Sun Java System Directory Server Enterprise Edition 6.1 Installation Guide

Propagating User Attributes Between Systems

After you create and map the user attributes you want to synchronize, you must tell Identity Synchronization for Windows how to propagate (flow) the attribute creations, modifications, and deletions between your Directory Server and Windows Systems.

By default, Identity Synchronization for Windows:

Specifying How Object Creations Flow

ProcedureTo Specify How Object Creations Should Flow Between Directory Server and Active Directory Systems

  1. Click the Object Creation tab.

    Figure 8–33 Selecting and Propagating Creations

    Use this panel to specify new creation attributes and
to configure how creations will flow between systems.

  2. You can enable or disable the flow of creations as follows:

    • Enable Object creations flow from Sun Java System Directory Server to Windows to propagate creations from the Directory Server environment to your Windows servers.

    • Enable Object creations flow from Windows to Sun Java System Directory Server to propagate creations from the Windows environment to your Directory Servers.

    • Enable both options for bidirectional flow.

    • Disable both options to prevent user creations from propagating from one system to the other. (Default).

  3. To add, edit, or delete creation attributes to synchronize between systems, click the Creation Attributes button located under the selected option(s).

    The Creation Attribute Mappings and Values dialog box displays.

    Figure 8–34 Creation Attributes Mappings and Values: Directory Server to Windows

    Use this dialog box to map Active Directory creation
attributes to Directory Server.

    Figure 8–35 Creation Attributes Mappings and Values: Windows to Directory Server

    Use this dialog box to map Active Directory creation
attributes to Directory Server.

    You can use either of the dialog boxes to specify new creation attributes, edit, or delete existing attributes. For more information, see Specifying New Creation Attributes.


    Note –

    To satisfy schema constraints regarding required attributes for user object classes, you may have to specify additional attributes to flow through the system during a user creation.

    Additional attributes are not necessary if you specified the required attributes as modification attributes (as described in Selecting and Mapping User Attributes).


Specifying New Creation Attributes

The following instructions explain how to add and map creation attributes from Active Directory to Directory Server. (The procedure for adding and mapping creation attributes flowing from Directory Server to Windows and from Windows to Directory Server is similar.)

ProcedureTo Specify New Creation Attributes

  1. Click the New button in the Creation Attribute Mappings and Values dialog box.

    The Define Creation Attribute Mappings and Values dialog box is displayed.

    Figure 8–36 Defining Creation Attribute Mappings and Values

    Use this dialog box to map creation attributes and add
values to those attributes.

  2. Select an attribute value from the Active Directory attribute drop-down list.

    Figure 8–37 Selecting a New Active Directory Attribute

    Specify a new Active Directory attribute.

    Identity Synchronization for Windows allows you to initialize an attribute with multiple values— if the attribute itself accepts multiple values.

    For example, if your company has three fax telephone numbers, you can specify the facsilimiletelephonenumber attribute for both Sun Java System Directory Server and Active Directory, and specify the three numbers.

    You must know which attributes will accept multiple values. If you try adding multiple values to an attribute that does not accept them, an error will result during runtime when the program attempts to create the object.

  3. Enter a value in New value field and click Add.

    The program adds the attribute value to the list pane. Repeat this step as many times as necessary to add multiple attribute values.

    Figure 8–38 Specifying Multiple Values for a Creation Attribute

    You can specify multiple values for certain creation
attributes.

  4. To map the attribute to Directory Server, select an attribute name from the Directory Server attribute drop-down list.

    Figure 8–39 Mapping the Directory Server Attribute

    Map the Directory Server attribute to the Windows attribute.

  5. When you are finished, click OK.

    Based on the example, the finished Creation Attributes and Mappings table would look like the one in the following figure.

    Figure 8–40 Completed Creation Attributes and Mappings Table

    Finished Creation Attributes and Mappings table.

  6. To designate additional attributes, repeat these steps.

Editing Existing Attributes

ProcedureTo Edit Creation Attributes Mapping or Values

  1. Select the Object Creation tab, and click on the Creation Attributes button located under the selected creation option.

  2. When the Creation Mappings and Values dialog box is displayed, select the attribute from the table, and then click the Edit button.

    The Define Creation Mappings and Values dialog box is displayed.

  3. Use the drop-down menus to change the existing mapping between Directory Server and Active Directory (or Windows NT).

    For example, if you have Sun Java System Directory Server’s homephone attribute mapped to Active Directory’s othertelephone attribute. You could use the Active Directory attributes drop-down list to change the mapping to homephone.

  4. You can also add or remove attribute values:

    • To add a value, enter the information in the New Value field and click Add.

    • To remove a value, select the value from the list pane and click Remove.

  5. When you are done, click OK to apply your changes and close the Define Creation Mappings and Values dialog box.

  6. Click OK again to close the Creation Mappings and Attributes dialog box.

Removing Attributes

ProcedureTo Remove Creation Attributes Mapping or Values

  1. Select the Object Creation tab, and click the Creation Attributes button located under the selected creation option.

  2. When the Creation Mappings and Values dialog box is displayed, select the attribute from the table, and then click the Delete button.

    The attribute is removed from the table immediately.

  3. When you are done, click OK to close the Creation Mappings and Attributes dialog box.

Specifying How Object Modifications Flow

Use the Attribute Modification tab to control how modifications made to user attributes and passwords will be propagated (flow) between your Sun and Windows systems.

Figure 8–41 Attribute Modification Tab

Specify how attribute and password changes will flow
between Sun and Windows systems, synchronize inactivations, and specify inactivation
methods.

You use this tab to configure the following:


Note –

You cannot synchronize account statuses with Windows NT directory sources.


Specifying Direction

Select one of the following buttons to control how changes made in the Directory Server and Windows environments will be propagated between systems.

Configuring and Synchronizing Object Activations and Inactivations

If you enable the Synchronize Object Activations/Inactivations with Active Directory box you can synchronize object activations and inactivations (known as enables and disables on Active Directory) between Directory Server and Active Directory sources.


Note –

You cannot synchronize activations and inactivations with Windows NT directory sources.


Figure 8–42 Synchronizing Object Activations and Inactivations

Use this panel to specify how the program will detect
and synchronize activated and inactivated objects between Sun and Active Directory.

ProcedureTo Synchronize Object Activations/Inactivations:

  1. Enable the Synchronize Object Inactivations between Directory Server & Active Directory box.

  2. Enable one of the following buttons to specify how Identity Synchronization for Windows will detect and synchronize object activations and inactivations:

Interoperating with Directory Server Tools

Select this option if you use the Directory Server Console or command line tools to activate/inactivate an object. With this option selected Identity Synchronization for Windows cannot set or remove the nsAccountLock attribute directly. In addition, the program cannot detect objects that have been inactivated using other roles such as cn=nsdisabledrole, database suffix or roles that nest within other roles, such as cn=nsdisabledrole, database suffix or cn=nsmanageddisabledrole, database suffix .


Note –

If you enable the Interoperate with Directory Server Tools option, Identity Synchronization for Windows cannot set or remove the nsAccountLock attribute directly. In addition, Identity Synchronization for Windows cannot detect objects have been inactivated using other roles.

For example, cn=nsdisabledrole, database suffix or roles that nest within other roles such as cn=nsdisabledrole, database suffix or cn=nsmanageddisabledrole, database suffix.


Interoperating with Directory Server Tools describes how Identity Synchronization for Windows detects and synchronizes object activations/inactivations when you enable the Interoperate with Directory Server Tools option.

Table 8–1 Interoperating with Directory Server Tools

Activations 

Inactivations 

Identity Synchronization for Windows detects an activation only when the cn=nsmanageddisabledrole, database suffix role is removed from the object.

Identity Synchronization for Windows detects an inactivation only when the entry’s nsroledn attribute includes the cn=nsmanageddisabledrole, database suffix role.

When synchronizing an object activation from Active Directory, Identity Synchronization for Windows activates the object by removing the cn=nsmanageddisabledrole,database suffix role from the object.

When synchronizing an object inactivation from Active Directory, Identity Synchronization for Windows inactivates the object by adding the cn=nsmanageddisabledrole, database suffix role to the object.

Modifying Directory Server’s NsAccountLock Attribute Directly

Use this method when Directory Server activations and inactivations are based on Directory Server’s operational attribute, nsAccountLock.


Note –

When the Modify Directory Server’s nsAccountLock attribute option is enabled, Identity Synchronization for Windows will not detect objects that are activated/inactivated using the Directory Server Console or command line utilities.


This attribute controls object states as follows:

Table 8–2 Modifying Directory Server’s nsAccountLock Attribute Directly

Activation 

Inactivation 

Identity Synchronization for Windows detects an inactivated object only when the nsAccountLock attribute is set to true.

Identity Synchronization for Windows detects an activated object only when the nsAccountLock attribute is absent or set to false.

When synchronizing an object inactivation from Active Directory, Identity Synchronization for Windows removes the nsAccountLock attribute.

When synchronizing an object activation from Active Directory, Identity Synchronization for Windows sets the nsAccountLock attribute to true.

Using a Custom Method for Directory Server

Use this method when Directory Server activations and inactivations are controlled exclusively by an external application such as Sun Java System Access Manager (formerly Sun JES Identity Server).

When you configure a custom method for Directory Server, you must specify the following:


Note –

If you enable the Use custom method for Directory Server option, Identity Synchronization for Windows cannot lock objects out of the directory unless access to the directory is controlled by an external application, such as Access Manager.


To configure a Custom method for activations and inactivations, click the Configure button and the Configure Custom Method for Directory Server dialog box is displayed.

Figure 8–43 Configuring a Custom Method for Activations and Inactivations

Use this dialog to specify inactivation attributes and
to specify values the program can use to detect and set object states.

This dialog contains the following features:

ProcedureTo Configure Identity Synchronization for Windows to Detect and Synchronize Object States between Directory Server and Active Directory

  1. Select an attribute from the Activation state attribute drop-down list.

  2. Click the New button to add attribute values to the Value column of the table.

  3. Click in the State column next to each of the Value entries and when the drop-down list is displayed, select Activated or Inactivated.

    Figure 8–44 Selecting a State

    Specifying State.

    For example, if you were using Access Manager:

  4. Select the inetuserstatus attribute from the Activation state attribute drop-down list.

  5. Click the New button and enter active, inactive, and deleted attribute values to the Value column of the table.

  6. Click in the State column and select Activated or Inactivated for each value as follows:

    • No Value: Activated

    • active: Activated

    • inactive: Inactivated

    • deleted: Inactivated

    • All Other Values: Inactivated

    Based on this example, Using a Custom Method for Directory Server describes how Identity Synchronization for Windows will detect and synchronize activations/inactivations when you enable the Use Custom Method for Directory Server option (using the inetuserstatus example).

    Value 

    State 

    Result 

    No Value

    Activated 

    If the inetuserstatus attribute is missing or does not have a value, Identity Synchronization for Windows detects the object as activated.

    active

    Activated 

    If the attribute is active Identity Synchronization for Windows detects the object as activated.

    inactive

    Inactivated 

    If the attribute value is inactive Identity Synchronization for Windows detects the object as inactivated.

    deleted

    Inactivated 

    If the attribute value is deleted Identity Synchronization for Windows detects the object as inactivated.

    All Other Values

    Inactivated 

    If the attribute has a value, but that value is not specified in the table, Identity Synchronization for Windows detects the object as inactivated. 

    Setting Activations and Inactivations

    As you populate the Value and State table with entries, Identity Synchronization for Windows automatically populates the Activated value and Inactivated value drop-down lists as follows:

    • The Activated value list contains all values with an Activated status (for example No Value and active).

    • The Inactivated value list contains all values with an Inactivated status (for example inactive and deleted).

    • Neither list will contain the All Other Values value.

      Select a value from the Activated value and/or the Inactivated value drop-down lists to specify how Identity Synchronization for Windows will activate and/or inactivate an object when synchronizing from Active Directory.

    • Activated value: Controls the object’s active state.

      • No Value: If the object contains the active value, Identity Synchronization for Windows will set the state to activated in Directory Server.

      • active: If the object contains the active value, Identity Synchronization for Windows will set the state to activated in Directory Server.

    • Inactivated value: Controls the object’s active state.

      • inactive or deleted: Identity Synchronization for Windows will set the object’s state to inactive in Directory Server.

      • none: Not a valid setting. You must select a value.


      Note –

      You must specify an Inactivated value or your configuration will be invalid.


      Using a Custom Method for Directory Server illustrates a completed Configure Custom Method for Directory Server dialog box.

    Figure 8–45 Example: Completed Dialog

    Example of a completed Configure Custom Inactivation
Mechanism for Directory Server dialog box.

Specifying Configuration Settings for Group Synchronization

If you enable Group Synchronization between Directory Server and Active Directory, you can synchronize the creation of groups, deletion of groups, and the membership changes within that group .


Note –

Group Synchronization is not supported on Windows NT directory sources.


ProcedureTo Synchronize Groups:

  1. Under the Groups tab, select the Enable Group Synchronization check box.

  2. Select one of the following Group Synchronization methods to specify how Identity Synchronization for Windows will detect and synchronize various groups:

    • Domain Global Security

    • Domain Global Distribution

    Figure 8–46 Enable Group Synchronization

    Enable Group Synchronization and specify the way the
groups will flow from Directory Server to Active Directory.


    Note –

    For more information about Domain Global Security, Domain Global Distribution, and Active Directory; see the Microsoft Active Directory documentation.


Configure Identity Synchronization for Windows to Detect and Synchronize Groups Related Changes between Directory Server and Active Directory

You do not need to map any attribute manually for the group synchronization. When you press Save, Identity Synchronization for Windows maps the attributes automatically.

Figure 8–47 Attribute Mapping for Group Synchronization

Select the attributes that you want to synchronize and
click Save.


Note –
  1. Do not modify the mapping between the userpasswordand unicodepwd attributes.

  2. To disable the group synchronization, deselect the Disable Group Synchronization check box.

  3. Alternatively, you can enable or disable group synchronization using command line idsync groupsync. For more information, see Appendix A, Using the Identity Synchronization for Windows Command Line Utilities.


Configuring and Synchronizing Account Lockout and Unlockout

To enable the Account Lockout feature, you must do the following:

Identity Synchronization for Windows can synchronize the following events between Active Directory and Directory Server:


Note –

Account lockout and unlockout synchronization is not supported on Windows NT directory servers.


Prerequisites for Account Lockout

The attribute lockoutDuration should be set to the same value at both the places before enabling the account lockout feature. Make sure that the system time is also uniform across the distributed setup. Otherwise, the lockout events can expire if the lockoutDuration is less than the difference in the system dates.


Note –

Set the symmetric password policy at both ends. For example, if the password policy at Active Directory signifies a permanent lockout then the same password policy should be set at Directory Server.


Using the Account Lockout Feature

Enable Account Lockout Synchronization between Directory Server and Active Directory.

Use these settings to enable and disable the account
lockout synchronization.

To enable Account lockout synchronization, you need to map attributes pwdaccountlockedtime (Directory Server) and lockoutTime (AD). pwdaccountlockedtime can be selected in the console after loading the schema with passwordObject object class.

Select the attributes that you want to synchronize and
click Save
Note –

You can enable or disable the account lockout synchronization using command line tool idsync accountlockout. For more information, see Appendix A, Using the Identity Synchronization for Windows Command Line Utilities.


Specifying How Deletions Flow

Use Object Deletions tab to specify how deleted user entries should flow between Directory Server and Active Directory systems.


Note –

You cannot specify Object Deletions flow for Windows NT.


ProcedureTo Specify how Deleted Entries Flow Between Directory Server and Active Directory Systems

  1. Select the Identity Synchronization for Windows node at the top of the navigation pane, and then click the Object Deletion tab.

    Figure 8–48 Propagating User Entry Deletions

    Use this panel to control how deleted user entries  are
propagated between systems.

  2. Enable or disable the flow of deletions as follows:

    • Enable Object deletions flow from Sun Java System Directory Server to Active Directory to propagate deletions from the Sun Directory Server environment to your Active Directory servers.

    • Enable Object deletions flow from Active Directory to Sun Java System Directory Server to propagate deletions from the Active Directory environment to your Sun Directory Servers.

    • Enable both options for bidirectional flow.

    • Disable both options to prevent user deletions from propagating from one system to the other (Default setting).