible.

    2. Click Remove selected.

    3. Confirm the security prompt with Yes.

      The assigned identities are removed from the selected user accounts.

Changing manage levels for Active Directory user accounts

The default manage level is applied if you create user accounts using automatic identity assignment. You can change a user account manage level later.

To change the manage level for a user account

  1. In the Manager, select the Active Directory > User accounts category.

  2. Select the user account in the result list.

  3. Select the Change main data task.

  4. Select the manage level in the Manage level list on the General tab.

  5. Save the changes.
Related topics
相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级