Introduction to User and Group Management
Applies To: Forefront Identity Manager 2010
The management of security and distribution groups is a basic task in a directory. Microsoft® Forefront® Identity Manager (FIM) 2010 introduces new features that simplify this task significantly. This document shows how you can use FIM 2010 to manage security and distribution groups in your environment.
This document assumes that you have a basic understanding of the following information technology (IT) concepts and tasks:
Managing Active Directory® Domain Services (AD DS), including managing organizational units (OUs), groups and users, and domain controllers
Managing inbound synchronization rules, as outlined in the Introduction to Inbound Synchronization (https://go.microsoft.com/fwlink/?LinkId=165858)
Managing outbound synchronization rules, as outlined in the Introduction to Outbound Synchronization (https://go.microsoft.com/fwlink/?LinkId=165859)
For an overview of FIM 2010 documentation and guidance for using it, see the Documentation Roadmap.
A description of how to set up FIM 2010 and AD DS is out of the scope of this document.
This guide is intended for IT professionals who are interested in learning about the new security group management features in FIM 2010.
The procedures in this document require 60 to 90 minutes for a new user to complete.
Note
These time estimates assume that the testing environment is already configured for the scenario. They do not include the time required to set up the test environment.
Fabrikam, a fictitious company, is investigating how to deploy and maintain the management of security and distribution groups. After working through the Declarative Provisioning scenario, Fabrikam has determined that FIM 2010 provides the required functionality for its users. However, it still must evaluate the functionality provided by FIM 2010 with regard to group scenarios. The decision was made to deploy a simple scenario in the corporate lab environment. The objective of this lab is to test the following essential requirement:
- Criteria-based group assignment. At Fabrikam, there are several line-of-business (LOB) applications that full-time employees and contractors use. Some applications are similar, but some are very different. For this reason, full-time employees and contractors must be able to access and run different applications. However, for security reasons, Fabrikam does not want contractors to access some of the full-time employees’ applications. To prevent this from happening, two security groups, FTEApps and ConApps, exist in the Active Directory environment. Members of FTEApps can access all the required applications for full-time employees (FTEs) and members of the ConApps group can access all of the required applications for contractors. One problem area for making new users productive when they are hired is that they currently must be manually assigned to these security groups. By using FIM 2010, Fabrikam wants to add users automatically to either group, based on their employee type at the time that they are provisioned to AD DS. This operation makes it possible for the new employees to access their LOB applications on the first day.
The scenario outlined in this document has been developed and tested on a stand-alone computer. On this computer, FIM 2010 is already deployed and the computer is configured to be a domain controller for the Active Directory forest Fabrikam.com. The name of this domain controller is FabrikamDC1. The following illustration shows the forest configuration.
To perform the procedures in this document, the domain controller has been configured with the following software:
Windows Server® 2008 64-Bit Enterprise
Microsoft .NET Framework 3.5 Service Pack 1 (SP1)
Microsoft SQL Server® 2008 64-bit Enterprise (SP1)
Windows® SharePoint® Services 3.0 (SP1), 64-bit
Windows PowerShell™ 1.0
FIM 2010
Note
A description of the installation of FIM 2010 and the required software components is out of the scope of this document. For a complete description of the installation process for FIM 2010, see Introduction to Outbound Synchronization (https://go.microsoft.com/fwlink/?LinkId=165859).
To implement the procedures in this document, complete the following steps in order:
Configuring the connected data sources
Configuring the FIM Synchronization Service
Configuring the FIM Service
Initializing the testing environment
Testing the configuration
For the scenario in this document, you create a data file for the attribute-value pair management agent and an OU in AD DS to store the data.
The data file contains the source user objects for the scenario that is outlined in this document. All scenario objects are eventually provisioned into the OU.
For the scenario in this document, create an attribute-value pair data file.
Copy the records from the following data and then paste them into a new Notepad file.
EmployeeID:10 FirstName:Terry LastName:Adams UserID:tadams EmployeeType:Full Time Employee EmployeeID:11 FirstName:Jimmy LastName:Bischoff UserID:jbischoff EmployeeType:Full Time Employee EmployeeID:12 FirstName:Lola LastName:Jacobsen UserID:ljacobsen EmployeeType:Contractor
Save the Notepad file on your local drive as C:\HRData.txt.
For the scenario in this document, you create an OU that receives the newly created sample object.
To open the Active Directory Users and Computers snap-in, click Start, click Run, and then, in the Open text box, type dsa.msc.
In the console tree, right-click fabrikam.com, click New, and then click OU.
In Name, type FIMObjects.
To create the OU, click OK.
To configure the FIM 2010 R2 Synchronization Service, you perform the following steps:
Creating the management agents
Configuring the run profiles
Enabling Synchronization Rule Provisioning
The scenario in this document includes three connected data sources:
Human Resources (HR) database
FIM 2010 R2 data store
Fabrikam AD DS
From the three connected data sources, you must create three management agents:
Fabrikam HRMA
Fabrikam FIMMA
Fabrikam ADMA
The following sections provide detailed instructions about creating the required management agents manually.
The Fabrikam HRMA is a management agent for the Attribute-value pair text file. To create this management agent, you use the Create Management Agent Wizard.
In FIM 2010, open the Synchronization Service Manager, and on the Tools menu, click Management Agents.
To open the Create Management Agent Wizard, on the Actions menu, click Create.
On the Create Management Agent page, provide the following settings, and then click Next:
Management agent for: Attribute-value pair text file
Name: Fabrikam HRMA
On the Select Template Input File page, provide the following settings, and then click Next:
Template Input File: C:\HRData.txt
Code Page: Western European (Windows)
On the Configure Attributes page, provide the following settings, and then click Next:
To open the Set Anchor dialog box, click Set Anchor.
In the Attributes list, click Employee ID, and then click Add.
To close the Set Anchor dialog box, click OK.
On the Define Object Types page, click Next.
On the Configure Connector Filter page, click Next.
On the Configure Join and Projection Rules page, click Next.
On the Configure Attribute Flow page, click Next.
On the Configure Deprovisioning page, click Next.
On the Configure Extensions page, click Next.
The Fabrikam FIMMA is a management agent for FIM 2010 R2 Service management agent. To create this management agent, you use the Create Management Agent Wizard.
Important
To create the FIM 2010 R2 management agent, you need a separate user account.
To open the Active Directory Users and Computers snap-in, click Start, click Run, and then in the Open text box, type dsa.msc.
In the console tree, click the Users container.
To open the New Object – User dialog box, on the Action menu, click New, and then point to Users.
In the First name text box, type fimma.
In the User logon name text box, type fimma, and then click Next.
In the Password and the Confirm password text boxes, type a password of your choice.
Clear the User must change password at next logon check box.
Select Password never expires, and then click Next.
To create the user account, click Finish.
In FIM 2010, open Synchronization Service Manager, and on the Tools menu, click Management Agents.
To open the Create Management Agent Wizard, on the Actions menu, click Create.
On the Create Management Agent page, provide the following settings, and then click Next:
Management agent for: FIM 2010 R2 Service management agent
Name: Fabrikam FIMMA
On the Connect to Database page, provide the following settings, and then click Next:
Server: .
Database: FIMService
FIM Service base address: https://localhost:5725
Authentication mode: Windows Integrated Authentication
User name: fimma
Password: <account password>
Domain: fabrikam
On the Selected Object Types page, verify that the object types that are listed below are selected, and then click Next:
ExpectedRuleEntry
DetectedRuleEntry
SynchronizationRule
Group
Person
On the Selected Attributes page, verify that all listed attributes are selected, and then click Next.
On the Configure Connector Filter page, click Next.
On the Configure Object Type Mappings, add the following mapping, and then click Next:
In the Data Source Object Type list, select Person.
To open the Mapping dialog box, click Add Mapping.
In the Metaverse object type list, select person.
To close the Mapping dialog box, click OK.
In the Data Source Object Type list, select Group.
To open the Mapping dialog box, click Add Mapping.
In the Metaverse object type list, select group.
To close the Mapping dialog box, click OK.
On the Configure Attribute Flow page, apply the following attribute flow mappings, and then click Next:
Select Person as Data source object type.
Select person as Metaverse object type.
Select Direct as Mapping Type.
For each row in the following table, complete the following steps.
Flow direction Data source attribute Metaverse attribute Import
AccountName
accountName
Import
DisplayName
displayName
Import
EmployeeID
employeeID
Import
EmployeeType
employeeType
Import
ExpectedRulesList
expectedRulesList
Import
FirstName
firstName
Import
LastName
lastName
Export
AccountName
accountName
Export
DisplayName
displayName
Export
Domain
domain
Export
EmployeeID
employeeID
Export
EmployeeType
employeeType
Export
FirstName
firstName
Export
LastName
lastName
Export
ObjectSID
objectSid
Select the Flow Direction shown for that row in the table.
Select the Data source attribute shown for that row in the table.
Select the metaverse attribute shown for that row in the table.
To apply the flow mapping, click New.
Select Group as Data source object type.
Select group as Metaverse object type.
Select Direct as Mapping Type.
For each row in the following table, complete the following steps.
Flow direction Data source attribute Metaverse attribute Import
AccountName
accountName
Import
DisplayName
displayName
Import
ExpectedRulesList
expectedRulesList
Import
Member
member
Export
AccountName
accountName
Export
DisplayName
displayName
Export
Member
member
Select the Flow Direction shown for that row in the table.
Select the Data source attribute shown for that row in the table.
Select the metaverse attribute shown for that row in the table.
To apply the flow mapping, click New.
On the Configure Deprovisioning page, click Next.
To create the management agent, on the Configure Extensions page, click Finish.
The Fabrikam ADMA is a management agent for AD DS. To create this management agent, use the Create Management Agent Wizard.
In FIM 2010, open the Synchronization Service Manager and on the Tools menu, click Management Agents.
To open the Create Management Agent Wizard, on the Actions menu, click Create.
On the Create Management Agent page, provide the following settings, and then click Next:
Management agent for: Active Directory Domain Services
Name: Fabrikam ADMA
On the Connect to Active Directory Forest page, provide the following settings, and then click Next:
Forest name: fabrikam.com
User name: administrator
Password : the administrator password
Domain: fabrikam
On the Configure Directory Partitions page, perform the following steps, and then click Next:
In the Select directory partitions list, select DC=Fabrikam, DC=com.
To open the Select Containers dialog box, click Containers.
To clear all selected nodes, click the DC=Fabrikam,DC=com node.
Click the FIMObjects node.
To close the Select Containers dialog box, click OK.
On the Configure Provisioning Hierarchy page, click Next.
On the Select Object Types page, perform the following steps, and then click Next:
- In the Object types list, select user and group.
On the Select Attributes page, provide the following settings, and then click Next:
Select Show All.
In the Attributes list, select the following attributes:
displayName
employeeID
employeeType
givenName
groupType
member
objectSid
sAMAccountName
sn
unicodePwd
userAccountControl
On the Configure Connector Filter page, click Next.
On the Configure Join and Projection Rues page, click Next.
On the Configure Attribute Flow page, click Next.
On the Configure Deprovisioning page, click Next.
On the Configure Extensions page, click Finish.
This topic provides instructions for creating and configuring the required run profiles. For the scenario in this document, you configure run profiles for all management agents.
Before you can start with the configuration of the run profiles for this management agent, you must copy the import data file that you have already created in a previous section into the management agents’ data folder.
Click Start, and then click Run.
In the Open text box, type copy "C:\HRData.txt" "%programfiles%\Microsoft Forefront Identity Manager\2010\Synchronization Service\MaData\Fabrikam HRMA".
The following table shows the run profiles that you create for the MyHR MA management agent.
Profile | Run profile name | Step type |
---|---|---|
Profile 1 |
Full import |
Full import (stage only) |
Profile 2 |
Full synchronization |
Full synchronization |
In FIM 2010, open Synchronization Service Manager and on the Tools menu, click Management Agents.
In the Management Agent list, click Fabrikam HRMA.
On the Actions menu, click Configure Run Profiles to open the Configure Run Profiles for dialog box.
To open the Configure Run Profile Wizard, click New Profile.
In the Name text box, type Full Import, and then click Next.
In the Type list, select Full Import (Stage Only), and then click Next.
In the Input file name text box, type HRData.txt.
To create the run profile, click Finish.
To open the Configure Run Profile Wizard, click New Profile.
In the Name text box, type Full Synchronization, and then click Next.
In the Type list, select Full Synchronization, and then click Next.
To create the run profile, click Finish.
To close the Configure Run Profiles dialog box, click OK.
The following table lists the run profiles that you create for the Fabrikam ADMA management agent.
Profile | Run profile name | Step type |
---|---|---|
Profile1 |
Full import |
Full import (stage only) |
Profile2 |
Full synchronization |
Full synchronization |
Profile3 |
Delta import |
Delta import (stage only) |
Profile4 |
Delta synchronization |
Delta synchronization |
Profile5 |
Export |
Export |
In FIM 2010, open Synchronization Service Manager and on the Tools menu, click Management Agents.
In the Management Agents list, click Fabrikam ADMA.
To open the Configure Run Profiles dialog box, on the Actions menu, click Configure Run Profiles.
For each run profile in the previous table procedure, complete the following steps:
To open the Configure Run Profile wizard, click New Profile.
In the Name text box, type the profile name shown in the table, and then click Next.
In the Type list, select the step type shown in the table, and then click Next.
Click Finish to create the run profile.
To close the Configure Run Profiles dialog box, click OK.
The following table lists the run profiles that you create for the Fabrikam FIMMA management agent.
Profile | Run profile name | Step type |
---|---|---|
Profile1 |
Full import |
Full import (stage only) |
Profile2 |
Full synchronization |
Full synchronization |
Profile3 |
Delta import |
Delta import (stage only) |
Profile4 |
Delta synchronization |
Delta synchronization |
Profile5 |
Export |
Export |
In FIM 2010, open Synchronization Service Manager, and, on the Tools menu, click Management Agents.
In the Management Agent list, select Fabrikam FIMMA.
To open the Configure Run Profiles dialog box, on the Actions menu, click Configure Run Profiles.
For each run profile in the previous, complete the following steps:
To open the Configure Run Profile Wizard, click New Profile.
In the Name text box, type the profile name shown in the table, and then click Next.
In the Type list, click the step type shown in the table, and then click Next.
Click Finish to create the run profile.
To close the Configure Run Profiles dialog box, click OK.
The scenario in this document takes advantage of the new declarative provisioning feature to implement the object and attribute flow between the connected data sources. To enable declarative provisioning, enable synchronization rule processing in the FIM 2010 R2 Synchronization Service Manager.
Open the Synchronization Service Manager.
To open the Options dialog box, on the Tools menu, click Options.
Select Enable Synchronization Rule Provisioning.
To close the Options dialog box, click OK.
For the scenario in this document, you complete the following configuration steps in the FIM 2010 R2 Service:
Enabling the required Management Policy Rules (MPRs)
Creating the HR inbound synchronization rule
Creating the Active Directory user synchronization configuration triple
Creating the Active Directory security group synchronization configuration triple
Creating security groups
For the scenario in this document, you enable some of the preconfigured MPRs in FIM 2010. Enabling these MPRs is required to grant the synchronization account access to the components that are required to synchronize the identity data for this scenario.
On the FIM 2010 R2 Portal home page, in the navigation bar, click Management Policy Rules to open the Management Policy Rules page.
In the Search for text box, type Synchronization account, and then click the Search for button.
For each MPR that is listed as disabled, complete the following steps:
To open the Configuration dialog box, click the Display Name of the disabled MPR.
Clear Policy is disabled.
Click OK.
On the Summary page, click Submit.
In addition to this, you must also enable the following MPRs if they are not yet enabled:
General: Users can read schema related resources
General: Users can read non-administrative configuration resources
User management: Users can read attributes of their own
The objective of the HR inbound synchronization rule is to populate the HR data objects in FIM 2010 R2. To configure the HR inbound synchronization rule, you use the related wizard pages.
On the FIM 2010 R2 Portal home page, on the navigation bar, click Administration.
To open the Synchronization Rules page, click Synchronization Rules.
To open the Create Synchronization Rule wizard, on the toolbar, click New.
On the General tab, provide the following information, and then click Next:
Display Name: HR inbound synchronization rule
Data Flow Direction: Inbound
On the Scope tab, provide the following information, and then click Next:
Metaverse Resource Type: person
External System: Fabrikam HRMA
External System Resource Type: person
On the Relationship tab, provide the following information, and then click Next:
Relationship Criteria:
MetaverseObject:person(Attribute): employeeID
ConnectedSystemObject:person(Attribute): employee ID
Create Resource in FIM: selected
On the Inbound Attribute Flow page, perform the following steps, and then click Next:
Flow rule Source Destination Rule 1
EmployeeID
employeeID
Rule 2
EmployeeType
employeeType
Rule 3
FirstName
firstName
Rule 4
LastName
lastName
Rule 5
UserID
accountName
For each row in the previous table, perform the following steps:
To open the Flow Definition dialog box, click New Attribute Flow.
On the Source tab, select the attribute shown for that row in the table.
On the Destination tab, select the attribute shown for that row in the table.
To apply the attribute flow configuration, click OK.
To set the displayName attribute, perform the following steps:
To open the Flow Definition dialog box, click New Attribute Flow.
On the Source tab, in the Attributes list, select FirstName.
Click Concatenate Value.
In the Attributes list, select String, and then type a space in the related text box.
Click Concatenate Value.
In the Attributes list, select LastName.
On the Destination tab, in the Attributes list, select displayName.
To apply the attribute flow configuration, click OK.
On the Summary tab, click Submit.
Active Directory users in this scenario originate in the HR data file. This creates an outbound-facing object and attribute flow from the metaverse to the Active Directory connector space. For an outbound-facing synchronization operation, you link an outbound synchronization rule to all affected objects. In FIM 2010 R2, workflows are used to add or remove managed objects from the scope of an outbound synchronization rule. A third component, an MPR, is required to determine when a workflow must be activated. The combination of an outbound synchronization rule, a workflow, and an MPR that is used to add or remove a managed object from the scope of an outbound synchronization rule is also known as a synchronization configuration triple.
The following illustration shows the dependencies of the synchronization configuration triple components:
For the scenario in this document, you configure a synchronization configuration triple for the sample user objects.
So that the scenario users can access the portal, the account, and the domain, the security identifier (SID) attributes must be populated on a FIM 2010 R2 user object. The domain and the SID attribute are contributed by Active Directory Domain Services (AD DS). This is why the synchronization rule that is used to manage the user objects in this scenario is a combination of an inbound synchronization rule and an outbound synchronization rule.
To configure the Active Directory user synchronization rule, you use the related wizard pages.
To open the Create Synchronization Rules Wizard, on the toolbar, click New.
On the General tab, provide the following information, and then click Next:
Display Name: Active Directory user synchronization rule
Data Flow Direction: Inbound and outbound
On the Scope tab, provide the following information, and then click Next:
Metaverse Resource Type: person
External System: Fabrikam ADMA
External System Resource Type: user
On the Relationship tab, provide the following information, and then click Next:
Relationship Criteria:
MetaverseObject:person(Attribute): employeeID
ConnectedSystemObject:person(Attribute): employee ID
Create Resource in External System: selected
On the Workflow Parameters tab, click Next.
On the Outbound Attribute Flow tab, perform the following steps, and then click Next:
For each row in the following table, perform the following steps.
Source Destination accountName
sAMAccountName
displayName
displayName
employeeID
employeeID
employeeType
employeeType
firstName
givenName
lastName
sn
To open the Flow Definition dialog box, click New Attribute Flow.
On the Source tab, select the attribute shown for that row in the table.
On the Destination tab, select the attribute shown for that row in the table.
To apply the attribute flow configuration, click OK.
To configure the distinguished name (also known as DN), perform the following steps:
To open the Flow Definition dialog box, click New Attribute Flow.
On the Source tab, in the Attributes list, select String, and then type CN= into the associated text box.
Click Concatenate Value.
In the Attributes list, select displayName.
Click Concatenate Value.
On the Source tab, in the Attributes list, select String, and then type ,OU=FIMObjects,DC=Fabrikam,DC=com into the associated text box.
To apply the attribute flow configuration, click OK.
To configure the userAccountControl, perform the following steps:
To open the Flow Definition dialog box, click New Attribute Flow.
On the Source tab, in the Attributes list, select Number, and the type 512 into the associated text box.
On the Destination tab, in the Destination list, select userAccountControl.
To apply the attribute flow configuration, click OK.
To set a password, perform the following steps:
To open the Flow Definition dialog box, click New Attribute Flow.
On the Source tab, in the Attributes list, select String, and then type P@ssW0rd into the associated text box.
On the Destination tab, in the Destination list, select unicodePwd.
To apply the attribute flow configuration, click OK.
Set Initial Flow Only for the following flows:
“CN=”+firstName+” “+lastName+”,OU=FIMObjects,DC=Fabrikam,DC=com” =>dn
512=>userAccountControl
“P@ssW0rd”=>unicodePwd
On the Inbound Attribute Flow tab, provide the following information, and then click Finish:
For each row in the following table, perform the following steps.
Source Destination objectSid
objectSid
To open the Flow Definition dialog box, click New Attribute Flow.
On the Source tab, select the attribute shown for that row in the table.
On the Destination tab, select the attribute shown for that row in the table.
To apply the attribute flow configuration, click OK.
To set the domain attribute, perform the following steps:
To open the Flow Definition dialog box, click New Attribute Flow.
On the Source tab, in the Attributes list, select String, and then type FABRIKAM into the associated text box.
On the Destination tab, in the Destination list, select domain.
To apply the attribute flow configuration, click OK.
To submit your request, click Submit.
In the context of a synchronization configuration triple, the objective of a workflow is to add or remove an identity object from the scope of a synchronization rule. This section provides instructions for configuring the Active Directory user workflow. To configure the Active Directory user workflow, you use the related wizard pages.
To open the Workflows page, on the FIM 2010 R2 Portal home page, in the Management Policy Rules section of the navigation bar, click Workflows.
To open the Create Workflow Wizard, on the toolbar, click New.
On the General tab, provide the following information, and then click Next:
Workflow Name: Active Directory user workflow
Workflow Type: Action
On the Activities tab, perform the following steps, and then click Finish:
In the Activity Picker, select Synchronization Rule Activity, and then click Select.
In the Synchronization Rules list, select AD User Outbound Synchronization Rule, and then click Save.
On the Summary tab, click Submit.
One option for triggering an MPR is using the set membership. For the scenario in this document, the Active Directory user MPR is triggered when a new user is added to the All Contractors and FTEs set. This section provides the steps for configuring this set. To configure the All Contractors and FTEs set, you use the related wizard pages.
To open the FIM 2010 R2 Portal, start Windows Internet Explorer®, and then navigate to https://localhost/identitymanagement/default.aspx.
To open the Sets page, in the Management Policy Rules section on the navigation bar, click Sets.
To open the Create Set Wizard, on the toolbar, click New.
On the General tab, provide the following information, and then click Next:
- Display Name: All Contractors and FTEs
On the Criteria-based Members page, provide the following information, and then click Finish:
Select Enable criteria-based membership in current set.
In the Select statement, click all resources, and then, in the resources list, select user.
In the Select statement, click all, and then, in the match list, select any.
Click Add Statement.
Click <Click to select attribute>, and then, in the Attributes list, select Employee Type.
Click <click to select value>, and then type Contractor in the text box.
Click Add Statement.
Click <Click to select attribute>, and then, in the Attributes list, select Employee Type.
Click <click to select value>, and then, in the text box, type Full Time Employee.
On the Summary tab, click Submit.
To configure the MPR, you use the related wizard pages.
On the FIM 2010 R2 Portal home page, on the navigation bar, click Management Policy Rules to open the Management Policy Rules page.
To open the Create Management Policy Rule Wizard, on the toolbar, click New.
On the General tab, provide the following information, and then click Next:
- Display Name: Active Directory user MPR
On the Requestors and Operations tab, perform the following steps, and then click Next:
Select Specific Set of Requestors, and in the Requestors text box, type All People, and then click the Validate button.
Select Create resource as Operation.
On the Target Resources tab, perform the following steps and then click Next:
In the Target Resource Definition After Request text box, type All Contractors and FTEs, and then click the Validate button.
Select Create resource as Operation.
In the Resource Attributes options, select All Attributes.
On the Policy Workflows tab, perform the following steps, and then click Next:
- In the Action Workflows list, select AD User Workflow.
In the previous section, you were introduced to the concept of a synchronization configuration triple. You must also create a related configuration triple for the group object because groups are also outbound facing when they are published in AD DS.
To push group data out to AD DS, use an outbound synchronization rule. To configure the Active Directory security group outbound synchronization rule, you use the related wizard pages.
To open the Administration page in the FIM 2010 R2 Portal, click Administration, and then click Synchronization Rules.
To open the Create Synchronization Rules Wizard, on the toolbar, click New.
On the General tab, provide the following information, and then click Next:
Display Name: Active Directory security group outbound synchronization rule
Data Flow Direction: Outbound
On the Scope tab, provide the following information, and then click Next:
Metaverse Resource Type: Group
External System: Fabrikam ADMA
External System Resource Type: group
On the Relationship tab, provide the following information, and then click Next:
Relationship Criteria:
MetaverseObject:person(Attribute): accountName
ConnectedSystemObject:person(Attribute): sAMAccountName
Create Resource in External System: selected
On the Workflow Parameters tab, click Next.
On the Outbound Attribute Flow tab, provide the following information, and then click Finish:
For each row in the following table, perform the following steps.
Source Destination accountName
sAMAccountName
displayName
displayName
member
member
To open the Flow Definition dialog box, click New Attribute Flow.
On the Source tab, select the attribute shown for that row in the table.
On the Destination tab, select the attribute shown for that row in the table.
To apply the attribute flow configuration, click OK.
To configure the distinguished name, perform the following steps:
To open the Flow Definition dialog box, click New Attribute Flow.
On the Source tab, in the Attributes list, select String, and then type CN= into the associated text box.
Click Concatenate Value.
In the Attributes list, select displayName.
Click Concatenate Value.
On the Source tab, in the Attributes list, select String, and then type ,OU=FIMObjects,DC=Fabrikam,Dc=com in the associated text box.
To set the groupType, perform the following steps:
To open the Flow Definition dialog box, click New Attribute Flow.
On the Source tab, in the Attributes list, select Number, and then type -2147483646 into the associated text box.
On the Destination tab, in the Destination list, select groupType.
To apply the attribute flow configuration, click OK.
Select Initial Flow Only for the following flows:
“CN=”+displayName+”,OU=FIMObjects,DC=Fabrikam,DC=com” =>dn
2147483650=>groupType
accountName=>sAMAccountName
On the Summary tab, click Submit.
To configure the Active Directory distribution list outbound workflow, you use the related wizard pages.
To open the Workflows page, on the FIM 2010 R2 Portal home page, in the Management Policy Rules section of the navigation bar, click Workflows.
To open the Create Workflow Wizard, on the toolbar, click New.
On the General tab, provide the following information, and then click Next:
Workflow Name: Active Directory security group outbound workflow
Workflow Type: Action
On the Activities tab, perform the following steps, and then click next:
In the Activity Picker, select Synchronization Rule Activity, and then click Select.
In the Synchronization Rules list, select AD Security Group Outbound Synchronization Rule.
In the Action Selection options, select Add.
Click Save.
On the Summary tab, click Submit.
To configure the MPR, you use the related wizard pages.
To open the Management Policy Rules page, on the FIM 2010 R2 Portal home page, in the navigation bar, click Management Policy Rules.
To open the Create Management Policy Rule Wizard, on the toolbar, click New.
On the General tab, provide the following information, and then click Next:
- Display Name: Active Directory security group outbound MPR
On the Requestors and Operations tab, perform the following steps, and then click Next:
Select Specific Set of Requestors. In the Requestors text box, type All People, and then click Validate.
Select Create resource as Operation.
On the Target Resources tab, perform the following steps, and then click Next:
In Target Resource Definition After Request, type All Security Groups text box, and then click the Validate button.
In the Resource Attributes options, select All Attributes.
On the Policy Workflows tab, perform the following steps, and then click Next:
- In the Action Workflows list, select AD Security Group Outbound Workflow.
The objective of the scenario in this section is to populate two security groups, based on attribute values of the processed user objects. Because the source objects have two different employee types, one security group is required for each employee type.
The FTE Applications security group is required to group FTEs. To create the FTE Applications security group in the FIM 2010 R2 Portal, you use the related wizard pages.
To open the Security Groups page, on the FIM 2010 R2 Portal home page, in the navigation bar, click Security Groups.
To open the Create Security Group Wizard, on the toolbar, click New.
On the General tab, provide the following information, and then click Next:
Display Name: FTE Applications
Domain:: FABRIKAM
Account Name: FTEApps
Scope: Global
Member Selection: Criteria-based
On the Members tab, perform the following steps, and then click Finish:
In the Select statement, click Resource ID, and then, in the Attributes list, select Employee Type.
Click <click to select value>, and then type Full Time Employee.
On the Summary tab, click Submit.
On the Summary tab, click Submit.
The Contractors Applications security group is required to group contractors. To create the Contractors Applications security group in the FIM 2010 R2 Portal, you use the related wizard pages.
To open the Security Groups page, on the FIM 2010 R2 Portal home page, in the navigation bar, click Security Groups.
To open the Create Security Group Wizard, on the toolbar, click New.
On the General tab, provide the following information, and then click Next:
Display Name: Contractors applications
Domain: FABRIKAM
Account Name: ConApps
Scope: Global
Member Selection: Criteria-based
On the Members tab, perform the following steps, and then click Finish:
In the Select statement, click Resource ID, and then, in the Attributes list, select Employee Type.
Click <click to select value>, and then type Contractor.
On the Summary tab, click Submit.
Before you can test your configuration with test data, you must initialize the testing environment. The following steps are part of this process:
Initializing the Fabrikam ADMA
Initializing the Fabrikam FIMMA
Configuring attribute flow precedence
To initialize the Active Directory management agent, you run a full import and a full synchronization on it. The full import is required to bring the OU, FIMObjects, which is used as a target for the sample objects, into the connector space. The full synchronization is required because the synchronization rules changed when the new synchronization rules were projected from the FIM 2010 R2 connector space into the metaverse.
Step | Run profile name |
---|---|
1 |
Full import |
2 |
Full synchronization |
Open Synchronization Service Manager, and, on the Tools menu, click Management Agents.
In the Management Agents list, select Fabrikam ADMA.
To open the Run Management Agent dialog box, on the Actions menu, click Run.
For each row in the previous table, complete the following steps:
To start the run profile, click OK.
To open the Run Management Agent dialog box, on the Actions menu, click Run.
In the Run profiles list, select the run profile shown for that row in the table, and then click OK to start it.
To initialize the Fabrikam FIMMA, you run a complete synchronization cycle on this management agent. The complete cycle consists of the run profile runs in the following table.
Step | Run profile name |
---|---|
1 |
Full import |
2 |
Full synchronization |
3 |
Export |
4 |
Delta import |
Open Synchronization Service Manager and on the Tools menu, click Management Agents.
In the Management Agents list, select Fabrikam FIMMA.
To open the Run Management Agent dialog box, on the Actions menu, click Run.
For each row in the previous table, complete the following steps:
To open the Run Management Agent dialog box, on the Actions menu, click Run.
In the Run profiles list, select the run profile shown for that row in the table, and then click OK to start it.
To start the run profile, click OK.
When the initialization of the Fabrikam FIMMA is complete, the new security groups are provisioned to the connector space of the Fabrikam ADMA. To complete the initialization, these objects must be synchronized to the Fabrikam FIMMA.
Step | Run profile name |
---|---|
1 |
Export |
2 |
Delta import |
In the Management Agents list, select Fabrikam ADMA.
To open the Run Management Agent dialog box, on the Actions menu, click Run.
For each row in the previous table, complete the following steps:
To open the Run Management Agent dialog box, on the Actions menu, click Run.
In the Run profiles list, select the run profile shown for that row in the table, and then click OK to start it.
To start the run profile, click OK.
During the initialization of the management agent, the two configured synchronization rules were brought into the metaverse. Because the sample HR data source is authoritative for certain attributes, the attribute flow precedence must be adjusted for the attributes that were contributed by this management agent to make sure that these attributes can flow into the metaverse and later into the FIM 2010 R2 data store.
The following table lists the affected attributes.
Step | Attribute name |
---|---|
1 |
accountName |
2 |
displayName |
3 |
employeeID |
4 |
employeeType |
5 |
firstName |
6 |
lastName |
In Synchronization Service Manager, on the Tools menu, click Metaverse Designer.
In the Object types list, select person.
For each row in the previous table, complete the following steps:
In the Attributes list, click the attribute shown for that row in the table.
To open the Configure Attribute Flow Precedence dialog box, on the Actions menu, click Configure Attribute Flow Precedence.
Select Use equal precedence.
To close the Configure Attribute Flow Precedence dialog box, click OK.
To test the configuration, you will publish the objects from your HR data file to FIM 2010 R2 and then to AD DS. As a result of the synchronization cycle to FIM 2010 R2, the group membership is updated, and the new users and the updated group membership are published in AD DS. After that, you will log on as Terry Adams and create a distribution list (DL). Next, you will log in as Lola Jacobsen and try to create a DL. This attempt should fail. Complete the following steps to test the configuration:
Synchronizing HR objects to FIM 2010 R2
Synchronizing HR objects to AD DS
Verifying the group creation constraints
To synchronize the HR objects to FIM 2010 R2, you run the run profile sequence, as shown in the following table.
Step | Run profile name | Management agent |
---|---|---|
1 |
Full import |
Fabrikam HRMA |
2 |
Full synchronization |
Fabrikam HRMA |
3 |
Export |
Fabrikam FIMMA |
4 |
Delta import |
Fabrikam FIMMA |
After you complete the run profile sequence, you verify that the users are created in FIM 2010 R2 and that the membership in the security groups that are part of the scenario in this document has been updated.
Open the Synchronization Service Manager. On the Tools menu, click Management Agents.
For each row in the previous table, complete the following steps:
Select the management agent that is shown for that row in the table.
To open the Run Management Agent dialog box, on the Actions menu, click Run.
In the Run profiles list, select the run profile shown for that row in the table, and then click OK to start it.
To start the run profile, click OK.
As a result of a successful synchronization cycle, the objects from the HR data file are populated in the FIM 2010 R2 data store. In addition to this, Terry Adams and Jimmy Bischoff became members of the FTE Applications security group and Lola Jacobsen became a member of the Contractors Applications security group. You should verify the group membership of these objects in both FIM 2010 R2 security groups.
Log on to the FIM 2010 R2 Portal as an administrator.
To open the Security Groups page, in the navigation bar, click Security Groups.
To list the available security groups, click the Search for button.
To display the configuration of the Contractors Applications security group, select Contractors Applications, and then on the toolbar, click the Details button.
To display the members of the security group, select the Members tab, and then click View Members.
Verify that the required users are members of this security group.
To close the dialog box, click OK.
Repeat this step sequence for the FTE Applications security group.
After you synchronize the HR data to FIM 2010 R2, you can now also synchronize these objects to AD DS. To synchronize the scenario objects to AD DS, you run the run profiles in the following table.
Step | Run profile name | Management agent |
---|---|---|
1 |
Delta import |
Fabrikam FIMMA |
2 |
Delta synchronization |
Fabrikam FIMMA |
3 |
Export |
Fabrikam ADMA MA |
4 |
Delta import |
Fabrikam ADMA |
5 |
Export import |
Fabrikam FIMMA |
6 |
Delta import |
Fabrikam FIMMA |
After completing the run profile sequence, you verify that the users are created in AD DS and that the memberships in the security groups that are part of the scenario in this document have been updated.
To open the Active Directory Users and Computers snap-in, click Start, click Run, and then, in the Open text box, type dsa.msc.
In the console tree, double-click fabrikam.com, and then select the FIMObjects OU.
Right-click the FTE Applications group, and then click Properties.
On the Members tab, you should see two users, Jimmy Bishoff and Terry Adams.
Click OK.
Right-click the Contractor Applications group, and then click Properties.
On the Members tab, you should see one user, Lola Jacobsen.