OneIM TargetSystemBaseModule Administration
OneIM TargetSystemBaseModule Administration
Contacting us 51
Index 53
The main feature of One Identity Manager is to map employees together with the main data
and permissions available to them in different target systems. To achieve this, information
about user accounts and permissions can be read from the target system into the One
Identity Manager database and linked to employees. This provides an overview of the
permissions for each employee in all of the connected target systems. One Identity
Manager offers the option of managing user accounts and their permissions. You can
provision modifications in the target systems. Employees are supplied with the necessary
permissions in the connected target systems according to their function in the company.
Regular synchronization keeps data consistent between target systems and the One
Identity Manager database.
Because requirements vary between companies, One Identity Manager offers different
methods for supplying user accounts to employees. One Identity Manager supports the
following method for linking employees and their user accounts.
l Employees can automatically obtain their user accounts through One Identity
Manager account definitions.
l When user accounts are inserted in One Identity Manager, they can be automatically
assigned to an existing employee or a new employee can be created if necessary.
l Employee and user account data in One Identity Manager can be manually entered
and assigned to each other.
One Identity Manager uses different mechanisms to assign user accounts to employees.
The user accounts are initially read into One Identity Manager from a target system
through synchronization. In doing so, the existing employees can automatically be
assigned to the user accounts. New employees can be created and assigned to user
accounts if necessary. The criteria for these automatic assignments are defined on a
company-specific basis. The extent of the attributes an employee inherits on their user
account through account definitions can be changed after checking the user accounts. The
loss of user accounts through system changes can therefore be avoided. User account
verification can be carried out manually or by using scripts.
One Identity Manager uses special account definitions for allocating user accounts to
employees during working hours. Account definitions can be created for each target system
of the appointed target system type, for example, the different domains of an Active
Directory environment or the individual clients of an SAP R/3 system. A priority is applied to
the account definitions in order to ensure that a Microsoft Exchange mailbox, for instance,
is only created when an Active Directory user account is available.
An employee can obtain a user account though the integrated inheritance mechanism by
either direct assignment of account definitions to an employee, or by assignment of
account definitions to departments, cost centers, locations, or business roles. All company
employees can be allocated special account definitions independent of their affiliation to the
departments, cost centers, locations, or business roles. It is possible to assign account
In order to fulfill the individual requirements of user administration, users can be divided
into categories:
l Unlinked: The user account is not linked to an employee.
l Linked: The user account is linked to an employee.
l Linked configured (linked with configuration of the connection): The user accounts
are linked to the employee. The effect of the link and the scope of the employee’s
inherited properties on the user accounts can be configured through an account
definition and its manage levels.
l One Identity Manager supplies a default configuration with the manage levels:
l Unmanaged: The user accounts are assigned to the employee, but do not
have any further properties of that employee.
l Full managed: The user accounts have an assignment to the employee and
inherit the properties of the employees.
The following visual is designed to make user account transitions clearer. It shows the
standard mechanisms for managing employees and user accounts integrated in One
Identity Manager.
NOTE: The employee entry cannot be removed from user accounts with a state of Linked
configured as long as the employee owns an account definition.
NOTE: The Full managed and Unmanaged manage levels are analyzed in templates.
You can customize the supplied templates in the Designer.
You can define other manage levels depending on your requirements. You need to amend
the templates to include manage level approaches.
A default manage level is defined for every account definition. This manage level is used to
determined the valid IT operating data when a user account is created automatically. In the
One Identity Manager default installation, the processes are checked at the start to see if
the employee already has a user account in the target system that has an account
definition. If no user account exists, a new user account is created with the account
definition’s default manage level.
NOTE: If a user account already exists and is disabled, then it is re-enabled. You have to
alter the user account manage level afterward in this case.
The effects on account definition inheritance of temporary disabling, permanent disabling,
deletion, and security risk to employees is specified for each account definition.
l As long as an account definition applies to an employee, this employee keeps its
linked user accounts. You may want employees that are disabled or marked for
deletion to inherit account definitions to ensure that all necessary permissions are
made immediately available when the employee is reactivated at a later time.
l If the account definition assignment no longer applies or is removed from the
employee, the user account created through this account definition, is deleted.
In addition, you can specify the effect of temporarily or permanently disabling, deleting, or
the security risk of an employee on its user accounts and group memberships for each
manage level.
l Employee user accounts can be locked when they are disabled, deleted, or rated as a
security risk so that permissions are immediately withdrawn. If the employee is
reinstated at a later date, the user accounts are also reactivated.
l You can also define group membership inheritance. Inheritance can be discontinued
if desired when, for example, the employee’s user accounts are disabled and
You can also specify IT operating data directly for a specific account definition.
Example:
LDAP Container
Groups can be inherited
Identity
Privileged user account
Domino Server
Certificate
Template for mail file
Identity
The employee’s central user account is used to form the user account login name in the
active system. The central user account is still used for logging into the One Identity
Manager tools. In One Identity Manager default installation, the central user account is
made up of the first and the last name of the employee. If only one of these is known, then
it is used for the central user account. One Identity Manager checks to see if a central user
account with that value already exists. If this is the case, an incremental number is added
to the end of the value.
Jo JO
User1 J
Jo User1 JOU
Jo User2 JOU1
Related topics
l Employee's default email address on page 17
l Changing employee main data on page 17
Related topics
l Employee's central user account on page 16
l Changing employee main data on page 17
General changes
General changes refer to data changes relating to an employee’s telephone number, fax
number, mobile telephone, street, postal, or ZIP code. This process changes the data in the
target system to which the employees are assigned, assuming this data is mapped in the
respective target systems.
Changes to an employee’s name influence how an employee’s central user account is set
up. The central user account is made up of the employee’s first and last names according to
the formatting rules. The central user account is used as a template for formatting user
account login names in some target systems. When a user account is added, other
overriding formatting rules control how, for example, the home and profile directories are
formatted up from the central user account.
Job rotation is affected by changes to the company data location or department. In One
Identity Manager, the administrative tasks for changing the target system specific IT
operating data, for example, domains, home servers, or profile servers, are automated.
There are other sub-processes for each target system due to system-dependent differences
in the actions necessary for changing departments.
Related topics
l Employee's central user account on page 16
l Employee's default email address on page 17
There are two domains in an Active Directory environment. The employees can only
have a user account in one of the domains. The department operational data is used
to determine whether the user account is created in domain A or domain B.
Create an account definition A for domain A and an account definition B for domain B
and assign them the Full managed manage level. This manage level uses the One
Identity Manager default templates to determine the IT operating data. In the IT
operating data mapping rule, specify the department property for both account
definitions for finding the valid IT operating data.
If the employee belongs to department A, they receive (for example by dynamic
assignment) the account definition A and as a result, a user account in domain A. If
the employee belongs to department B, they are assigned the account definition B
and they receive a user account in domain B.
There are two domains in an Active Directory environment. The employees can have
a user account in both of the domains. The user account in domain A is allocated IT
operating data through the employee’s department. The user account in domain B is
allocated IT operating data through the employee’s primary business role.
Create an account definition A for domain A and an account definition B for domain B
and assign them the Full managed manage level. The Full managed manage level
uses One Identity Manager default templates to determine the IT operating data.
Specify the department property for account definition A in the IT operating data
mapping rule for finding the valid IT operating data. Specify the property business
role for account definition B in the IT operating data mapping rule for finding the
valid IT operating data.
Through synchronization user accounts are initially loaded from the target system into One
Identity Manager. Automatic assignment of user accounts to existing employees can take
place by subsequently modifying scripts and processes. If necessary, new employees can
be created based on existing user accounts to which they are then assigned. However, this
is not the One Identity Manager default method. You can also use this procedure to create
employee data from existing target system user accounts during synchronization.
If you run this procedure during working hours, automatic assignment of employees to user
accounts takes place from that moment onwards. If you disable the procedure again later,
the changes only affect user accounts added or updated after this point in time. Existing
employee assignment to user accounts remain intact.
Related topics
l Handling employees and user accounts on page 7
l Configuring automatic employee assignment on page 22
l Editing search criteria for automatic employee assignment on page 24
l Modifying scripts for automatic employee assignment on page 29
NOTE: The configuration parameters are included in the One Identity Manager modules
and are available once the modules are installed.
Configuration parameters for automatic employee assignment:
l TargetSystem | <Target system type> | PersonAutoDefault
l TargetSystem | <Target system type> | PersonAutoFullSync
If a user account is linked to an employee through the current mode, the user account is
given, through an internal process, the default manage level of the account definition
entered in the user account's target system. You can change this manage level later.
NOTE:
In the default installation, after synchronizing, employees are automatically created for
the user accounts.If an account definition for the target system is not known at the time
of synchronization, user accounts are linked with employees. However, account
definitions are not assigned. The user accounts are therefore in a Linked state.
To manage the user accounts using account definitions, assign an account definition and
a manage level to these user accounts.
NOTE: One Identity Manager supplies a default mapping for employee assignment. Only
carry out the following steps when you want to customize the default mapping.
1. In the Manager, select the Target system type > <target system> category.
2. Select the target system in the result list and run the Define search criteria for
employee assignment task.
3. Select the object definition for the mapping.
NOTE: Object definitions for user accounts that can have search criteria applied to
them are predefined. For example, if you require other objects definitions that
limit a preselection of user accounts, set up the respective custom object defin-
itions in the Designer. For more information, see the One Identity Manager Config-
uration Guide.
a. To add a new object definition, click Add > Criteria. Use the Apply to menu
item to select the object definition that the search criteria was defined for.
The search criteria is applied to all user accounts if no object definition
is selected.
b. To change the object definition of an existing search criterion, select the search
criterion in the Search criteria view. Use the Apply to menu item to select
the object definition that the search criteria was defined for.
Format Meaning
template
Crop to fixed Defines the length of the character string to search for. Use fill
length characters at the beginning or end of the string to ensure it
reaches the fixed length.
Remove leading Characters that are to be removed at the start or end of the
or trailing character string. The remaining string forms the search criteria.
characters
Split value Characters for which the character string should be split and for
which the remaining parts should be used as a search criterion.
Different object properties can be joined for search criteria. Both AND and OR operators
can be used.
To assign employees to Notes user accounts, the surname as well as first name must
be the same for the employee and the user account. The following table columns are
Example: OR operator
1. In the Search criteria view, select the operator to which you want to add another
object property. Click Change operator to select the operator for the link.
2. Click Add > Criteria.
3. Select the object properties to map.
4. Select the object properties to be mapped.
5. If you want to nest links, click Add > AND operator or Add > OR operator and
rerun steps 2 to 4.
6. Save the changes.
View Description
Suggested This view lists all user accounts to which One Identity Manager can
assignments assign an employee. All employees are shown who were found using the
search criteria and can be assigned.
Assigned user This view lists all user accounts to which an employee is assigned.
accounts
Without This view lists all user accounts to which no employee is assigned and for
employee which no employee was found using the search criteria.
assignment
TIP: By double-clicking on an entry in the view, you can view the user account and
employee main data.
The assignment of employees to user accounts creates connected user accounts (Linked
state). To create managed user accounts (Linked configured state), you can assign an
account definition at the same time.
To remove assignments
l Click Assigned user accounts.
1. Click the Selection box of all the user accounts you want to delete the
employee assignment from. Multi-select is possible.
2. Click Remove selected.
3. Confirm the security prompt with Yes.
The assigned employees are removed from the selected user accounts.
The last name of an Active Directory user account is made up of the surname of
the employee.
Value template for ADSAccount.Surname:
Value = $FK(UID_Person).Lastname$
If the employee’s surname changes, the last name of the Active Directory Jo
User1anges, too. The column Person.Lastname is therefore the sender and the
column ADSAccount.Surname is the receiver.
Relationship as in the table Dialognotification:
Person.Lastname -- > ADSAccount.Surname
The table DialogNotification can be used to help with the initialization of the properties for
a new employee in that the relationships can be removed in reverse. The surname of an
employee can be replaced with the surname of the Active Directory user. Thus, certain
presets for the employee object can be automatically generated. However, only explicit
relationships can be removed.
Example:
The display name of an Active Directory user account should be made up of the
surname and the first name of an employee.
Relationships as in the table DialogNotification:
Person.Lastname -- > ADSAccount.Displayname
Person.Firstname -- > ADSAccount.Displayname
The Person.Firstname and Person.Lastname cannot be determined from the
ADSAccount.Displayname, since this is a compound value.
You can use the script TSB_PersonAuto_GetPropMappings to make it easier to map employee
properties to user account properties. This script evaluates the relationship of the
properties as used in the table DialogNotification. The script creates a VB.Net script code
and the possible assignments, when it is run by the System Debugger. This code can
subsequently be inserted into the script <target system type>_PersonAuto_Mapping_
<account type>.
1. User accounts are linked to employees and managed through account definitions.
2. User accounts are linked to employees. No account definition is applied.
The following methods are available in the One Identity Manager standard version:
l Temporarily deactivating employees
l Permanently deactivating employees
l Deferred deletion of an employee
l Disabling and deleting using account definitions
NOTE:
l Configure the Lock accounts of employees that have left the company
schedule in the Designer. This schedule checks the start date for disabling and sets
the Temporarily disabled option when it is reached.
l In the Designer, configure the Enable temporarily disabled accounts schedule.
This schedule monitors the end date of the disabled period and enables the
employee with their user accounts when the date expires. Employee's user
accounts that were disabled before the period of temporary absence are also re-
enabled once the period has expired.
Scenario: user accounts are linked to employees and are managed through account
definitions.
l Specify in the account definitions, how temporary disabling of an employee affects
the user account.
Related topics
l Disabling and deleting using account definitions on page 34
Scenario: user accounts are linked to employees and are managed through account
definitions.
l Specify in the account definitions, how temporary deactivating of an employee
affects the user account.
Related topics
l Disabling and deleting using account definitions on page 34
Related topics
l Disabling and deleting using account definitions on page 34
Property Description
Table 7: Main data for a manage level for handling user accounts
Property Description
Property Description
Retain groups if user Specifies whether disabled user accounts retain their group
account disabled memberships.
The Unified Namespace is a virtual system in which different target systems can be mapped
with their structures, user accounts, system entitlements and memberships. The Unified
Namespace allows a general, cross-target system mapping of all connected target systems.
This means that target systems like Active Directory domains can be mapped just the same
as custom target systems.
You can use other Unified Namespace core functionality across target systems by mapping
target systems in the One Identity Manager, such as identity audit, attestation, or report
functions. You are supplied with several reports by default.
SharePoint SPSSite
LDAP LDPDomain
Unix UNXHost
Container (UNSContainer)
The UNSContainer view maps the target system's container structures.
SharePoint SPSWeb
LDAP LDAPContainer
SharePoint SPSUser
LDAP LDAPAccount
Unix UNXAccount
LDAP LDAPGroup
Unix UNXGroup
AADSubSku
LDAP LDAPAccountInLDAPGroup
Unix UNXAccountInUNXGroup
SharePoint SPSGroupHasSPSRLAsgn
LDAP LDAPGroupInLDAPGroup
LDAP LDAPGroupExclusion
Unix UNXGroupExclusion
LDAP LDAPGroupCollection
Users Tasks
Target system Target system managers must be assigned to the Target systems |
managers Unified Namespace application role or a child application role.
Users with this application role:
l Obtain view of the objects in the connected target systems
across all target systems.
l Can create reports across all target systems.
If the users are also target system managers of the basic underlying
target systems, you can manage these target systems through the
Unified Namespace.
One Identity One Identity Manager administrator and administrative system users
Manager Administrative system users are not added to application roles.
administrators
One Identity Manager administrators:
l Create customized permissions groups for application roles for
role-based login to administration tools in the Designer as
required.
l Create system users and permissions groups for non role-based
login to administration tools in the Designer as required.
l Enable or disable additional configuration parameters in the
Designer as required.
l Create custom processes in the Designer as required.
l Create and configure schedules as required.
l Create and configure password policies as required.
Show overview User account This report shows an overview of the user
account and the assigned permissions.
Show overview including User account This report shows an overview of the user
origin account and origin of the assigned permissions.
Show overview including User account This report shows an overview of the user
history accounts including its history.
Select the end date for displaying the history
(Min. date). Older changes and assignments
that were removed before this date, are not
shown in the report.
Show user accounts Container This report shows all the container's user
overview (incl. history) accounts with their permissions including a
history.
Select the end date for displaying the history
(Min. date). Older changes and assignments
Show system entitle- Container This report shows the container's system
ments overview (incl. entitlements with the assigned user accounts
history) including a history.
Select the end date for displaying the history
(Min. date). Older changes and assignments
that were removed before this date, are not
shown in the report.
Overview of all Container This report finds all roles containing employees
assignments with at least one user account in the selected
container.
Overview of all System This report finds all roles containing employees
assignments entitlement who have the selected system entitlement.
Show overview including System This report shows an overview of the system
origin entitlement entitlement and origin of the assigned user
accounts.
Show overview including System This report shows an overview of the system
history entitlement entitlement and including its history.
Select the end date for displaying the history
(Min. date). Older changes and assignments
that were removed before this date, are not
shown in the report.
Show historical member- System This report shows all employees that are
ships entitlement assigned a user account from this system
entitlement including the duration of the
membership.
Select the end date for displaying the history
(Min. date). Older changes and assignments
that were removed before this date, are not
shown in the report.
Show entitlement drifts Target This report shows all system entitlements that
system are the result of manual operations in the
target system rather than provisioned by One
Identity Manager.
Show user accounts Target This report returns all the user accounts with
Show user accounts with Target This report contains all user accounts with an
an above average system above average number of system entitlements.
number of system
entitlements
Show employees with Target This report shows all the employees that have
multiple user accounts system multiple user accounts. The report contains a
risk assessment.
Show system Target This report shows the system entitlements with
entitlements overview system the assigned user accounts including a history.
(incl. history)
Select the end date for displaying the history
(Min. date). Older changes and assignments
that were removed before this date, are not
shown in the report.
Overview of all Target This report finds all roles containing employees
assignments system with at least one user account in the selected
target system.
Show unused user Target This report contains all user accounts, which
accounts system have not been used in the last few months.
Show orphaned user Target This report shows all user accounts to which no
accounts system employee is assigned.
Show user account Target This report shows modified user accounts from
operations system all target systems for a specific time period.
Report Description
Orphaned user This report shows all user accounts to which no employee is
accounts in all assigned. You can find the report in the My One Identity Manager
target systems > Data quality analysis category.
Unused user This report contains all user accounts, which have not been used in
accounts in all the last few months. You can find the report in the My One Identity
target systems Manager > Data quality analysis category.
System entitle- This report shows all system entitlements that are the result of
ment drifts in all manual operations in the target system rather than provisioned by
target systems One Identity Manager. You can find the report in the My One
Identity Manager > Data quality analysis category.
User accounts This report contains all user accounts with an above average number
with an above of system entitlements. You can find the report in the My One
average number Identity Manager > Data quality analysis category.
of system entitle-
ments
Unified The report shows an overview of the distribution of user accounts and
Namespace user system authorizations in Unified Namespace. You can find the report
account system in the My One Identity Manager > Target system overviews
entitlements distri- category.
bution
User account This report shows modified user accounts from all target systems for
operations across a specific time period. You can find the report in the My One
all systems Identity Manager > Target system overviews category.
About us
One Identity solutions eliminate the complexities and time-consuming processes often
required to govern identities, manage privileged accounts and control access. Our solutions
enhance business agility while addressing your IAM challenges with on-premises, cloud and
hybrid environments.
For sales and other inquiries, such as licensing, support, and renewals, visit
https://www.oneidentity.com/company/contact-us.aspx.
Technical support is available to One Identity customers with a valid maintenance contract
and customers who have trial versions. You can access the Support Portal at
https://support.oneidentity.com/.
The Support Portal provides self-help tools you can use to solve problems quickly and
independently, 24 hours a day, 365 days a year. The Support Portal enables you to:
l Submit and manage a Service Request
l View Knowledge Base articles
l Sign up for product notifications
l Download software and technical documentation
l View how-to videos at www.YouTube.com/OneIdentity
l Engage in community discussions
l Chat with support engineers online
l View services to assist you with your product
A mode "SEARCH" 22
outstanding 44
validity period 44 I
IT operating data
E account definition 10, 12, 14
employee
account definition 10 S
assign automatically 21
search criteria
central user account 16
employee assignment 24
change 17
system entitlement
default email address 17
limited assignment 44
delete 34
general changes 17
U
job rotation 17
name change 17 Unified Namespace 38
automatic 21 mapping 38