IBM Security Identity Manager: Active Directory Adapter with 64-Bit Support User Guide Figures

IBM Security Identity Manager: Active Directory Adapter with 64-Bit Support User Guide Figures

IBM Security Identity Manager Version 6.0 Active Directory Adapter with 64-bit Support User Guide SC27-4385-02 IBM Security Identity Manager Version 6.0 Active Directory Adapter with 64-bit Support User Guide SC27-4385-02 Note Before using this information and the product it supports, read the information in “Notices” on page 85. Edition notice Note: This edition applies to version 6.0 of IBM Security Identity Manager (product number 5724-C34) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright IBM Corporation 2012, 2013. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures ...............v Modifying unified messaging ........35 Tables ...............vii Chapter 4. Group management tasks 37 Adding groups on Active Directory ......37 Preface ...............ix Support data attribute specification on the group form................37 About this publication ...........ix Accessibility attribute specification on the group Access to publications and terminology .....ix form................39 Accessibility ..............x Modifying group attributes .........40 Technical training.............x Container attribute modification on the group Support information ............x form................41 Statement of Good Security Practices ......x Scope modification for the group ......41 Creating a group ...........42 Chapter 1. Introduction to the Active Adding users to groups .........43 Directory Adapter ..........1 Viewing information about members of a group 43 Features of the Active Directory Adapter .....1 Removing users from a group .......44 Deleting groups from Active Directory ....44 Chapter 2. Checklist for configuring IBM Security Identity Manager to run the Chapter 5. Troubleshooting the Active adapter ...............3 Directory Adapter errors .......47 Techniques for troubleshooting problems ....47 Chapter 3. User account management Active Directory Adapter errors .......49 tasks ................5 Log information format ..........56 Before you begin the adapter operations .....5 User account reconciliation .........5 Appendix A. Country and region codes 57 Reconciled attributes...........6 Attributes not reconciled .........8 Appendix B. Active Directory Adapter Support data reconciliation ........8 attributes..............65 userAccountControl attribute reconciliation . 9 Active Directory account form attributes.....65 cn attribute reconciliation .........9 Active Directory group form attributes .....69 Filter reconciliation ...........9 Customizable attributes on the Active Directory User account additions ..........14 group form .............69 Attributes for adding user accounts .....14 Mapping extended attributes ........70 CN attribute specification.........15 Distinguished name creation for a user account 16 Appendix C. APIs used by the adapter 71 User principal name of a user account ....17 ADSI interfaces and the corresponding APIs used Control specifications for a user account....18 by the adapter .............71 Creating a home directory for a user account . 19 Windows APIs used by the adapter ......73 RAS attribute specification ........20 User account enablement for mail ......21 Proxy address creation for a user account . 22 Appendix D. PowerShell command-line User account modification .........23 functions used by the adapter ....75 Container attribute modification ......23 Home Directory attribute modification ....24 Appendix E. Conventions used in this User password modification ........27 publication .............77 Mailbox Store attribute modification .....28 Typeface conventions ...........77 Mail status modification for a user account . 28 Operating system-dependent variables and paths. 77 Mail status clearing for a user account ....29 Mailbox support modification for Exchange 2010 30 Appendix F. Support information . 79 Primary Group attribute modification ....32 User account suspension ..........32 Searching knowledge bases .........79 User account restoration ..........33 Obtaining a product fix ..........80 User account deletion ...........33 Contacting IBM Support ..........80 Enabling and disabling unified messaging ....34 © Copyright IBM Corp. 2012, 2013 iii Appendix G. Accessibility features for IBM Security Identity Manager ....83 Notices ..............85 Index ...............89 iv IBM Security Identity Manager: Active Directory Adapter with 64-bit Support User Guide Figures 1. Generating an RDN ..........16 4. Example of an Active Directory container 2. Example of an Active Directory structure 23 structure .............41 3. Exchange server organization tree .....28 © Copyright IBM Corp. 2012, 2013 v vi IBM Security Identity Manager: Active Directory Adapter with 64-bit Support User Guide Tables 1. Checklist for configuring IBM Security Identity 16. Account form values .........26 Manager ..............3 17. Account form values .........27 2. Attributes supported by the adapter for filter 18. New registry keys ..........30 reconciliation ............10 19. DisableMailboxOnSuspend registry key actions 30 3. Attributes not supported by the adapter for 20. ReconDisconnectedMailbox registry key filter reconciliation ..........12 actions during reconciliation .......31 4. Objects and the corresponding object class 14 21. Group membership details .......38 5. List of attributes and their default values on 22. Accessibility attributes .........39 the Active Directory..........15 23. Troubleshooting the Active Directory Adapter 6. The order of attributes on the Active Directory errors..............49 account form that the adapter checks to 24. Countries and regions and their corresponding generate an RDN ..........16 codes ..............57 7. Attributes on the Active Directory account 25. Mapping of attributes on IBM Security Identity form and their corresponding property flags . 19 Manager to the attributes on the Active 8. Home Directory attribute settings .....20 Directory .............65 9. Home Directory NTFS Access attribute values 26. Group form attributes .........69 and their corresponding permissions on the 27. Customizable group form attributes ....70 home directory ...........20 28. ADSI Interfaces and the corresponding APIs 10. Account form values .........24 used by the Active Directory Adapter ....71 11. Account form values .........24 29. Windows APIs used by the Active Directory 12. Account form values .........25 Adapter..............74 13. Account form values .........25 30. PowerShell cmdlets used by the Active 14. Account form values .........26 Directory Adapterand their description . 75 15. Changed account form values ......26 © Copyright IBM Corp. 2012, 2013 vii viii IBM Security Identity Manager: Active Directory Adapter with 64-bit Support User Guide Preface About this publication The Active Directory Adapter with 64-bit Support User Guide provides information that you can use to manage user accounts on the Active Directory with the IBM® Security Identity Manager. IBM Security Identity Manager was previously known as Tivoli® Identity Manager. This guide describes user account management tasks, such as reconciliation, add, modify, suspend, restore, delete, and password change. Access to publications and terminology This section provides: v A list of publications in the “IBM Security Identity Manager library.” v Links to “Online publications.” v A link to the “IBM Terminology website.” IBM Security Identity Manager library For a complete listing of the IBM Security Identity Manager and IBM Security Identity Manager Adapter documentation, see the online library (http://publib.boulder.ibm.com/infocenter/tivihelp/v2r1/index.jsp?topic=/ com.ibm.isim.doc_6.0/ic-homepage.htm). Online publications IBM posts product publications when the product is released and when the publications are updated at the following locations: IBM Security Identity Manager library The product documentation site (http://publib.boulder.ibm.com/ infocenter/tivihelp/v2r1/index.jsp?topic=/com.ibm.isim.doc_6.0/ic- homepage.htm) displays the welcome page and navigation for the library. IBM Security Systems Documentation Central IBM Security Systems Documentation Central provides an alphabetical list of all IBM Security Systems product libraries and links to the online documentation for specific versions of each product. IBM Publications Center The IBM Publications Center site ( http://www-05.ibm.com/e-business/ linkweb/publications/servlet/pbi.wss) offers customized search functions to help you find all the IBM publications you need. IBM Terminology website The IBM Terminology website consolidates terminology for product libraries in one location. You can access the Terminology website at http://www.ibm.com/ software/globalization/terminology. © Copyright IBM Corp. 2012, 2013 ix Accessibility Accessibility features help users with a physical disability, such as restricted mobility or limited vision, to use software products successfully. With this product, you can use assistive technologies to hear and navigate the interface. You can also use the keyboard instead of the mouse to operate all features of the graphical user interface. Technical training For technical training information, see the following IBM Education website at http://www.ibm.com/software/tivoli/education. Support information IBM Support provides assistance with code-related problems and routine, short duration installation or usage questions. You can directly access the IBM Software Support site at http://www.ibm.com/software/support/probsub.html.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    104 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us