You are viewing an earlier version of the admin guide. For the latest version, please visit EmpowerID Admin Guide v7.211.0.0.

Connect to Active Directory

In this article, we demonstrate how to use the EmpowerID Active Directory connector to connect to Active Directory. After ensuring you have met the prerequisites specified in the Getting Started with Directory Systems topic, you connect EmpowerID to Active Directory by doing the following:

  1. Creating an account store in EmpowerID for Active Directory.

  2. Configure attribute flow rules.

  3. Configuring EmpowerID settings for the account store connection, including whether to provision EmpowerID Persons during inventory or in batches using the Account Inbox permanent workflow.

  4. Mapping your external roles and locations to corresponding EmpowerID Business Roles and Locations.

  5. Reviewing and configuring the attribute flow rules for the account store.

  6. Turning on inventory.

  7. Enabling the Account Inbox Permanent Workflow when ready – if you are using batch processing to provision Person objects from the inventoried user accounts. This is the recommended method.

  8. Monitoring Inventory.

Step 1 - Create the account store

  1. On the navbar, expand Admin > Applications and Directories and select Account Stores and Systems.

  2. Select the Actions tab and then click Create Account Store.

     

  3. Under System Types, search for Active Directory Domain Services.

  4. Click Active Directory Domain Services to select the type and then click Submit.

     

  5. On the Active Directory Settings page that appears, fill in the following information:

    1. Name and Display Name – Enter a name for the Active Directory account store.

    2.  FQDN of the Active Directory Forest – Enter the fully qualified domain name of the AD forest. If you are using LDAPS, enter the Subject name of the certificate for the domain controller to which you are connecting followed by port 636. Thus, if the Subject name is "dc01.eiddoc.com," you enter dc01.eiddoc.com:636.

    3. Is Remote (Requires Cloud Gateway) –This setting appears for account stores with local directories, such as Active Directory, LDAP, SAP, etc. When enabled, this tells EmpowerID to use the Cloud Gateway Connection for that account store. The Cloud Gateway Connection must be installed on an on-premise machine. For installation information, please see Installing the EmpowerID Cloud Gateway Client.

    4. Proxy Account Username –Enter a user account with read access to the Active Directory configuration partition that holds the list of all of the domains in the forest (and to the Exchange Organization, if present). 

    5. NetBIOS Domain –Enter the NetBIOS name of the domain or child domain that hosts Active Directory.

    6. Password –Enter the password for the proxy account.

  6. When ready, click Submit.

  7. On the Choose Servers page that appears, select the appropriate EmpowerID server and click Submit.

  8. On the Discover Active Directory Domains page that appears, select one or more domains to add to the account store and click Submit.

  9. EmpowerID creates the account store and the associated resource system. The next step is to configure attribute flow between the account store and EmpowerID.

 

Step 2 - Configure Attribute Flow Rules



Now that the attribute flow has been set, the next steps include configuring the account store, mapping locations, and enabling EmpowerID to inventory it.

Step 3 - Configure account store settings

  1. On the Account Store and Resource System page, click the Account Store tab and then click the pencil icon to put the account store in edit mode.


    This opens the edit page for the account store. This page allows you to specify the account proxy used to connect EmpowerID to your Active Directory as well as how you want EmpowerID to handle the user information it discovers in Active Directory during inventory. Settings that can be edited are described in the table below the image.


  2. Edit the account store as needed and then click Save to save your changes.

If you are using EmpowerID Cloud, the next step is to select the on-premise machine where you installed the EmpowerID Cloud Gateway. If you have yet to install the Cloud Gateway, please refer to Installing the EmpowerID Cloud Gateway Client and then return to this step.

  1. From the Account Stores tab of the Find Account Stores page, search for the above account store and then click the Account Store link for it.

    This directs you to the Account Store Details page for the account store, where you should see a Cloud Gateway Servers pane. If you do not see this pane, this means the Is Remote (Cloud Gateway Connection Required) setting was not enabled for the account store.

     

  2. Click the Edit link for Cloud Gateway Servers.

  3. Enter the name of a server and then click the tile that appears for that server.

     

  4. Repeat step 3 for any other Cloud Gateway servers in your environment.

  5. When done adding servers, click Save.

     

 

Next, map the OUs containing user accounts and other managed objects in your account store to corresponding EmpowerID locations as described in the next section. This ensures that the location of an object in EmpowerID reflects the location of the object in Active Directory. In environments with multiple directories or domains, location mapping allows administrators and business users to see one condensed view of the organizations and have policies applied in one spot.

Step 4 - Map locations

EmpowerID Role and Location mappings allow multiple AD, LDAP or other external directory containers to be visually mapped to one or more logical locations in EmpowerID for unified and easy management. When a mapping occurs, all the resources or objects located in the directory container are assigned to a corresponding EmpowerID location, allowing you to use those locations for delegating user access and setting default policy settings. If you create these mappings before your first inventory, all new people discovered by EmpowerID during the inventory process will be provisioned in EmpowerID locations (instead of directory locations), and those EmpowerID locations will be assigned to them as the "Location" portion of their Business Role and Location (BRL). For example, if you have a user named "Barney Smythe" in a London > Contractors OU and a user named "Kris McClure" in a London > Employees OU and you map both of those London OUs to a single London location in EmpowerID, when you turn on your inventory the Location portion of the BRL for both Barney Smythe and Kris McClure would be the EmpowerID location and not the external OUs.

  1. On the navbar, expand Identity Lifecycle and select Role and Location Mapper.

  2. Select the Location Mapper tab.

  3. In the External Source Location pane of the Location Mapper tab, do the following:

    1. In the first (upper) field - Search for and select the external directory containing the location you want to map and

    2. In the second (lower) field - Enter the name of the external location you want to map and press ENTER to load the location.

    3. Select the location from the tree.

       

  4. In the Internal Destination Location pane, enter the name of the EmpowerID location to which you want to map the external directory location and then select the location from the tree.

     

  5. Click Save to save the mapping.

  6. Repeat for any other mappings you wish to create.

If you select an external location that is a parent location, the children of that location will be mapped to the selected EmpowerID location.

Now that everything is configured, you can enable the Account Inbox Permanent Workflow and monitor inventory. Be sure inventory is enabled on the account store settings page.

 

Step 5 - Enable the Account Inbox Permanent Workflow

Step 6 - Monitor Inventory


IN THIS ARTICLE

Â