Ad Administratio PDF
Ad Administratio PDF
Ad Administratio PDF
2
Contents
Contents 3
4 Creating a New Driver 33
Gathering Configuration Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Creating the Driver in Designer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Importing the Current Driver Packages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Installing the Driver Packages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Configuring the Driver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Deploying the Driver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Starting the Driver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Activating the Driver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Adding Packages to an Existing Driver. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
6 Synchronizing Passwords 47
Securing Driver Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Setting Up Password Synchronization Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Allowing Remote Access to the Registry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Not Allowing Remote Access to the Registry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Updating Password Sync Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Retrying Synchronization after a Failure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Retrying after an Add or Modify Event . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Password Expiration Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Disabling Password Synchronization on a Driver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Diagnosing Password Synchronization Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Using PassSync Troubleshooting Tool. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Verifying the Driver Machine Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Verifying the Domain Controller Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Troubleshooting Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
4 Contents
10 Troubleshooting 77
Changes Are Not Synchronizing from the Publisher or Subscriber . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Using Characters Outside the Valid NT Logon Names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Synchronizing c, co, and countryCode Attributes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Synchronizing Operational Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Password Complexity on Windows Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Tips on Password Synchronization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Providing Initial Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Where to Set the SSL Parameter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Password Filter Synchronization State Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Unable to Retrieve Passwords When Google Password Synchronization is Installed . . . . . . . . . . . . . . . . . . 82
Passwords Are Not Synchronized from Active Directory to the Identity Vault with Service Account . . . . . 82
Active Directory Account Is Disabled After a User Is Added on the Subscriber Channel . . . . . . . . . . . . . . . 83
Moving a Parent Mailbox to a Child Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Restoring Active Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Moving the Driver to a Different Domain Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Migrating from Active Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Setting LDAP Server Search Constraints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Error Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Performance is Degraded if eDirectory is Installed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Modify Operations Fail on AD LDS Instances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
PowerShell Service Installation Fails for Active Directory Drivers on Windows 2012 Devices . . . . . . . . . . . 88
Setting a Password in Active Directory Driver Resets the eDirectory Password Expiration Date to
the
Current Date . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
PowerShell Service Does Not Automatically Start on Windows Server 2012 R2. . . . . . . . . . . . . . . . . . . . . . 88
PowerShell Service Consumes Lot of Disk Space When Multiple PSSessions are Initialized . . . . . . . . . . . . 89
Working with TimeToLive(minute) Attribute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Troubleshooting Driver Processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Driver Loses An Event That Does Not Have class-Name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Applying the Latest Driver Package Does Not Change the Default Setting of Enable Service
Channel ECV . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
A Driver Properties 93
Driver Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Driver Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Driver Object Password (iManager Only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Startup Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Driver Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
ECMAScript (Designer Only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Global Configurations (Designer Only). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Global Configuration Values. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Password Synchronization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Account Tracking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Managed System Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Contents 5
B Configuring the Driver for Use with an AD LDS/ADAM Instance 105
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Installation Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Installing Internet Information Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Installing Certificate Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Installing AD LDS/ADAM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Requesting and Installing the Server Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Configuration Tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Setting the Default Naming Context for Your AD LDS/ADAM Instance . . . . . . . . . . . . . . . . . . . . . . .108
Creating a User in AD LDS/ADAM with Sufficient Rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Creating the AD LDS/ADAM Driver. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
6 Contents
About this Book and the Library
The Identity Manager Driver for Active Directory Implementation Guide explains how to install,
configure, and manage the Identity Manager Driver for Active Directory.
Intended Audience
This book provides information for individuals responsible for understanding administration
concepts and implementing a secure, distributed administration model.
We are a global, enterprise software company, with a focus on the three persistent challenges in
your environment: Change, complexity and risk—and how we can help you control them.
Our Viewpoint
Adapting to change and managing complexity and risk are nothing new
In fact, of all the challenges you face, these are perhaps the most prominent variables that deny
you the control you need to securely measure, monitor, and manage your physical, virtual, and
cloud computing environments.
Enabling critical business services, better and faster
We believe that providing as much control as possible to IT organizations is the only way to
enable timelier and cost effective delivery of services. Persistent pressures like change and
complexity will only continue to increase as organizations continue to change and the
technologies needed to manage them become inherently more complex.
Our Philosophy
Selling intelligent solutions, not just software
In order to provide reliable control, we first make sure we understand the real-world scenarios
in which IT organizations like yours operate—day in and day out. That's the only way we can
develop practical, intelligent IT solutions that successfully yield proven, measurable results. And
that's so much more rewarding than simply selling software.
Driving your success is our passion
We place your success at the heart of how we do business. From product inception to
deployment, we understand that you need IT solutions that work well and integrate seamlessly
with your existing investments; you need ongoing support and training post-deployment; and
you need someone that is truly easy to work with—for a change. Ultimately, when you succeed,
we all succeed.
Our Solutions
Identity & Access Governance
Access Management
Security Management
Systems & Application Management
Workload Management
Service Management
Worldwide: www.netiq.com/about_netiq/officelocations.asp
Email: info@netiq.com
Worldwide: www.netiq.com/support/contactinfo.asp
Email: support@netiq.com
This section contains high-level information about how the Active Directory driver functions.
“Key Terms” on page 11
“Data Transfers Between Systems” on page 13
“Key Driver Features” on page 13
“Default Driver Configuration” on page 14
Key Terms
“Identity Manager” on page 11
“Connected System” on page 11
“Identity Vault” on page 11
“Identity Manager Engine” on page 12
“Active Directory Driver” on page 12
“Driver Shim” on page 12
“Remote Loader” on page 12
Identity Manager
NetIQ Identity Manager is a service that synchronizes data among servers in a set of connected
systems by using a robust set of configurable policies. Identity Manager uses the Identity Vault to
store shared information, and uses the Identity Manager engine for policy-based management of
the information as it changes in the vault or connected system. Identity Manager runs on the server
where the Identity Vault and the Identity Manager engine are located.
Connected System
A connected system is any system that can share data with Identity Manager through a driver. Active
Directory is a connected system.
Identity Vault
The Identity Vault is a persistent database powered by eDirectory and used by Identity Manager to
hold data for synchronization with a connected system. The vault can be viewed narrowly as a
private data store for Identity Manager or more broadly as a metadirectory that holds enterprise-
wide data. Data in the vault is available to any protocol supported by eDirectory, including the
NetWare Core Protocol (NCP), which is the traditional protocol used by iManager, LDAP, and DSML.
Because the vault is powered by eDirectory, Identity Manager can be easily integrated into your
corporate directory infrastructure by using your existing directory tree as the vault.
Driver Shim
A driver shim is the component of a driver that converts the XML-based Identity Manager command
and event language (XDS) to the protocols and API calls needed to interact with a connected system.
The shim is called to execute commands on the connected system after the Output Transformation
runs. Commands are usually generated on the Subscriber channel but can be generated by
command write-back on the Publisher channel.
The shim also generates events from the connected system for the Input Transformation policy. A
driver shim can be implemented either in Java class or as a native Windows DLL file. The shim for
Active Directory is ADDriver.dll.
ADDriver.dll is implemented as a native Windows DLL file. It uses several different Windows APIs
to integrate with Active Directory. These APIs typically require some type of login and authentication
to succeed. Also, the APIs might require that the login account have certain rights and privileges
within Active Directory and on the machine where ADDriver.dll executes.
If you use the Remote Loader, ADDriver.dll executes on the server where the Remote Loader is
running. Otherwise, it executes on the server where the Identity Manager engine is running.
Remote Loader
A Remote Loader enables a driver shim to execute outside of the Identity Manager engine (perhaps
remotely on a different machine). The Remote Loader is typically used when a requirement of the
driver shim is not met by the Identity Manager server. For example, if the Identity Manager engine is
running on Linux, the Remote Loader is used to execute the Active Directory driver shim on a
Windows server.
The Remote Loader is a service that executes the driver shim and passes information between the
shim and the Identity Manager engine. When you use a Remote Loader, you install the driver shim
on the server where the Remote Loader is running, not on the server where the Identity Manager
engine is running. You can choose to use SSL to encrypt the connection between the Identity
Manager engine and the Remote Loader.
When you use the Remote Loader with the Active Directory driver shim, two network connections
exist:
Between the domain controller and the Remote Loader
Between Active Directory and the Active Directory driver shim
You can configure the driver so that both Active Directory and the Identity Vault are allowed to
update a specific attribute. In this configuration, the most recent change determines the attribute
value, except for merge operations that are controlled by the filters and merge authority.
NOTE: A single transaction can handle multiple events. When any one of the event fails, the driver
fails to execute all the subsequent events in the transaction.
Local Platforms
A local installation is an installation of the driver on the Identity Manager server. The Active
Directory driver can be installed on the Windows operating systems supported for the Identity
Manager server. The following Windows platforms are supported:
Windows Server 2022
Windows Server 2019
Windows Server 2016
Windows Server 2012 R2 (64-bit)
For more information about local installations, see “Where to Install the Active Directory Driver” on
page 20.
For more information about remote installations, see “Where to Install the Active Directory Driver”
on page 20.
Filters
The driver filter determines which classes and attributes are synchronized between Active Directory
and the Identity Vault, and in which direction synchronization takes place.
Schema Mapping
Table 1-1 through Table 1-6 list Identity Vault user, group, and Organizational Unit attributes that are
mapped to Active Directory user and group attributes.
The mappings listed in the tables are default mappings. You can remap same-type attributes.
Table 1-1, “Mapped User Attributes,” on page 15
Table 1-2, “Mapped Group Attributes,” on page 15
Table 1-3, “Mapped Organizational Unit Attributes,” on page 16
Table 1-4, “Mapped Organization Attributes,” on page 16
Table 1-5, “Mapped Locality Class,” on page 16
Table 1-6, “Mapped Non-Class Specific Attributes,” on page 16
DirXML-ADAliasName userPrincipalName
CN sAMAccountName
L PhysicalDeliveryOfficeName
nspmDistributionPassword nspmDistributionPassword
DirXML-ADAliasName userPrincipalName
L physicalDeliveryOfficeName
L physicalDeliveryOfficeName
The driver maps the Locality class, but there are no attributes for the class.
Locality locality
Description description
DirXML-EntitlementRef DirXML-EntitlementRef
DirXML-EntitlementResult DirXML-EntitlementResult
Initials initials
Member member
OU ou
Owner managedBy
S st
SA streetAddress
DirXML-SPEntitlements DirXML-SPEntitlements
Surname sn
Title title
Use the information in this section as you prepare to install the Active Directory driver:
“Driver Prerequisites” on page 19
“Where to Install the Active Directory Driver” on page 20
“Addressing Security Issues” on page 22
“Creating an Administrative Account” on page 26
“Configuring System Permissions” on page 27
“Becoming Familiar with Driver Features” on page 27
Driver Prerequisites
Windows Server 2022(64-bit), Windows Server 2019(64-bit), Windows Server 2016 (64-bit),
Windows Server 2012 R2 (64-bit), Windows Server 2012 (64-bit)
Internet Explorer 6.0 or later on the server running the Active Directory driver and on the target
domain controller
Active Directory domain controller DNS name or IP address, depending on the authentication
method
NOTE: The domain functional level for the Active Directory driver is supported on all supported
Windows Server platforms.
Also, we recommend that the server hosting the Active Directory driver be a member of the Active
Directory domain. This is required to provision Exchange mailboxes and synchronize passwords. If
you don’t require these features, the server can be a member of any domain as long as the Simple
(simple bind) authentication mode is used. To have bidirectional password synchronization, the
Negotiate authentication option must be selected.
If you want to synchronize with an ADAM instance, see Appendix B, “Configuring the Driver for Use
with an AD LDS/ADAM Instance,” on page 105 for more information.
If you want to synchronize Exchange accounts, see Appendix C, “Provisioning Exchange Accounts,”
on page 113.
Local Installation
A single Windows domain controller can host the Identity Vault, the Identity Manager engine, and
the driver.
Figure 2-1 All Components on the Domain Controller
Identity Vault
Metadirectory Engine
This configuration works well for organizations that want to save on hardware costs. It is also the
highest-performance configuration because there is no network traffic between Identity Manager
and Active Directory.
However, hosting Identity Vault and the Identity Manager engine on the domain controller increases
the overall load on the controller and increases the risk that the controller might fail. Because
domain controllers play a critical role in Microsoft networking, many organizations are more
concerned about the speed of the domain authentication and the risks associated with a failure on
the domain controller than about the cost of additional hardware.
Identity Vault
Metadirectory Engine
Network Connection Active Directory
Active Directory Driver
This configuration fits best when your corporate policy disallows running the driver on your domain
controller so that there is no Identity Manager software on the domain controller.
This configuration fits best when you require Identity Vault and Identity Manager engine
installations on a platform other than one of the supported versions of Windows.
Both types of remote installations eliminate the performance impact of hosting the Identity Vault
and the Identity Manager engine on the domain controller.
Identity Vault
Metadirectory
Engine
Remote Loader Active Directory
Active Directory
Driver Network Connection Network Connection
Active Directory
Linux, UNIX, or Windows Driver Shim Domain
Windows server server Controller
Authentication Methods
Authentication identifies the driver shim to Active Directory and, potentially, the local machine. To
authenticate to Active Directory, you can use either the Negotiate method or the Simple (simple
bind) method.
Negotiate The preferred method. The driver can be installed The server hosting the
on any server in the driver must be a member
Uses kerberos, NTLM, or a domain. of the domain.
pluggable authentication
scheme if one is installed.
Simple Used when the server The driver can be installed Some provisioning
hosting the driver shim is on a server that is not a services are unavailable,
not a member of the member of the domain. such as Exchange mailbox
domain. provisioning and
password
synchronization.
NOTE: Active Directory driver uses Negotiate as the default authentication method. When the Active
Directory driver’s basic configuration file is imported to create a new driver, the authentication
method is set to Negotiate by default. If you want to use Simple authentication, change the
authentication setting on the driver’s property page after the driver is created.
Password synchronization occurs between Active Directory and the Identity Vault. You need to make
sure that you use SSL with any communication that goes across the network.
If the Identity Manager engine, Identity Vault, the Active Directory driver, and Active Directory are
on the same machine, you don’t need SSL. Communication isn’t going across the network.
However, if you are accessing Active Directory remotely by using an Active Directory driver shim on a
member server, you need to set up SSL between the Active Directory driver shim and Active
Directory. You do this by setting the SSL parameter to Yes on the driver configuration. See Step 5, in
“SSL Connection between the Active Directory Driver and the Domain Controller” on page 24.
If you are using the Remote Loader on the domain controller, you can set up SSL between the
Identity Manager engine and the Remote Loader.
The following table outlines where SSL connections can be used for each of the scenarios discussed
in “Where to Install the Active Directory Driver” on page 20:
Two-Server: Identity Manager and the An SSL connection can be established between the Active
Active Directory driver are on the same Directory driver and the domain controller. See “SSL
server Connection between the Active Directory Driver and the
Domain Controller” on page 24.
Dual-Server: Identity Manager is on one An SSL connection can be established between Identity
server but the Active Directory driver is Manager and the Remote Loader running the Active
on a separate server Directory driver. See “SSL Connection Between the Remote
Loader and Identity Manager” on page 26.
2 Export this certificate in one of the following standard certificate file formats:
Personal Information Exchange (PFX, also called PKCS #12)
Cryptographic Message Syntax Standard (PKCS #7)
Distinguished Encoding Rules (DER) Encoded Binary X.509
Base64 Encoded X.509
3 Install this certificate on the domain controller.
4 Ensure that a trust relationship is established between the server hosting the driver shim and
the root CA that issued the certificate.
The server hosting the driver shim must trust the root CA that the issuing CA chains to.
For more information on establishing trust for certificates, see “Policies to establish trust of root
certification authorities” (http://technet.microsoft.com/en-us/library/
cc775613(v=ws.10).aspx), in the Microsoft TechNet Library (http://technet.microsoft.com/
library/bb625087.aspx).
5 In iManager, edit the driver properties and change the Use SSL (yes/no) option to yes.
The output is sent to the out.txt file. If you open the file and see the objects in Active Directory
listed, you made a successful SSL connection to Active Directory and the certificate is valid.
IMPORTANT: When the Remote Loader is running on a Windows server, the certificate must be in
Base64 format. If you use the DER format, the Remote Loader fails to connect to the Identity
Manager engine.
NOTE: The driver automatically provides default permissions to both PWFilter and the driver shim.
Modifying these permissions can affect the functionality of the driver and should be performed with
caution.
For troubleshooting tips relating to the userAccountControl attribute, see “Active Directory Account
Is Disabled After a User Is Added on the Subscriber Channel” on page 83.
There are several locations where you can install the driver files, as discussed in “Where to Install the
Active Directory Driver” on page 20.
By default, the Active Directory driver files are installed on the Identity Manager server at the same
time as the Identity Manager engine. The installation program extends the Identity Vault’s schema
and installs the driver shim, the driver configuration file, and a utility to help with the configuration
of the driver. It does not create the driver in the Identity Vault (see Chapter 4, “Creating a New
Driver,” on page 33) or upgrade an existing driver’s configuration (see Chapter 5, “Upgrading an
Existing Driver,” on page 43).
The following sections explain what to do if the Active Directory driver files are not on the server you
want and how to install the Active Directory Discovery tool (used to gather configuration
information) on the appropriate Active Directory server:
“Installing the Driver Files” on page 31
“Installing the Active Directory Discovery Tool” on page 31
After the Active Directory driver files are installed on the server where you want to run the driver
(see Chapter 3, “Installing the Driver Files,” on page 31), you can create the driver in the Identity
Vault. You do so by installing the driver packages and then modifying the driver configuration to suit
your environment. The following sections provide instructions:
“Gathering Configuration Information” on page 33
“Creating the Driver in Designer” on page 34
“Activating the Driver” on page 41
“Adding Packages to an Existing Driver” on page 41
NOTE: Drivers are created with packages, and iManager does not support packages. In order to
create drivers with the current version of Identity Manager, you must use Designer.
NOTE: The Common Settings page is only displayed if the Common Settings package is a
dependency.
9 (Conditional) If not already configured, fill in the following fields on the Common Settings
Advanced Edition page, then click Next:
User Application Provisioning Services URL: Specify the User Application Identity Manager
Provisioning URL.
User Application Provisioning Services Administrator: Specify the DN of the User
Application Administrator user. This user should have the rights for creating and assigning
resources. For more information, see “Setting Up Administrative User Accounts” in the
NetIQ Identity Manager Driver Administration Guide.
NOTE: This page is only displayed if you installed the Common Settings Advanced Edition
package.
10 On the Driver Information page, specify a name for the driver, then click Next.
NOTE: This page is only displayed if you installed the Account Tracking package.
15 Click Next.
16 (Conditional) On the General Information page, fill in the following fields to define your Active
Directory system, then click Next:
Name: Specify a descriptive name for this Active Directory system. The name is displayed
in reports.
Description: Specify a brief description for this Active Directory system. The description is
displayed in reports.
Location: Specify the physical location of this Active Directory system. The location is
displayed in reports.
Vendor: Leave Microsoft as the vendor of Active Directory. This information is displayed in
reports.
Version: Specify the version of this Active Directory system. The version is displayed in the
reports.
NOTE: This page is only displayed if you installed the Managed System package.
17 (Conditional) On the System Ownership page, fill in the following fields to define the ownership
of the Active Directory system, then click Next:
Business Owner: Select a user object in the Identity Vault that is the business owner of the
Active Directory system. This can only be a user object, not a role, group, or container.
Application Owner: Select a user object in the Identity Vault that is the application owner
of the Active Directory system. This can only be a user object, not a role, group, or
container.
NOTE: This page is only displayed if you installed the Managed System package.
NOTE: This page is only displayed if you installed the Managed System package.
19 Review the summary of tasks that will be completed to create the driver, then click Finish.
The driver is now created. You can modify the configuration settings, by continuing with the next
section, “Configuring the Driver” on page 39. If you don’t need to configure the driver, continue to
“Configuring the Driver” on page 39.
If you are running the driver on the Identity Manager server, the driver shim files are updated when
you update the server unless they were not selected during a custom installation. If you are running
the driver on another server, the driver shim files are updated when you update the Remote Loader
on the server.
This version of the driver shim supports drivers created by using any 3.x version of the driver
configuration file. You can continue to use these driver configurations until you are prepared to start
using packages.
The following sections provide information to help you upgrade an existing driver:
“What’s New” on page 43
“Upgrading the Driver” on page 43
What’s New
What’s New in Version 4.1.1.0
This version of the driver does not provide any new features.
2g Click Apply.
2h (Conditional) Fill in the fields with appropriate information to upgrade the package, then
click Next.
Depending on which package you selected to upgrade, you must fill in the required
information to upgrade the package.
2i Read the summary of the packages that will be installed, then click Finish.
2j Review the upgraded package, then click OK to close the Package Management page.
For detailed information, see the Upgrading Installed Packages in the NetIQ Designer for
Identity Manager Administration Guide.
Prerequisites
Before installing the patch, complete the following steps:
1 Take a back-up of the current driver configuration.
2 (Conditional) If the driver is running locally, stop the driver instance and the Identity Vault.
3 (Conditional) If the driver is running with a Remote Loader instance, stop the driver and the
Remote Loader instance.
4 In a browser, navigate to the NetIQ Patch Finder Download Page.
5 Under Patches, click Search Patches.
6 Specify Identity Manager nn Active Directory driver nn in the search box.
NOTE: You must reboot each Domain Controller for the changes to take effect. Therefore, check
your current pwfilter.dll file version before starting the update. If the current version and
the version shipped with the driver patch file are same, skip this step.
To set up password synchronization among Active Directory, the Identity Vault, and connected
systems, you need to complete the tasks in the “Password Management Checklist” in the NetIQ
Identity Manager Password Management Guide. The information in the following sections
supplements the information in that guide.
“Securing Driver Connections” on page 47
“Setting Up Password Synchronization Filters” on page 48
“Retrying Synchronization after a Failure” on page 56
“Disabling Password Synchronization on a Driver” on page 58
“Diagnosing Password Synchronization Issues” on page 59
Synchronizing Passwords 47
Setting Up Password Synchronization Filters
The Active Directory driver must be configured to run on only one Windows server. However, for
password synchronization to occur, you must install a password filter (pwFilter.dll) on each
domain controller and configure the registry to capture passwords to send to the Identity Vault.
The password filter is automatically started when the domain controller is started. The filter
captures password changes that users make by using Windows clients, encrypts the changes, and
sends them to the driver to update the Identity Vault.
NOTE: You do not need to install a password filter on a read-only domain controller.
The Active Directory driver can detect whether a user account password is modified by an
administrator or by the user themselves. Based on this information, the Identity Manager
engine sets the password during synchronization using the administrator account or user
account, as appropriate.
Password filter allows you to specify multiple hosts.
To simplify installation and administration of password filters, an Identity Manager PassSync utility is
added to the Control Panel when the driver is installed. This utility gives you two choices for setting
up the password filters, depending on whether you want to allow remote access to the registry on
your domain controllers:
“Allowing Remote Access to the Registry” on page 48
“Not Allowing Remote Access to the Registry” on page 52
“Updating Password Sync Filter” on page 55
48 Synchronizing Passwords
Because setting up the filter requires rebooting the domain controller, you might want to perform
this procedure after hours, or reboot only one domain controller at a time. If the domain has more
than one domain controller, keep in mind that each domain controller where you want Password
Synchronization to function must have the filter installed and must be rebooted.
1 Confirm that port 135 (the RPC endpoint mapper) is accessible on the domain controllers and
on the machine where the Active Directory driver is configured to run.
If you are using NetBIOS over TCP, you also need these ports:
137: NetBIOS name service
138: NetBIOS datagram service
139: NetBIOS session service
A firewall could prevent the ports from being accessible remotely.
2 Log in with an administrator account on the computer where the driver is installed.
3 At the computer where the driver is installed, click Start > Control Panel > Identity Manager
PassSync.
NOTE: Because there may be security policies in place that could block the PassSync utility from
running, we recommend you run the utility using an account with Administrator privileges.
4 In the dialog box that is displayed, click Yes to specify that this is the machine where the driver is
installed.
Synchronizing Passwords 49
You only receive this prompt the first time you run the utility. After you complete the
configuration, you are not shown this prompt again unless you remove this domain from the
list.
5 Click Add, then browse to and select the domain that you want to participate in password
synchronization.
The drop-down list displays known domains.
6 If no domains are listed, or if a 1208 error is displayed, you must manually type the domain
name.
The Identity Manager PassSync utility discovers all the domain controllers for that domain, and
installs pwFilter.dll on each domain controller. It also updates the registry on the computer
where you are running the drivers, and on each domain controller. This might take a few
minutes.
The pwFilter.dll doesn’t capture password changes until the domain controller has been
rebooted. The Identity Manager PassSync utility lets you see a list of all the domain controllers
and the status of the filter on them. It also lets you reboot the domain controller from inside
the utility.
7 (Optional) Specify a computer in the domain, then click OK.
If you leave the Computer field blank, PassSync queries the local machine. Therefore, if you are
running PassSync on a domain controller, you don’t need to specify a name. PassSync queries
the local machine (in this case, a domain controller) and gets (from the database) the list of all
domain controllers in the domain.
If you aren’t installing on a domain controller, specify the name of a computer that is in the
domain and that can get to a domain controller.
If you receive an error message indicating that PassSync can’t locate a domain, specify a name.
8 Click Yes to use the domain’s DNS name.
50 Synchronizing Passwords
You can select No, but the DNS name provides more advanced authentication and the ability to
more reliably discover domains in bigger installations. However, the choice depends on your
environment.
9 Select the name of the domain you want to participate in password synchronization from the
list, then click Filters.
The utility displays the names of all the domain controllers in the selected domain and the
status of the filter.
Synchronizing Passwords 51
The status for each domain controller should display the filter state as Not installed. However, it
might take a few minutes for the utility to complete its automated task, and in the meantime
the status might say Unknown.
10 To install the filter, click Add, then click Reboot.
You can choose to reboot the domain controllers at a time that makes sense for your
environment. Just keep in mind that password synchronization won’t be fully functional until
every domain controller has been rebooted.
11 When the status for all domain controllers is Running, test password synchronization to confirm
that it is working.
12 To add more domains, click OK to return to the list of domains, and repeat Step 5 through
Step 11.
52 Synchronizing Passwords
Because setting up the filter requires rebooting the domain controller, you might want to perform
this procedure after hours, or reboot only one domain controller at a time. If a domain has more
than one domain controller, keep in mind that each domain controller where you want Password
Synchronization to function must have the filter installed and must be rebooted.
This procedure is for any domain controller that does not have the Active Directory driver installed
on it.
1 Confirm that the following ports are available on both the domain controller and the machine
where the Identity Manager Driver for Active Directory is configured to run:
135: The RPC endpoint mapper
137: NetBIOS name service
138: NetBIOS datagram service
139: NetBIOS session service
2 On the domain controller, install only the Active Directory driver. For more information, see
“Planning Your Installation ” in the NetIQ Identity Manager Setup Guide for Windows.
Installing the driver installs the Identity Manager PassSync utility.
3 Click Start > Settings > Control Panel > Identity Manager PassSync.
NOTE: Because there may be security policies in place that could block the PassSync utility from
running, we recommend you run the utility using an account with Administrator privileges.
Synchronizing Passwords 53
4 In the dialog box that displays, click No to specify that this machine is not running the Active
Directory driver.
After you complete the configuration, you are not shown this prompt again unless you remove
the password filter by using the Remove button in the Password Filter Properties dialog box.
After you click No, the Password Filter Properties dialog box appears, with a status message
indicating that the password filter is not installed on this domain controller.
54 Synchronizing Passwords
This step is necessary so that the password filter knows where to send the password changes.
The password filter captures password changes, and must send them to the Identity Manager
driver to update the Identity Manager data store.
8 Verify that the information specified in Step 5 through Step 7 is correct, then click OK.
9 Reboot the domain controller to complete the installation of the password filter.
You can choose to reboot at a time that makes sense for your environment. Just keep in mind
that password synchronization won’t be fully functional until every domain controller has the
password filter installed and has been rebooted.
After the installation is complete and the domain controller is rebooted, the password filter is
loaded automatically whenever the domain controller starts.
10 Check the status for the password filter again by clicking Start > Settings > Control Panel, and
double-clicking the Identity Manager PassSync utility.
Confirm that the status says Running.
11 Repeat Step 2 through Step 10 for each domain controller that you want to participate in
password synchronization.
12 When the status says Running for all the domain controllers, test password synchronization to
confirm that it is working by having a user change his or her password by using the Windows
Client. This should initiate the synchronization process.
Synchronizing Passwords 55
Retrying Synchronization after a Failure
The following sections explain the retry methods used after a synchronization failure:
“Retrying after an Add or Modify Event” on page 56
“Password Expiration Time” on page 56
56 Synchronizing Passwords
“Scenario: Never Meeting Requirements” on page 58
“Scenario: E-Mail Notifications” on page 58
Scenario: No Effect
A new user with a password is created in Active Directory. The filter immediately sends the new
password to the driver. However, the driver hasn’t yet received that user Add event because the
event occurred between polling intervals. Because the driver has not yet created the user in the
Identity Vault, the password synchronization is not successful on this first attempt. The driver caches
the password.
At the next polling interval, the driver receives the Add user event for the new user. The driver also
checks to see if it has a password cached for this new user. The driver sends the Add user event to
the Identity Vault, and also sends a Modify user event to synchronize the password.
In this case, the password synchronization is delayed by only one polling interval.
The Password Expiration Time parameter doesn’t have an effect in this situation.
Synchronizing Passwords 57
Scenario: Never Meeting Requirements
A user with a password is created in Active Directory. However, this user never meets the criteria of
the Create policy for the Active Directory driver.
For example, perhaps the new user in Active Directory has a Description that indicates the user is a
contractor, and the Create policy blocks creation of User objects for contractors because the
business policy is that contract employees are not intended to have a corresponding user account in
the Identity Vault. Like the previous example, the filter immediately sends the password change, but
the password synchronization isn’t successful on the first attempt. The driver caches the password.
In this case, a corresponding user account is never created in the Identity Vault. Therefore, the driver
never synchronizes the cached password. After the Password Expiration Time has passed, the driver
removes the user password from its cache.
A use case for this is if one driver is synchronizing User objects and another driver is synchronizing
Contacts. Contacts are displayed in the Exchange Global Address List (GAL), but they do not require
an Active Directory license because they do not authenticate.
See “Password Sync Timeout (minutes):” on page 97 for more information about this parameter.
58 Synchronizing Passwords
Diagnosing Password Synchronization Issues
Identity Manager provides the PassSync Troubleshooting Tool to diagnose issues encountered during
password synchronization. This tool is a standalone executable that collects the following
information to help you analyze synchronization issues:
Domain Controller information
Password filter details
RPC connection details
Ensure you have the appropriate permissions to log in to this tool. For more information, see
“Logging In with Right Permissions” on page 63.
You must launch this tool on the computer where Active Directory driver is installed. For more
information, see “Verifying Remote Loader is Locally Available to PassSync Tool” on page 63.
This tool is available in the Identity Manager utilities folder located at:
\products\IDM\windows\setup\utilities\PassSyncTroubleshootingTool
“Using PassSync Troubleshooting Tool” on page 59
“Verifying the Driver Machine Information” on page 60
“Verifying the Domain Controller Information” on page 61
“Troubleshooting Tips” on page 62
Field Description
Trace File Specifies the location of the trace file where you want to store the trace
messages.
If you do not specify a path, the file is created in the same directory from
where you launched the tool.
Domain Name Specifies the name of the Active Directory domain you are synchronizing
passwords to and from.
Synchronizing Passwords 59
3 Perform the following actions in any order:
3a Click Check Driver Machine and specify the credentials. For more information, see
“Verifying the Driver Machine Information” on page 60.
3b Click Check Domain Controllers and specify the credentials. For more information, see
“Verifying the Domain Controller Information” on page 61.
NOTE: If you do not log in with right permissions, it reports an error. For more information, see
“Logging In with Right Permissions” on page 63.
When you click Check Driver Machine and Check Domain Controllers, the trace information is stored
in the file specified in Step 2.
60 Synchronizing Passwords
Driver Instances: Provides driver file path, connection details, and driver version. It also
provides information about the driver instances running on the Remote Loader.
Registry Information: Displays registry key values of the computer running the driver and
domain.
The following is a sample trace output displaying these parameters for example.com domain:
Fri Aug 17 02:00:31 2018 : Starting Checks on Driver Machine .....
Fri Aug 17 02:00:34 2018 : List of local files related to Driver are :
C:\novell\remoteloader\64bit\ADDriver.dll
C:\novell\remoteloader\64bit\ad-driver-Config.txt
C:\novell\remoteloader\64bit\ad-driverexample.com-Trace.log
Fri Aug 17 02:00:35 2018 : Driver version is "4.1.0.0">AD</
pr"20180125_120000"</cook
Fri Aug 17 02:00:35 2018 : Driver version is c1fe230"/> and Build ID is
"20180125_120000"</cook
Fri Aug 17 02:00:35 2018 : Driver version is "4.1.0.0">
Fri Aug 17 02:00:35 2018 : The 'Driver Machine' value in the registry
key[SOFTWARE\NOVELL\PASSSYNC] is : 1.
Fri Aug 17 02:00:35 2018 : Tests on this driver machine are done
Synchronizing Passwords 61
RPC Checks: Displays information whether domain controller servers and drivers are able to
connect to password filters via RPC tool.
The following is a sample trace output displaying these parameters for example.com domain:
Sun Aug 19 22:04:40 2018 : Starting Checks on All DCs .....
This 64 bit System has INCORRECT 32 bit PWFILTER dll version v3.0.0
(20180117) installed
Checking whether this tool can reach the filter through RPC
This tool can reach the filter through RPC
Troubleshooting Tips
Ensure the following conditions are met when driver is remotely installed:
All Active Directory servers belong to the same domain that is hosting the Remote Loader
server.
RPC service is running and able to connect to PWfilter modules of that Active Directory server.
To verify the status of RPC service and the number of driver instances running in your domain,
see “Verifying the Driver Machine Information” on page 60.
62 Synchronizing Passwords
Additionally, the following actions can help you troubleshoot the issues:
“Specifying the Registered Domain Name” on page 63
“Verifying Remote Loader is Locally Available to PassSync Tool” on page 63
“Using Out of Band Sync” on page 63
“Enabling the Password Synchronizing Driver Instance to Use RPC Service” on page 63
“Logging In with Right Permissions” on page 63
Synchronizing Passwords 63
To resolve this issue:
1 Run regedit and right click the HKLM\Software\Novell\PwFilter\Data key.
2 Select Permissions.
3 Select Advanced and add Administrators Group.
4 Set the Read permission.
5 Verify that Replace all child object permission entries with inheritable permission entries from
this object is selected.
64 Synchronizing Passwords
7 Managing Active Directory Groups and
7
Exchange Mailboxes
The following sections provide information to help you use the Active Directory driver to manage
groups and Exchange mailboxes that reside in Active Directory:
“Managing Groups” on page 65
“Managing Microsoft Exchange Mailboxes” on page 66
Managing Groups
The Active Directory group class defines two types of groups and three scopes for membership in the
group. Type and scope are controlled by the groupType attribute, which can be set via an Identity
Manager policy when a group is created in Active Directory and changed by modifying the attribute.
A group holds a collection of object references. The Distribution Group type gives no special rights or
privileges to its members and is commonly used as a distribution list for Exchange. The Security
Group type is a security principal. Its members receive the rights and privileges of the group.
Security Groups have a pre-Windows 2000 logon name (samAccountName) and a Security Identifier
(SID) that can be used in Security Descriptor (SD) Access Control Lists (ACL) on other objects to grant
or deny rights and privileges to its members.
Group scope controls whether an object from a foreign domain can be a member of the group and
also whether the group itself can be a member of another group. The three scopes are Domain
Local, Global, and Universal.
In general, Domain Local groups can hold references to objects anywhere in the forest but can be
assigned permissions only within the domain. Global groups are the opposite. They can only hold
references to objects within the domain but can be assigned permissions throughout the forest.
Universal groups can hold references and can be assigned permissions throughout the forest.
However, Universal groups come with their own restrictions and performance issues. Groups should
be created and used in conformance with Microsoft recommendations.
The groupType attribute is a 32-bit integer whose bits define type and scope. Groups can have only a
single scope at any given time.
When you use the entitlement method for provisioning, a user is granted or denied a mailbox based
on the entitlement set on the user in the Identity Vault. The entitlement holds the Distinguished
Name of the MDB and a state value that tells the driver whether the entitlement is granted or
revoked. The entitlement itself is managed by the User Application or the Role-Based Entitlements
driver. In either case, the external tool grants (or revokes) the right to the mailbox, the Subscriber
Command Transformation policy translates that right into an add-value or remove-value on the
homeMDB attribute and the driver shim translates the change to homeMDB into the proper calls to
the Exchange management system.
When you use the policy-based method for provisioning, the Subscriber Command Transformation
policy uses information about the state of the user object in the Identity Vault to assign the MDB.
The driver shim translates the change into the proper calls to the Exchange management system.
The default policy uses a simple rule for assigning the mailbox. It assumes that there is only one MDB
and that all users that have come this far through the policy chain should be assigned to that MDB.
Because the rules for assigning different MDBs vary widely from company to company, the default
configuration does not attempt to establish a “right way” of doing it. You implement your own
policies simply by changing the default assignment rules. You use DirXML Script if statements to
define the conditions for mailbox assignments and the do-set-dest-attribute command for
the homeMDB attribute to effect the change. You can get a list of Exchange MDBs by using the
ADManager.exe tool or by your own means.
When it is not managing Exchange mailboxes, the driver synchronizes the user’s e-mail address and
mail nickname.
As you work with the Active Directory driver, there are a variety of management tasks you might
need to perform, including the following:
Starting, stopping, and restarting the driver
Viewing driver version information
Using Named Passwords to securely store passwords associated with the driver
Monitoring the driver’s health status
Backing up the driver
Inspecting the driver’s cache files
Viewing the driver’s statistics
Using the DirXML Command Line utility to perform management tasks through scripts
Securing the driver and its information
Synchronizing objects
Migrating and resynchronizing data
Activating the driver
Upgrading an existing driver
Because these tasks, as well as several others, are common to all Identity Manager drivers, they are
included in one reference, the NetIQ Identity Manager Driver Administration Guide.
This following sections contains a description of the security parameters unique to the Active
Directory driver.
“Default Configuration of the Security Parameters” on page 71
“Recommended Security Configurations for the Remote Loader” on page 73
“Recommended Security Configurations for the Simple Authentication Method” on page 75
“Recommended Security Configuration for Powershell Service” on page 75
NOTE: Exchange and Powershell service must be run with lease privilege required for exchange
cmdlets and the configured AD powershell cmdlets.
Also only system admin and IDM administrator should be allowed to access the machine where AD
driver and powershell service is running.
For additional information about securing your Identity Manager system, see the NetIQ Identity
Manager Security Guide.
Authentication ID The account the driver uses to access the domain data. The Authentication
ID can be specified by using different formats:
Authentication context The context used to access domain data. The Authentication context can
be specified by using different formats:
Signing only works when you use the Negotiate authentication method and
the underlying security provider selects NTLM v2 or Kerberos for its
protocol.
Select Yes to digitally sign the communication between the driver shim and
Active Directory.
Digitally sign and seal This setting enables encryption on a Kerberos or NTLM v2 authenticated
communications connection between the driver shim and the Active Directory database.
Sealing encrypts the data so that it cannot be viewed by a network monitor.
Sealing only works when you use the Negotiate authentication method and
the underlying security provider selects NTLM v2 or Kerberos for its
protocols.
Select Yes to digitally encrypt communication between the driver shim and
the Active Directory database.
Select No if you do not want to sign and seal communication between the
driver shim and the Active Directory database.
Use SSL for encryption Select Yes to digitally encrypt communication between the driver shim and
the Active Directory database.
By default, the parameter is set to No. If you set this value to Yes, the SSL
pipe is encrypted for the entire conversation. An encrypted pipe is
preferred because the driver typically synchronizes sensitive information.
However, encryption slows the general performance of your servers.
Logon and impersonate Select Yes to log on and impersonate the driver authentication account for
CDOEXM (Collaboration Data Object for Exchange Management) and
Password Set support. The driver performs a local logon. The
authentication account must have the proper rights assignment. For more
information, see “Creating an Administrative Account” on page 26.
Authentication ID The account the driver uses to access the domain data. Use the
domain logon name, for example Administrator.
If you don’t want to run the driver on your Active Directory domain
controller, use hostname for the Negotiate method but use hostname
or the IP address for the simple method.
Remote Loader Password The password for the Remote Loader service.
Digitally sign In most environments, we recommend you select No for this option
communications and use SSL to secure communication between the Remote Loader
and the domain controller.
Digitally sign and seal In most environments, we recommend you select No for this option
communications and use SSL to secure communication between the Remote Loader
and the domain controller.
NOTE: Sealing only works when you use the Negotiate authentication
method and the underlying security provider selects NTLM v2 or
Kerberos for its protocols.
Use SSL for encryption Select Yes if Remote Loader is on a member server. If Remote Loader is
on a domain controller, select No. SSL is required to perform a
Subscriber password check, a Subscriber password set, and a
Subscriber password modify operation when the driver shim is not
running on the domain controller.
SSL requires that the Microsoft server running the driver shim imports
the domain controller’s server certificate. For more information, see
“Microsoft Security Compliance Manager” (http://
technet.microsoft.com/en-us/library/cc677002.aspx).
By default, the parameter is set to No. If you set this value to Yes, the
SSL pipe is encrypted for the entire conversation. An encrypted pipe is
preferred because the driver typically synchronizes sensitive
information. However, encryption slows the general performance of
your servers.
Table 9-3 Recommended Security Configuration for the Simple Authentication Method
Authentication ID The account the driver uses to access the domain data. Use LDAP
format for the Authentication ID. For example,
cn=IDMadmin,cn=Users,dc=domain,dc=com
Use SSL for encryption Select Yes. SSL requires that the Microsoft server running the driver
shim imports the domain controller’s server certificate imported. For
more information, see “Microsoft Security Compliance Manager”
(http://technet.microsoft.com/en-us/library/cc677002.aspx).
Refer to the following sections if you are experiencing a problem with the Active Directory driver.
“Changes Are Not Synchronizing from the Publisher or Subscriber” on page 78
“Using Characters Outside the Valid NT Logon Names” on page 78
“Synchronizing c, co, and countryCode Attributes” on page 78
“Synchronizing Operational Attributes” on page 79
“Password Complexity on Windows Server” on page 79
“Tips on Password Synchronization” on page 79
“Where to Set the SSL Parameter” on page 81
“Password Filter Synchronization State Definitions” on page 81
“Unable to Retrieve Passwords When Google Password Synchronization is Installed” on page 82
“Passwords Are Not Synchronized from Active Directory to the Identity Vault with Service
Account” on page 82
“Active Directory Account Is Disabled After a User Is Added on the Subscriber Channel” on
page 83
“Moving a Parent Mailbox to a Child Domain” on page 84
“Restoring Active Directory” on page 84
“Moving the Driver to a Different Domain Controller” on page 84
“Migrating from Active Directory” on page 84
“Setting LDAP Server Search Constraints” on page 85
“Error Messages” on page 86
“Performance is Degraded if eDirectory is Installed” on page 87
“Modify Operations Fail on AD LDS Instances” on page 88
“PowerShell Service Installation Fails for Active Directory Drivers on Windows 2012 Devices” on
page 88
“Setting a Password in Active Directory Driver Resets the eDirectory Password Expiration Date
to the Current Date” on page 88
“PowerShell Service Does Not Automatically Start on Windows Server 2012 R2” on page 88
“PowerShell Service Consumes Lot of Disk Space When Multiple PSSessions are Initialized” on
page 89
“Working with TimeToLive(minute) Attribute” on page 89
“Troubleshooting Driver Processes” on page 89
“Driver Loses An Event That Does Not Have class-Name” on page 90
“Applying the Latest Driver Package Does Not Change the Default Setting of Enable Service
Channel ECV” on page 91
Troubleshooting 77
Changes Are Not Synchronizing from the Publisher or
Subscriber
To synchronize changes in Active Directory, the account used by the Identity Manager driver must
have the proper rights set up. For information on the necessary rights, see “Creating an
Administrative Account” on page 26.
If you use the default policies, you must also meet the requirements for the Create, Match, and
Placement policies.
The dirxml-uACLockout attribute is not synchronized on the Subscriber channel.
Attribute Description
countryCode Contains a numeric value (also defined by the ISO) that represents the
country.
Because the ISO-defined numeric country codes are intended for use by applications that can’t
handle alphabetic characters, the default schema in the Identity Vault includes c and co but not
countryCode.
Identity Manager is capable of mapping c and co. It can also map countryCode if you add a similar
attribute to the eDirectory schema.
78 Troubleshooting
Active Directory’s management console tries to keep all three of these attributes synchronized, so
that when you set the country in the console, all three attributes have appropriate values. Some
administrators might want a similar behavior when the attribute is set through Identity Manager. For
example, you might want to configure the driver so that even though only c is in the Filter, co and
countryCode are also set when a change for c is sent on the Subscriber channel.
TIP: Make the password policies for both systems as similar to each other as you can. In a lab
environment, disable strong-password functionality on Windows Server servers before installing the
Active Directory driver. After the Active Directory driver is working properly, make sure that
passwords used in eDirectory and Active Directory satisfy the rules of complexity for both systems.
Then re-enable strong-password functionality on the Windows server.
Troubleshooting 79
The Identity Manager engine and Active Directory when you aren’t using the Remote Loader
This is true only if the domain controller isn’t local to this machine.
You can create a secure connection by doing one or more of the following:
Configure SSL between the Identity Manager engine and the Remote Loader
Run the Remote Loader on the domain controller
Configure SSL between the driver shim and Active Directory
This doesn’t apply if you are running the driver on the domain controller that you’re connecting
to.
For password synchronization to work when the driver shim isn’t running on the domain controller,
you must have SSL configured.
80 Troubleshooting
These measures are especially important if the initial password does not come with the Add event,
but comes in a subsequent event. A user is added to eDirectory in two stages. The object is created
in the initial Add event and then the password is set for this user. In the Create rule in the Subscriber
channel, there is a suggested rule to veto if the nspmDistributionPassword operational
attribute is not available. This causes the initial Add event to end with a veto, and the subsequent
Modify event ends with only the modify-attr attr-name="nspmDistributionPassword"
attribute, which turns the Modify event into a synthetic Add event. Because the initial Add event
was vetoed, the password Modify event is converted into another Add event, but this time it can
complete.
If there is one host name Sync State 00 - Password is not sent to any host.
If there are two host names Sync State 00 - Password is not sent to any host.
Sync State 01 - Password is sent only to the first host.
Sync State 02 - Password is sent only to the second host.
Troubleshooting 81
Host Name Value of Password Synchronization State
Filter Key
If there are three host names Sync State 00 - Password is not sent to any host.
Sync State 01 - Password is sent only to the first host.
Sync State 02 - Password is sent only to the second host.
Sync State 03 - Password is sent only to the first and second hosts.
Sync State 04 - Password is sent only to the third host.
Sync State 05 - Password is sent only to the first and third hosts.
Sync State 06 - Password is sent only to the second and third hosts.
You can see more than six synchronization states if there are four or more hosts in the Hosts Name
list.
82 Troubleshooting
DirXML: [03/27/10 18:19:22.19]: ADDriver: [PWD 4396]
PassSyncCache::StorePwdInfo()
DirXML: [03/27/10 18:19:22.19]: ADDriver: [PWD 4396] StorePwdInfo() - open
the cache.
DirXML: [03/27/10 18:19:22.19]: ADDriver: [PWD 4396] StorePwdInfo() -
acquire the mutex.
DirXML: [03/27/10 18:19:22.19]: ADDriver: [PWD 4396] StorePwdInfo() - mutex
acquired.
DirXML: [03/27/10 18:19:22.19]: ADDriver: [PWD 4396] StorePwdInfo() -
enumindex 0.
DirXML: [03/27/10 18:19:22.19]: ADDriver: [PWD 4396] StorePwdInfo() -
create the entry MC8314.
DirXML: [03/27/10 18:19:22.19]: ADDriver: [PWD 4396] StorePwdInfo() -
an error occurred ... delete this entry.
DirXML: [03/27/10 18:19:22.19]: ADDriver: [PWD 4396] StorePwdInfo() -
release the mutex.
DirXML: [03/27/10 18:19:22.19]: ADDriver: [PWD 4396] StorePwdInfo() - mutex
released.
DirXML: [03/27/10 18:19:22.19]: ADDriver: [PWD 4396] StorePwdInfo() - close
the cache
DirXML: [03/27/10 18:19:22.19]: ADDriver: [PWD 4396]
PassSyncCache::StorePwdInfo() returned 0x00000005
DirXML: [03/27/10 18:19:22.19]: ADDriver: [PWD] PassSyncPassword()
returned 0x00000005
To workaround this issue, set the Active Directory Service Account read, write, delete, and
inheritance rights to the HKEY_LOCAL_MACHINE\SOFTWARE\Novell\PassSync\Data registry
key on the Remote Loader. This allows the Remote Loader to read the password changes from
HKLM\SOFTWARE\Novell\PwFilter\Data\<Username> key for each user that has changed
password.
Troubleshooting 83
This causes the logon enable action of the Add operation to fail if the Add operation does not
include a policy for dirxml-uACPasswordNotRequired. Therefore, the account stays disabled.
Later (perhaps almost immediately because of a Merge operation), the driver might attempt to
enable the account again by setting Logon Disabled to False. If you want to override the Active
Directory policy and ensure that accounts always require a password, you should set dirxml-
uACPasswordNotRequired to False whenever Logon Disabled changes on the Subscriber channel.
84 Troubleshooting
configured on the Active Directory server. You can change the constraints on the LDAP server or
adjust your migration to get only a subset of objects each time (for instance, migrating container by
container or migrating objects starting with A, B, etc.).
C:\>ntdsutil
ntdsutil: LDAP Policies
ldap policy: Connections
server connections: Connect to domain raptor
Binding to \\raptor1.raptor.lab ...
Connected to \\raptor1.raptor.lab using credentials of locally logged on
user.
server connections: Connect to server raptor1
Disconnecting from \\raptor1.raptor.lab...
Binding to raptor1 ...
Connected to raptor1 using credentials of locally logged on user.
server connections: Quit
ldap policy: Show Values
Policy Current(New)
MaxPoolThreads 4
MaxDatagramRecv 4096
MaxReceiveBuffer 10485760
InitRecvTimeout 120
MaxConnections 5000
Troubleshooting 85
MaxConnIdleTime 900
MaxPageSize 1000
MaxQueryDuration 120
MaxTempTableSize 10000
MaxResultSetSize 262144
MaxNotificationPerConn 5
MaxValRange 1500
ldap policy: set MaxQueryDuration to 1200
ldap policy: set MaxResultSetSize to 6000000
ldap policy: Commit Changes
ldap policy: Quit
ntdsutil: Quit
Disconnecting from raptor1...
C:\>
Error Messages
The following sections contains a list of common error messages.
“LDAP_SERVER_DOWN” on page 86
“LDAP_AUTH_UNKNOWN” on page 87
“An error was encountered while reading domain on the network 1208” on page 87
“Unable to locate language file NSL\ENU\ADManagerRes.dll” on page 87
LDAP_SERVER_DOWN
Source: The status log or DSTrace screen.
Explanation: The driver can’t open the LDAP port on the Active Directory domain controller
configured for synchronization.
Possible Cause: The server named in the driver authentication context is incorrect.
Possible Cause: You are using an IP address for the authentication context, and you have
disabled non-kerberos authentication to Active Directory. kerberos requires a
DNS name for the authentication context.
Possible Cause: You have incorrectly configured the driver to use an SSL connection to Active
Directory.
Action: The authentication context should hold the DNS name or the IP address of the
domain controller you use for synchronization. If you leave the parameter
empty, the driver attempts to connect to the machine that is running the driver
shim (either the same server that is running Identity Manager, or the server
hosting the Remote Loader).
Action: The driver shim can authenticate only by using the pre-Windows 2000 Logon
method or simple bind. If you have disabled NTLM, NTLM2, and simple bind on
your network, you might receive the LDAP_SERVER_DOWN message. Enable
NTLM, NTML2, and simple bind on your network.
Action: Something is wrong with the certificate that was imported to the driver shim
server, or no certificate was imported. Either import a certificate, or generate a
new certificate and import it.
86 Troubleshooting
LDAP_AUTH_UNKNOWN
Source: The status log or DSTrace screen.
Explanation: The driver is unable to authenticate to the Active Directory database.
Action: Try to authenticate to the Active Directory database again.
Solution: Unhide the retry-ldap-auth-unknown driver parameter to allow the driver to
retry the authentication when it fails:
1 Open the driver configuration file in the an XML editor.
2 Search for retry-ldap-auth-unknown.
3 Change hide=“true” to hide=“false”.
4 Access the driver parameters. See “Driver Parameters” on page 95 for more
information.
5 Select Driver Settings > Access Options > Retry LDAP Auth unknown error,
then select Yes.
6 Click OK, then restart the driver.
Troubleshooting 87
Modify Operations Fail on AD LDS Instances
If you want to use the Active Directory driver to modify objects in an AD LDS application directory
partition, you must ensure you set the Default Naming Context for the LDS instance to point to the
partition. If you do not correctly configure the Default Naming Context, when the driver attempts to
modify an object in an application directory partition, the operation fails with an
LDAP_UNWILLING_TO_PERFORM error.
For more information about configuring the Default Naming Context for an AD LDS instance, see
“Setting the Default Naming Context for Your AD LDS/ADAM Instance” on page 108.
This ensures that the eDirectory password expiration date is not reset whenever you set passwords
in Active Directory.
88 Troubleshooting
To resolve this issue, make the Identity Manager PowerShell service dependent on Active Directory
Domain Services. For more information, see this Active Directory documentation page.
How are passwords managed when the value of the TimeToLive(minute) attribute is
set to a default value of 0 (zero).
When the attribute is set to the default value, a password is prevented from being deleted from the
Domain Controller registry without getting transferred to the driver registry. If the value is set to x,
where x is greater than the default value, the password will be deleted from the registry after x
minutes if the password is not successfully synchronized within that time.
How are passwords managed when you have PWFilter registry on 11 Domain
Controllers containing old and new password changes.
The password will be added to the Domain Controller registry where the password has changed. If
the old password for the same user is still in the registry when a new password is added, the old
password is overwritten by the new password.
In what order are passwords added and removed from the registry.
The registry keeps the keys (user name) sorted at all times.
How is a new password added when the registry is removing the stored passwords.
The registry keeps the keys (user name) sorted at all times. After all the stored passwords are
transferred to the driver registry, the passwords are removed from the registry of the Domain
Controller.
Troubleshooting 89
Driver Loses An Event That Does Not Have class-Name
Issue: When you send an event to the Active Directory driver through the driver shim, the event is
dropped without an error returned from the driver, the shim, or the engine. The lost event is not
detected without checking explicitly. The following event is sent to the Active Directory shim:
<modify dest-dn="cn=FACSN Users,ou=FACSN
users,OU=Units,DC=its,DC=cads,DC=ORG" event-
id="testserver01#20171016161104#1#1:4f1bc979-33b2-43bb-84ea-79c91b4fb233">
<modify-attr attr-name="member">
<add-value>
<value type="string">cn=testuser,ou=FACSN
users,OU=Units,DC=its,DC=cads,DC=ORG<
DirXML: [10/16/17 10:11:04.41]: /value>
</add-value>
</modify-attr>
</modify>
The Remote Loader trace shows the following text that indicates that there is an event, but the class-
name is missing:
DirXML: [10/16/17 10:11:04.55]: ADDriver: parse command
className
destDN cn=FACSN Users,ou=FACSN users,OU=Units,DC=its,DC=cads,DC=ORG
eventId testserver01#20171016161104#1#1:4f1bc979-33b2-43bb-84ea-
79c91b4fb233
association
DirXML: [10/16/17 10:11:04.55]: ADDriver: parse modify class =
DirXML: [10/16/17 10:11:04.57]: Loader: subscriptionShim->execute()
returned:
DirXML: [10/16/17 10:11:04.57]: Loader: XML Document:
DirXML: [10/16/17 10:11:04.57]: <nds ndsversion="8.7" dtdversion="1.1">
<source>
<product version="4.0.2.1" asn1id="" build="20170106_120000"
instance="\ORG-IDV\ORG\services\ORG-VaultDriverSet\ORG-CADS">AD</product>
<contact>NetIQ Corporation</contact>
</source>
<output>
<add-association dest-dn="\ORG-
IDV\ORG\data\users\employees\testuser" dest-entry-id="342222" event-
id="testserver01#20171016161104#1#1:4f1bc979-33b2-43bb-84ea-
79c91b4fb233">52b7c854d68c2a439be0bbb8fa597332</add-association>
<status level="success" event-
id="testserver01#20171016161104#1#1:4f1bc979-33b2-43bb-84ea-79c91b4fb233"/
>
<status level="success" event-
id="testserver01#20171016161104#1#1:4f1bc979-33b2-43bb-84ea-79c91b4fb233"/
>
</output>
</nds>
Workaround: Ensure that you add a value for class-name when the custom event in Identity
Manager policy is synthesized.
90 Troubleshooting
Applying the Latest Driver Package Does Not Change the
Default Setting of Enable Service Channel ECV
Issue: If you upgraded to Identity Manager 4.7 and updated the base packages for your driver, the
package update process does not overwrite the default setting (False) of Enable Service Channel
ECV.
This issue does not occur when you create a new driver.
Workaround: Manually change the ECV for the driver.
To change the ECV in Designer:
1 In Modeler, right-click the driver line.
2 Select Properties > Engine Control Values.
3 Click the tooltip icon to the right of Engine Controls for Server.
If a server is associated with the Identity Vault, and if you are authenticated, the engine control
values display in the large pane.
4 Change the value for Enable Subscriber Service Channel.
5 Click OK.
6 For the change to take effect, deploy the driver to the live Identity Vault.
Troubleshooting 91
92 Troubleshooting
A Driver Properties
A
This section provides information about the Driver Configuration and Global Configuration Values
properties for the Active Directory driver. These are the only unique properties for drivers. All other
driver properties (Named Password, Engine Control Values, Log Level, and so forth) are common to
all drivers. Refer to “Driver Properties” in the NetIQ Identity Manager Driver Administration Guide
for information about the common properties.
The information is presented from the viewpoint of iManager. If a field is different in Designer, it is
marked with a Designer icon.
“Driver Configuration” on page 93
“Global Configuration Values” on page 99
Driver Configuration
In iManager:
1 Click Identity Manager Overview option under Administration.
2 Open the driver set that contains the driver whose properties you want to edit:
2a In the Administration list, click Identity Manager Overview.
2b Click the Driver Sets tab.
2c If the driver set is not listed on the Driver Sets tab, use the Search In field to search for and
display the driver set.
2d Click the driver set to open the Driver Set Overview page.
3 Locate the driver icon, then click the upper right corner of the driver icon to display the Actions
menu.
4 Click Edit properties to display the driver’s properties page.
By default, the Driver Configuration page is displayed.
In Designer:
1 Open a project in the Modeler.
2 Right-click the driver line, then select click Properties.
3 Click Driver Configuration.
The Driver Configuration options are divided into the following sections:
“Driver Module” on page 94
“Driver Object Password (iManager Only)” on page 94
“Authentication” on page 94
“Startup Option” on page 95
“Driver Parameters” on page 95
Driver Properties 93
“ECMAScript (Designer Only)” on page 98
“Global Configurations (Designer Only)” on page 98
Driver Module
The driver module changes the driver from running locally to running remotely or the reverse.
Java: This option is not used with the Active Directory driver.
Native: Used to specify the name of the .dll file that is instantiated for the application shim
component of the driver. If this option is selected, the driver is running locally.
The driver .dll is: addriver.dll
Connect to Remote Loader: Used when the driver is connecting remotely to the connected system.
Designer includes one sub-option:
Remote Loader client configuration for documentation: Includes information on the Remote
Loader client configuration when Designer generates documentation for the driver.
Driver Object Password: Use this option to set a password for the driver object. If you are using the
Remote Loader, you must enter a password on this page or the remote driver does not run. This
password is used by the Remote Loader to authenticate itself to the remote driver shim.
Authentication
The Authentication section stores the information required to authenticate to the connected
system.
Authentication ID: Specify a user application ID. This ID is used to pass Identity Vault subscription
information to the application.
Example: Administrator
Authentication context/Connection Information: Specify the IP address or name of the server the
application shim should communicate with.
If you are synchronizing Exchange mail boxes, you must specify the full qualified name of the domain
controller.
Example: myserver.company.com
Remote Loader Connection Parameter: Used only if the driver is connecting to the application
through the Remote Loader. Enter hostname=xxx.xxx.xxx.xxx port=xxxx
secureprotocol=TLS version enforceSuiteB=true/false kmo=certificatename.
94 Driver Properties
port specifies the TCP/IP port on which the Remote Loader listens for connections from the
remote interface shim. The default port for the Remote Loader is 8090.
secureprotocol specifies the version of the TLS protocol that the Remote Loader uses to
connect to the Identity Manager engine. Identity Manager supports TLSv1, TLS v1_1, and
TLSv1_2 versions only. For example: secureprotocol=TLSv1
enforceSuiteB specifies whether Remote Loader uses Suite B for communicating with the
Identity Manager engine. To use Suite B, specify enforceSuiteB=true. This communication
is supported only on TLS 1.2 protocol. When the connection uses non-Suite B authentication
algorithms and this parameter is enabled, the communication cannot be established.
The kmo entry is optional. Use it only when an SSL connection exists between the Remote
Loader and the Identity Manager engine. You must specify this parameter when you enable
Suite B communication. For example: hostname=10.0.0.1 port=8090
kmo=IDMCertificate
Driver cache limit: Specify the maximum event cache file size (in KB). If it is set to zero, the file size is
unlimited. Click Unlimited to set the file size to unlimited in Designer.
Application password: Specify the password for the user object listed in the Authentication ID field.
Remote loader password: Used only if the driver is connecting to the application through the
Remote Loader. The password is used to control access to the Remote Loader instance. It must be
the same password specified during the configuration of the Remote Loader on the connected
system.
Startup Option
The Startup Option section allows you to set the driver state when the Identity Manager server is
started.
Auto start: The driver starts every time the Identity Manager server is started.
Manual: The driver does not start when the Identity Manager server is started. The driver must be
started through Designer or iManager.
Disabled: The driver has a cache file that stores all of the events. When the driver is set to Disabled,
this file is deleted and no new events are stored in the file until the driver state is changed to Manual
or Auto Start.
Do not automatically synchronize the driver (Designer only): This option only applies if the driver is
deployed and was previously disabled. If this is not selected, the driver re-synchronizes the next time
it is started.
Driver Parameters
The Driver Parameters section lets you configure the driver-specific parameters. When you change
driver parameters, you tune driver behavior to align with your network environment.
The parameters are divided into the following categories:
“Authentication Options” on page 96
“Exchange Options” on page 97
Driver Properties 95
“Access Options” on page 97
“Advanced Options” on page 98
Authentication Options
Show authentication options: Enables you to see and change the authentication options for the
driver. The options are show or hide.
Authentication Method: The method of authentication to Active Directory. Negotiate uses
Microsoft’s security package to negotiate the logon type. Typically kerberos or NTLM is selected.
Simple uses LDAP style simple bind for logon.
If you want to use password synchronization, select Negotiate.
Digitally sign communications: Select Yes to digitally sign communication between the driver shim
and Active Directory. The communication is in clear text, but signing ensures that the
communication is not tampered with enroute to the destination. It reduces the chance of security
attacks.
Signing only works when you use the Negotiate authentication method and the underlying security
provider selects NTLM2 or kerberos for its protocol.
Do not use this option with SSL.
Select No to have communications not signed. You can use this option with the Digitally sign and seal
communications option.
Digitally sign and seal communications: Select Yes to digitally encrypt communication between the
driver shim and the Active Directory database.
Sealing only works when you the Negotiate authentication method and the underlying security
provider selects NTLM2 or kerberos for its protocols.
Do not use this option with SSL.
Select No to not have communication between the driver shim and the Active Directory database
signed and sealed. You can use this option with the Digitally sign communications option.
Use SSL for LDAP connection between Driver Shim and AD: Select Yes to digitally encrypt
communication between the driver shim and the Active Directory database.
This option can be used with the Negotiate or Simple authentication methods. SSL requires that the
Microsoft server running the driver shim imports the domain controller’s server certificate. For more
information, see “Microsoft Security Compliance Manager” (http://technet.microsoft.com/en-us/
library/cc677002.aspx).
Logon and impersonate: Select Yes to log on and impersonate the driver authentication account for
CDOEXM (Collaboration Data Object for Exchange Management) and Password Set support. The
driver performs a local logon. The authentication account must have the proper rights assignment.
For more information, see “Creating an Administrative Account” on page 26.
If No is selected, the driver performs a network logon only.
96 Driver Properties
Exchange Options
Show Exchange Management Options: Select show to display the Microsoft Exchange options.
These parameters control whether the driver shim uses the Microsoft CDOEXM Exchange
management APIs and whether to interpret changes in the homeMDB attribute as a Move or a
Delete of the mailbox.
Select hide if you are not synchronizing Exchange accounts.
Enable Exchange mailbox provisioning: Select enable to provision Exchange Mailbox accounts.
Allow Exchange mailbox move: Select Yes to enable the driver to intercept modifications to the
Active Directory homeMDB attribute and call into the CDOEXM subsystem to move the
mailboxes to the new message data store.
Select No if you do not want mailboxes moved when the Active Directory account is moved.
Allow Exchange mailbox delete: Select Yes to enable the driver to intercept removals of the
Active Directory homeMDB attribute and calls into the CDOEXM subsystem to delete the
mailbox.
Select No if you don’t want to delete the mailbox account when the Active Directory account is
deleted.
Exchange Management interface type: Exchange mailboxes can be controlled by calls to the
Microsoft Exchange management system instead of regular attribute synchronization. When
this options is enabled, the driver intercepts changes to the Active Directory homeMDB
attribute and calls into the desired interface for Exchange Management.
Exchange Server FQDN: If you are configuring the Identity Manager Powershell service in a
multiple exchange server domain, you can use this option to choose the preferred server to be
connected by the Powershell service.
Access Options
Show access options: Select show to display the domain controller access options. These
parameters control the scope of the Active Directory queries along with several Publisher polling and
timeout parameters.
Select hide to hide the domain controller access options.
Driver Polling Interval: Specify the number of minutes to delay before querying the Active Directory
data base for changes. A larger number reduces the load on the Active Directory database, but it also
reduces the responsiveness of the driver.
The default value is 1 minute.
Publisher heartbeat interval: Allows the driver to send a periodic status message on the Publisher
channel when there has been no Publisher channel traffic for the given number of minutes.
The default value is 1 minute.
Password Sync Timeout (minutes): Specify the number of minutes for the driver to attempt to
synchronize a given password. The driver does not try to synchronize the password after this interval
has been exceeded.
Driver Properties 97
The recommended value is at least three times the value of the polling interval. For example, if the
Driver Polling Interval is set to 10 minutes, set the Password Sync Timeout to 30 minutes.
Advanced Options
Show advanced options: Select show to display the advanced configuration options for the driver.
Enable Deletion of protected objects in Windows Server 2008: Select Yes to delete the protected
objects that are created through MMC in Windows Server 2008. Select No for protecting these
objects from accidental deletion.
Retry LDAP Auth unknown error: Ordinarily, the driver shim returns a fatal error when encountering
an LDAP-AUTH_UNKNOWN error that causes the driver to shut down. If you want the driver to retry
the LDAP bind request, select Yes.
Enable DirSync Incremental Values: The Publisher channel usually receives all the values of a multi-
valued attribute. Enabling this option reports only the added or deleted values during the poll
interval. This requires 2003 Forest functional mode or above. This option is hidden by default. It can
be modified by selecting the Edit XML option in the Driver configuration tab.
98 Driver Properties
Global Configuration Values
Global configuration values (GCVs) are values that can be used by the driver to control functionality.
GCVs are defined on the driver or on the driver set. Driver set GCVs can be used by all drivers in the
driver set. Driver GCVs can be used only by the driver on which they are defined.
The Active Directory driver includes several predefined GCVs. You can also add your own if you need
additional ones as you implement policies in the driver.
To access the driver’s GCVs in iManager:
1 Click Identity Manager Administration tab to display the Identity Manager Administration page.
2 Open the driver set that contains the driver whose properties you want to edit:
2a In the Administration list, click Identity Manager Overview.
2b If the driver set is not listed on the Driver Sets tab, use the Search In field to search for and
display the driver set.
2c Click the driver set to open the Driver Set Overview page.
3 Locate the Active Directory driver icon, click the upper right corner of the driver icon to display
the Actions menu, then click Edit Properties.
or
To add a GCV to the driver set, click Driver Set, then click Edit Driver Set properties.
To access the driver’s GCVs in Designer:
1 Open a project in the Modeler.
2 Right-click the Active Directory driver icon or line, then select Properties > Global
Configuration Values.
or
To add a GCV to the driver set, right-click the driver set icon , then click Properties > GCVs.
The global configuration values are organized as follows:
“Configuration” on page 99
“Password Synchronization” on page 101
“Account Tracking” on page 101
“Managed System Information” on page 102
Configuration
The following GCVs contain configuration information for the Active Directory driver. They are
divided into the following categories:
“Synchronization Settings” on page 100
“Name Mapping Policy” on page 100
Driver Properties 99
Synchronization Settings
Domain DNS Name: Specify the DNS name of the Active Directory domain managed by this driver.
Subscriber Channel Placement Type: Specify the type of placement for the Subscriber Channel.
Select Flat to strictly place objects within the base container. Select Mirrored to hierarchically place
objects within the base container. This is used to determine the Subscriber Channel Placement
policies.
Active Directory User Container: Specify the container where user objects reside in Active Directory.
Publisher Channel Placement Type: Specify the type of placement for the Publisher Channel. Select
Flat to strictly place objects within the base container. Select Mirrored to hierarchically place objects
within the base container. This is used to determine the Publisher Channel Placement policies.
In Designer, you must click the icon next to a GCV to edit it. This displays the Password
Synchronization dialog box for a better view of the relationship between the different GCVs.
In iManager, to edit the Password management options go to Driver Properties > Global
Configuration Values, and then edit it in your Password synchronization policy tab.
For more information about how to use the Password Management GCVs, see “Configuring
Password Flow” in the NetIQ Identity Manager Password Management Guide.
Connected System or Driver Name: Specify the name of the Active Directory system or the driver
name. This value is used by the e-mail notification template to identify the source of the notification
message.
Application accepts passwords from Identity Manager: If True, allows passwords to flow from the
Identity Manager data store to the connected system.
Identity Manager accepts passwords from application: If True, allows passwords to flow from the
connected system to Identity Manager.
Publish passwords to NDS password: Use the password from the connected system to set the non-
reversible NDS password in eDirectory.
Publish passwords to Distribution Password: Use the password from the connected system to set
the NMAS Distribution Password used for Identity Manager password synchronization.
Require password policy validation before publishing passwords: If True, applies NMAS password
policies during publish password operations. The password is not written to the data store if it does
not comply.
Reset user’s external system password to the Identity Manager password on failure: If True, on a
publish Distribution Password failure, attempt to reset the password in the connected system by
using the Distribution Password from the Identity Manager data store.
Notify the user of password synchronization failure via e-mail: If True, notify the user by e-mail of
any password synchronization failures.
Account Tracking
Account tracking is part of the Identity Reporting Module. For more information, see the
Administrator Guide to NetIQ Identity Reporting.
Enable account tracking: Set this to True to enable account tracking policies. Set it to False if you do
not want to execute account tracking policies.
Realm: Specify the name of the realm, security domain, or namespace in which the account name is
unique.
Object Class: Add the object class to track. Class names must be in the application namespace.
Identifiers: Add the account identifier attributes. Attribute names must be in the application
namespace.
General Information
Name: Specify a descriptive name for this Active Directory system. This name is displayed in the
reports.
Description: Specify a brief description of this Active Directory system. This description is displayed
in the reports.
Location: Specify the physical location of this Active Directory system. This location is displayed in
the reports.
Vendor: Select Microsoft as the vendor of the Active Directory system. This information is displayed
in the reports.
Version: Specify the version of this Active Directory system. This version information is displayed in
the reports.
System Ownership
Business Owner: Browse to and select the business owner in the Identity Vault for this Active
Directory system. You must select a user object, not a role, group, or container.
Application Owner: Browse to and select the application owner in the Identity Vault for this Active
Directory system. You must select a user object, not a role, group, or container.
AD LDS/ADAM Instance
The Active Directory driver can be configured for use with an Active Directory Lightweight Directory
Services instance (AD LDS).
You import a configuration file to create a driver to connect to the AD LDS/ADAM instance.
There are multiple ways to configure your environment to synchronize the information. For example,
NetIQ recommends setting up your own certificate authority (CA) in order to issue certificates that
can be used for SSL connections to AD LDS/ADAM. If you already have server certificates, or if you
have access to another CA that can issue valid certificates, you can ignore the steps that describe
how to set up your own CA. Likewise, if you don't want to configure SSL (required if you want to set
passwords on the Subscriber channel) then you can skip the section about configuring Certificate
Services.
Any discussion of setting passwords is referring to the Subscriber channel from Identity Manager to
AD LDS/ADAM. Password synchronization on the Publisher channel from AD LDS/ADAM to Identity
Manager is not currently possible, unless a regular user attribute (not the userPassword attribute) is
used in AD LDS/ADAM to store the password.
“Prerequisites” on page 105
“Installation Tasks” on page 106
“Configuration Tasks” on page 108
Prerequisites
To achieve synchronization with an AD LDS/ADAM instance, you need the following items installed
on one or more computers running the supported Windows server platforms:
An Identity Manager server or Remote Loader where the Active Directory driver is configured.
Internet Information Services (IIS) (must be installed before Certificate Services)
Certificate Services
A certification authority (can be your own standalone CA configured when you install Certificate
Services)
An AD LDS/ADAM instance (this example in this section uses a standalone instance)
Installing AD LDS/ADAM
“Installing AD LDS” on page 106
“Installing ADAM” on page 107
Installing AD LDS
If you are installing AD LDS, use the steps given at the Microsoft TechNet Web site (http://
technet.microsoft.com/en-us/library/cc754486(WS.10).aspx), then follow the installation
instructions from Step 6 to Step 16 from the “Installing ADAM” section.
NOTE: If you specify a port number for the ADAM instance other than the default, ensure that
you configure the Identity Manager ADAM driver to use the non-default port, as well. For more
information about configuring the ADAM driver, see “Creating the AD LDS/ADAM Driver in
iManager” on page 109.
10 Leave the default locations for data files and data recovery files, then click Next.
11 Select an account for the ADAM service, then click Next.
If you are installing ADAM on a server that is not already part of a domain, you might get a
warning at this point. This is usually not a problem with ADAM, and you should continue with
the installation.
12 Click Next to assign the current user (the one you are logged in as) rights to administrate ADAM.
13 Select Import the selected LDIF files for this instance of ADAM.
14 Select MS-User.LDF, then click Add.
15 Click Next.
16 Review the installation summary, then click Next.
Configuration Tasks
“Setting the Default Naming Context for Your AD LDS/ADAM Instance” on page 108
“Creating a User in AD LDS/ADAM with Sufficient Rights” on page 109
“Creating the AD LDS/ADAM Driver” on page 109
NOTE: If you do not point the Default Naming Context of your AD LDS instance to the
application directory partition specified during installation, the driver will not be able to
successfully perform Modify operations.
11 Click OK twice.
12 Restart your AD LDS/ADAM instance so the new default naming context takes effect.
If you place this driver in a new driver set, you must specify a driver set name, context, and
associated server.
3 Import a configuration into the driver set by selecting a configuration from the server (.XML
file):
All configurations
Identity Manager 3.0 configurations
5 Configure the driver by filling in the configuration parameters, then click Next. For information
on the settings, see Table B-1 on page 110.
6 Specify the Remote Loader host name or IP address and port, as well as the Remote Loader
authentication information, then click Next.
7 Define security equivalences, using a user object that has the rights that the driver needs to
have on the server, then click OK.
Use the user created in “Creating a User in AD LDS/ADAM with Sufficient Rights” on page 109.
8 Identify all objects that represent administrative roles and exclude them from synchronization,
then click OK.
Exclude the security-equivalence object (for example, DriversUser) that you specified in Step 7.
If you delete the security-equivalence object, you have removed the rights from the driver, and
the driver can’t make changes to Identity Manager.
9 Click ADAM to specify additional configuration settings.
10 Under Driver Parameters, specify the authentication and access options you want to use for the
ADAM driver. In the LDAP server port field, ensure that you specify the ADAM LDAP port
number configured in ADAM.
11 Click OK.
12 Click Finish.
NOTE: The parameters are presented on multiple screens. Some parameters are only displayed if the
answer to a previous prompt requires more information to properly configure the policy.
Parameter Description
Connected System or Driver Name Specify the name of the connected system, application, or Identity
Manager driver. This value is used by the e-mail notification
templates to identify the source of notification messages.
Domain DNS Name Specify the DNS name of the AD LDS/ADAM instance managed by
this driver.
ADAM User Container Specify the container where the objects reside in AD LDS/ADAM.
Driver is Local/Remote Configure the driver for use with the Remote Loader service by
selecting Remote, or select Local to configure the driver for local
use.
Authentication ID Specify the name of the user object created in “Creating a User in AD
LDS/ADAM with Sufficient Rights” on page 109. The name needs to
be specified as a full LDAP DN.
Authentication Password Specify the password of the user object with sufficient rights.
Authentication Context Specify the DNS name or IP address of the AD LDS/ADAM instance
server.
The Active Directory driver can be configured to provision Active Directory accounts as well as
Exchange accounts.
The driver can synchronize Exchange Server 2013 and Exchange Server 2016 accounts. It cannot
synchronize all types of Exchange accounts at the same time. If you have multiple types of Exchange
accounts, you must set up a separate driver to synchronize each type of Exchange accounts.
“Provisioning Exchange Server 2013 Accounts” on page 113
“Provisioning Exchange Server 2019 and Exchange Server 2016 Accounts” on page 116
NOTE: The Active Directory driver only supports provisioning accounts on Exchange Server 2019 and
Exchange Server 2013 servers with either Windows Server 2012, or Windows Server 2012 R2
installed.
In order to provision Exchange Server 2019 and Exchange Server 2013 mailboxes, the Active
Directory driver uses Windows PowerShell in the form of the Identity Manager PowerShell service.
The Identity Manager PowerShell service can support multiple exchange servers in the environment.
For more information, see Support for Multiple Exchange Server in the Environment.
The Identity Manager PowerShell service is installed on the server that is running the Active
Directory driver. If you decide to run the driver locally, the driver is installed on the Identity Manager
server. If you decide to run the driver remotely, the driver is installed on the same server as the
Remote Loader service. The service listens on a default port of 8099. This is set when the service is
installed. It is stored in the registry key IDM_PowerShell_Service, located in either
HKEY_LOCAL_MACHINE\SOFTWARE\Novell or
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Novell, depending on your Windows
installation. The value can be edited if necessary. If you edit the registry key, both the service and the
driver must be restarted.
The Active Directory driver creates, moves, and disables Exchange Server 2019 and Exchange Server
2013 mailboxes. The cmdlets supported by the Active Directory driver to create, move, and disable
mailboxes in Exchange Server 2019 and Exchange Server 2013 are Enable-Mailbox, New-
MoveRequest, and Disable-Mailbox. The cmdlets use the following parameters in the Active
Directory driver:
Enable-Mailbox: -Identity, -Alias, -Database, -DomainController
Disable-Mailbox: Identity, -DomainController, -Confirm
New-MoveRequest: -Identity, -TargetDatabase, -DomainController, -Confirm
To use InstallUtil.exe:
1 Download and install Microsoft Exchange 2013 Management Tools on the driver server. You can
download the Tools package from the following location: http://technet.microsoft.com/en-us/
library/bb232090%28v=exchg.150%29.aspx
NOTE: If you install the service before installing the Exchange Server 2019 and Microsoft
Exchange 2013 Management Tools, you may need to reinstall the service.
2 Install the latest available patches and updates on your Identity Manager components and
drivers.
3 On the driver server, open a .NET command prompt.
4 Issue the command InstallUtil IDMPowerShellService.exe to register the service and
create the correct registry entries.
The default location of the service is
C:\novell\remoteloader\Version\IDMPowerShellService.exe, where Version is
either the 32-bit folder or the 64-bit folder.
5 To start the service, go to the Settings view and click Control Panel.
6 Click System and Security > Administrative Tools > Services.
NOTE: To uninstall the service, open a .NET command prompt and issue the InstallUtil /u
IDMPowerShellService.exe command.
The IDM PowerShell service is installed on the server that is running the Active Directory driver. If
you decide to run the driver locally, the driver is installed on the Identity Manager server. If you
decide to run the driver remotely, the driver is installed on the same server as the Remote Loader
service.
The service listens on a default port of 8099. This is set when the service is installed. It is stored in
the registry key IDM_PowerShell_Service, located in either
HKEY_LOCAL_MACHINE\SOFTWARE\Novell or
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Novell, depending on your Windows
installation. The value can be edited if necessary. If you edit the registry key, both the service and the
driver must be restarted.
The Active Directory driver creates, moves, and disables Exchange Server 2019 and Exchange Server
2019 and Exchange Server 2016 mailboxes. The cmdlets supported by the Active Directory driver to
create, move, and disable mailboxes in Exchange Server 2019 and Exchange Server 2016 are Enable-
Mailbox, New-MoveRequest, and Disable-Mailbox. The cmdlets use the following parameters in the
Active Directory driver:
Enable-Mailbox: -Identity, -Alias, -Database, -DomainController
Disable-Mailbox: Identity, -DomainController, -Confirm
New-MoveRequest: -Identity, -TargetDatabase, -DomainController, -Confirm
For more functionality support, use the Scripting driver or the native PowerShell support feature.
For more information on the Scripting driver, see the Identity Manager Driver for Scripting
Implementation Guide. For more information on PowerShell support in Identity Manager, see
Appendix D, “Configuring PowerShell Support,” on page 121.
To provision Exchange Server 2019 and Exchange Server 2016 mailboxes, you must complete the
following steps:
“Meeting the Prerequisites” on page 117
“Installing the Service” on page 118
“Configuring the Driver” on page 118
“Configuring the Driver to Support Exchange Server 2019 and Exchange Server 2016 Database
Load Balancing” on page 119
“Support for Multiple Exchange Server in the Environment” on page 120
To use InstallUtil.exe:
1 Install the latest available patches and updates on your Identity Manager components and
ĚƌŝǀĞƌƐ͘
2 On the driver server, open a .NET command prompt.
3 Issue the command InstallUtil IDMPowerShellService.exe to register the service and ĐƌĞĂƚĞƚŚĞĐŽƌƌĞĐƚ
ƌĞŐŝƐƚƌLJĞŶƚƌŝĞƐ͘
dŚĞĚĞĨĂƵůƚůŽĐĂƚŝŽŶŽĨƚŚĞƐĞƌǀŝĐĞŝƐ
͗ͰŶŽǀĞůůͰƌĞŵŽƚĞůŽĂĚĞƌͰsĞƌƐŝŽŶͰ/DWŽǁĞƌ^ŚĞůů^ĞƌǀŝĐĞ͘ĞdžĞ͕ǁŚĞƌĞsĞƌƐŝŽŶŝƐĞŝƚŚĞƌƚŚĞϯϮͲďŝƚĨŽůĚĞƌŽƌƚŚĞϲϰͲďŝƚĨŽůĚĞƌ͘
4 To start the service, go to the Settings view and click Control Panel.
5 Click System and Security > Administrative Tools > Services.
6 Right-click the service IDM_PowerShell_Service and select Start.
7 Run the IDM PowerShell service as a user and ensure that the user is a member of Recipient
Management and View-Only Organization Management.
NOTE: To uninstall the service, open a .NET command prompt and issue the InstallUtil /u
IDMPowerShellService.exe command.
Identity Manager provides support for managing Active Directory and Microsoft Exchange using
Windows PowerShell cmdlets.
“Overview of PowerShell Functionality” on page 121
“System Requirements” on page 121
“Implementing PowerShell Cmdlets in the Active Directory Driver” on page 122
NOTE: Only policies from the Subscriber channel can run PowerShell cmdlets. You can only use
cmdlets to modify objects in Active Directory or Exchange, not in the Identity Vault.
System Requirements
To use PowerShell cmdlets, the following must be installed and running on the Active Directory
driver computer:
Identity Manager AD Exchange service
NOTE: The following are the service files are available in the supported Exchange Server
environments:
Exchange Server 2019: The name of the service file is IDMPowerShellService.exe.
Exchange Server 2016: The name of the service file is IDMPowerShellService.exe.
Exchange Server 2013: The name of the service file is IDMPowerShellService.exe.
NOTE: Identity Manager only supports using PowerShell cmdlets for Active Directory and Microsoft
Exchange with Windows PowerShell 2.0 or later. However, Active Directory driver supports out of
the box Exchange Mailbox provisioning functionality using previous versions of PowerShell.
NOTE: When including the PSExecute attribute in an Add or Modify event policy, you must adhere
to the XDS format, or the driver ignores the embedded cmdlets.
NOTE: You can use the PSExecute attribute only with Active Directory and Exchange Cmdlets. It
cannot be used for scripting.
When specifying the PowerShell command string, you can include other variables configured in
separate actions within the rule, as necessary.
For example, for the sample policy provided in “Sample Active Directory Policy Rule with Cmdlets”
on page 122, you first add a rule to define the variable identityname as the name of the user
account you want to disable using a PowerShell cmdlet, and then you specify the following string for
the PSExecute variable, which uses the new identityname variable in the PowerShell command
string:
"Disable-ADAccount -Identity"+Local Variable("identityname")
NOTE: You can also configure a policy to execute a specified cmdlet by modifying the XML directly, in
the XML Source tab of the Policy Builder.
NOTE: If you execute multiple cmdlets in a single rule and one of the cmdlets does not run
successfully, the driver does not execute any subsequent cmdlets in the rule and only logs the error
event for the failed cmdlet. The driver does not log error events for the subsequent cmdlets, even
though they did not run successfully, because the driver does not run those cmdlets after the failure
occurs.
Level Description
2 Level 1 messages and the contents of XML documents that are used during event
processing are displayed and logged
3 Trace Level 2 messages and extensive rule processing messages are displayed and
logged, plus template instantiations
NOTE: If the driver is installed locally on the Identity Manager server, the driver logs all trace
messages together on the local server. However, if the driver uses the Remote Loader, the driver logs
only driver shim trace messages on the Remote Loader, while the Identity Manager server logs
engine trace messages.
The driver logs the following events to the Password Sync event log in Microsoft Windows
environments:
The password filter has been fully Information Identity Manager successfully initialized the
initialized. Domain Name = PassSync utility.
DomainName, Computer Name =
ComputerName, Host Name =
HostName
The password filter could not initialize Error Identity Manager could not open the registry
its registry values. key /HKLM/SOFTWARE/NOVELL/
PWFILTER.
The password for user UserName Error Identity Manager could not change the
could not be changed. password for the specified user account.
The password filter RPC server failed Error The PassSync remote procedure call (RPC)
to load. server could not initialize. Check that RPC
services are running on the server.
The password for user UserName in Error Identity Manager could not synchronize
directory DirectoryName was not passwords for the specified user because the
synchronized because the password key exceeded its time to live as set in the
change timed out. driver.
The Cryptographic Service Provider Warning Identity Manager has defaulted to using the
has defaulted to CSPProvider. base Cryptographic Service Provider (CSP)
Encryption will be downgraded to the specified in the event description.
standards of this provider. Execution
of the password synchronization
server will not be affected. If higher
encryption standards are required,
please contact your network
administrator.
A request to allocate RequestedSize Error Identity Manager could not allocate the
bytes of memory failed. Tag value = requested memory.
TagValue.
Driver NOT synchronizing passwords Error Identity Manager and the Active Directory
with the domain controller driver are not synchronizing passwords with
this domain controller (DC). This may be due
to pwfilter not being installed or being
installed incorrectly.
Driver is synchronizing passwords with Information Identity Manager and the Active Directory
the domain controller driver are successfully synchronizing
passwords with this DC