Inbound Provisioning from CyberArk Cloud Directory
You can provision users from your enterprise source directories (CyberArk Cloud Directory or any source Active Directory instances connected to CyberArk Identity) to one or more target Active Directory instances and assign the right set of access based on roles.
Source | Target |
---|---|
CyberArk Cloud Directory |
AD |
Users created in CyberArk Cloud Directory.
Users created in AD directory which are configured to CyberArk Identity.
You can define synchronization schedules to synchronize user data from source directory to target Active Directories.
Prerequisites
Before you start configuring inbound provisioning to AD targets, you need to do the following:
-
Installed the CyberArk Identity Connector.
The CyberArk Identity Connector is required to provision users to AD target directories.
-
Stored the domain administrator account to CyberArk Identity.
This step is only required if the CyberArk Identity Connector is not run by a domain administrator. See Manage domain administrative accounts.
- Populated the relevant user data in your data source.
Expand the following procedures for more information about provisioning user data from Cloud Directory to Active Directory.
Add CyberArk Cloud Directory as a data source
You have to add CyberArk Cloud Directory as a data source before you can provision users form it to a target directory source.
- Log in to Identity Administration portal.
- Click Settings > Users > Inbound Provisioning.
- Click Add Source (on the Sources tab) to define the Cloud Directory service information.
The Provisioning Source window opens.
-
Select Cloud Directory from the Source drop-down menu.
-
Select the Enable check box to enable the feature.
You can configure the feature first, then enable it when you are ready. - Enter a Name for this source.
-
(Optional) Click Sync Settings to configure new hire pre-provisioning and time offsets.
-
Select the Enable New Hire Pre-Provisioning ckeckbox to provision a user prior to the user employment start date.
For example, if you have users starting 2 days after your synchronization action, you can synchronize those user data to Active Directory by setting the Interval field to 120 hours. If you do not configure this option, the default value is eight hours.
The maximum value is 8,760 hours (one year).
-
Enable Run incremental sync automatically and specify the sync frequency in minutes.
SeeInbound Provisioning from CyberArk Cloud Directory for more sync options.
-
Specify the time offset between your CyberArk Identity tenant and UTC using the Tenant UTC Offset (minutes) option to prevent delayed or premature user data synchronization.
Synchronizations are performed based on UTC time. If you need to compensate for time zone differences between your tenant and UTC, specify that offset here.
- Select Do not create new users (update existing user only) if you want the sync job to only update the existing user data and not create any new users in Active Directory.
-
Select Ignore sync cache if you want to sync with the data source regardless of existing user data in Active Directory.
CyberArk Identity keeps a cache of the data source's user data.
If systems administrators update user data in Active Directory, then that data is out of sync from the data source. This option allows CyberArk Identity to ignore existing data in Active Directory and sync with the data source.
Enabling this option makes available the Discard directory identifiers for cached entries. Enable this option if you want CyberArk Identity to discard existing user IDs stored in Active Directory and re-discovers users from UPN or samaaccount name.
-
-
Click Save.
Your configured source displays in the Sources table.
Define provisioning rules
Define provisioning rules to identify users, map user attributes, and other important provisioning configuration. You can define more than one rule for each source. For example, you might use a single rule if you are provisioning all users from Cloud Directory to a single AD OU, or multiple rules if you want logical groupings of users in Cloud Directory to have different target AD OUs.
You must first add and configure a source before you can define the rules.
Step 1: Add a new rule
-
From Settings > Users > Inbound Provisioning, select Cloud Directory and then click Actions > Add Rule.
-
Enter a Name for this rule.
-
Select a Provisioning Rule Mode.
Mode Description Active Makes a rule active. Not recommended until you have finished all configurations. You must activate a rule before synchronizing. Preview Sets the rule in preview mode. Select this option for a production environment to verify the user mapping between Cloud Directory and the target directory before you make the rule Active. Inactive Sets the rule as inactive. Recommended until you have finished all configuration steps. You can come back to this option and activate the rule when you are ready.
Step 2: Define the users to which the rule(s) apply
Select the Source Selection Rule to define the users to which these rules apply.
-
Select one of the following from the Source Selection Rule drop-down:
- All Users - Select this option to choose all users.
-
Specific Organization - Select this option to choose a specific organization. Click Add to select the required organization.
-
Select one of the following from the Second Level Source Selection Rule drop-down:
-
All Roles - Select this option to choose all roles. The roles will be based on the first Source Selection Rule. For example, if you select any specific Org(s), all roles will be related to the selected Orgs.
-
Specific Roles- Select this option to choose a specific role. Click Add to select the required role.
-
-
Repeat above sub-steps until you have added all relevant roles and click Next.
Step 3: Define the target directory that you want to provision to.
-
Select the relevant forest from the Target drop-down menu.
When you select the forest, CyberArk Identity looks for the stored domain administrator account and shows a warning message if one is not available (unless the CyberArk Identity Connector is run by a domain administrator). See Manage domain administrative accounts.
-
Select the relevant Domain.
-
Select the relevant Domain Controller.
-
Select the relevant and click Next.
Step 4: Map the attributes
-
Review the required and automatically mapped attributes.
You can delete optional attributes. You also have the option to map additional attributes.
-
(Optional) Click Add and select the Target Attribute (attribute name in Active Directory) to add more attributes.
- If there is only one match in Cloud Directory, then no corresponding source attributes are displayed; click Add again to add the attribute and view the mapping in the table.
-
If more than one source attribute can be mapped to the selected target attribute, then select a corresponding Source Attribute (attribute name in the data source) from the drop-down list; click Add again to add the attribute and view the mapping in the table.
Continue mapping attributes until all necessary attributes are mapped.
-
You can edit the attribute in the Target Attribute column to map custom AD attributes to source attributes.
Step 5: Configure additional provisioning rule options
-
Click Next to configure additional provisioning rule options.
-
(Optional) Configure the following attribute options.
Option Description Set user’s manager attribute If enabled, users’ manager attributes in Cloud Directory are synchronized to the target directory. Disable user in AD if user account status is suspended. If enabled, users with the terminated employment status in Cloud Directory are automatically disabled in the target directory source. -
Specify the Password Type for new user accounts.
If you select Static Password from the drop-down list, then the system uses the same password for all new users.
Make sure the password meets the complexity requirements set via policy for the target groups. If the password does not meet the complexity requirements, you will see the error UnableToSetPassword in the sync report.Provide the following information:
Field/Option Description Password Specify the password to be used for all users. Require password change at next login If enabled, new users will be required to change their passwords after the initial log in. Disabled by default.
See Password Synchronization for more details.
If you select Generated Password from the drop-down list, then the system randomly generates different passwords for each new user.
Provide the following information:
Field/Option Description Require password change at next login If enabled, new users will be required to change their passwords after the initial log in. Disabled by default. Delivery Options Select the email address to which you want the auto-generated password sent.
This is to help in your new employee onboarding process. When new users are created in Active Directory, an email will be sent to the specified address with the credentials for those users.
-
Send password to email address
Enter the email address to which you want the password sent.
-
Send password to user’s manager
Sends the password to the manager’s email address. Ensure that you have the email address specified in the data source.
-
Send password to user’s personal email
Sends the password to the user’s email address specified in the data source.
If Password sync feature is enabled then the password is not sent to the user's email.
If you have more than one option selected, the password is sent to all the selected email addresses.
-
Step 6: (Optional ) Map users to AD groups.
-
Enable the Add users to groups check box.
-
Select the Add button within the Active Directory Group Options area. The Add Active Directory Group window opens.
-
Confirm that the appropriate target group is selected.
-
(Optional for AD) Select Assign user to an OU upon termination if you want to specify the organizational unit (OU) in which terminated users will be placed.
If you do not enable this check box, then terminated users will remain in the current OU.
Selecting this option requires enabling the Disable user in AD if user account status is suspended option. Both options must be enabled to successfully assign users to an OU upon termination.Enter the group name into the Search box to find the group.
-
Select the group and click Add.
-
Select Re-evaluate Group Memberships to remove users satisfying the inbound provisioning rule from previous group assignments and add the users only to the groups specified.
For example, you might have separate inbound provisioning rules configured to provision users in a sales source group to a sales AD group, and a marketing source group to a marketing AD group. If a user moves from the sales organization to the marketing organization, the user should be removed from the AD sales group so that the user's access is appropriate for just marketing, not marketing and sales. Selecting Re-evaluate Group Memberships would remove the user from the sales group when the inbound provisioning rule for the marketing source group runs.
Re-evaluate Group Memberships removes users from all previous AD group assignments, regardless of whether the assignment was from inbound provisioning or configured manually. This might have unintended consequences for application access, authentication policies, device management, etc. Verify that your users only need the access granted to the AD groups specified in the inbound provisioning rule.
Step 7: Map Provisioning Groups to Active Directory Groups.
Provisioning Groups can be used to collect users and map them to specific AD Groups.
-
Enable the Map Provisioning Roles to Active Directory Groups check box.
-
Select the associated Add button.
-
Select the Provisioning Role Name from the drop-down.
-
Confirm that the appropriate target is selected.
-
Enter the group name into the Search box to find the group.
-
Select the group and click Add.
Step 8: (Optional for AD) Select Assign user to an OU upon termination if you want to specify the organizational unit (OU) in which terminated users will be placed.
If you do not enable this check box, then terminated users will remain in the current OU.
Step 9: Finalize the rule(s)
-
Click Save to save the rule configuration.
The provisioning rule has been configured and the rule is listed in the Sources table.
-
Click the rule to change its status if you did not already set the rule to Active.
-
Click Save.
-
Define additional provisioning rules as needed.
You can define more than one rule for each source.
Edit Cloud Directory as a data source in the Identity Administration portal
-
Log in to the Identity Administration portal.
-
Click Settings > Users > Inbound Provisioning.
-
Click the row associated with Cloud Directory.
The Provisioning Source page opens for edits. Complete your edits and return to the Inbound Provisioning page.
-
Click a rule associated with Cloud Directory.
The Inbound Provisioning Rule page opens for edits. Complete your edits as needed.
Password Synchronization
You can sync and maintain the same passwords between CyberArk Identity and multiple AD instances. You can update your password in theCyberArk Cloud Directory, and the password will be automatically updated in the Active Directory. For example, you can synchronize passwords from CyberArk Cloud Directory to AD or AD1 or AD2 but cannot sync passwords from AD to Cloud Directory.
Enable Password Synchronization
Go to Core Services > Policies > User Security Policies > User Account Settings > select Yes from the Enable password sync to target Active Directory instances drop-down.
When the Password Synchronization is enabled:
-
Once the user is provisioned in the target AD from Source AD or Cloud Directory, the user's password is stored and updated in the target AD.
-
Password for cloud users who are provisioned in AD will be automatically synced when you:
-
Log in for the first time and change the password.
-
Change the password from the user portal.
-
Change the password on expiry.
-
Change the password by following the Forgot Password flow.
-
Change the password as part of the Require password change at next login.
-
Admin changes the password of any user.
-
-
When a user is provisioned from a source AD to Target AD, a Static or Generated Password is set as per the settings by the admin.
-
Password sync applies to both Cloud to AD and AD to AD. The cloud password will be synced to the target AD.
-
If AD1 is connected to CyberArk Identity, and AD1 users are getting provisioned to target AD2, then:
-
AD1 passwords will be synced to AD2 when you update the password in AD1 through Identity.
-
Synchronize data
After you have configured the data source and provisioning rule, you are ready to synchronize user data from Cloud Directory to your target directory. You have the option to manually trigger a full or incremental sync or schedule incremental syncs. Full syncs are time and resource intensive so it must be triggered manually; we recommend doing it only when necessary.
For the initial sync, you must perform a full one.
-
Log in to the Identity Administration portal.
-
Click Settings > Users > Inbound Provisioning.
-
Confirm that you have the source and provisioning rule configured and click the Sync Options tab next to Sources.
-
Select either Incremental or Full in the Manual Sync Options area.
For the initial sync, you must perform a full one.
-
Select the source (a specific source or all configured sources) that you want to synchronize.
-
Click Run Sync.
-
Log in to the Identity Administration portal.
-
Click Settings > Users > Inbound Provisioning.
-
Confirm that you have the source and provisioning rule configured and click the source for which you want to schedule an incremental sync.
-
Click Sync Settings.
-
Select the Run incremental sync automatically check box.
-
Specify how frequently you want to run the sync in the Frequency text box.
-
Click Save.
You can configure CyberArk Identity to send reports via email after each sync completion.
To view the detailed job report using the link provided, you must log in with full administrator privileges or read only administrator privilege.
-
Enable Send report on sync completion check box if you want to receive a sync report.
-
Select the type of syncs to include in the report.
-
All Syncs
-
Incremental Syncs
-
Full Syncs
-
-
Select Send only failed reports to limit reports to failed syncs of the selected sync type.
For example, if you select All Syncs and Send only failed reports, then you send reports for failed incremental syncs and failed full syncs.
-
Under Distribution, click Add to specify an email address to send reports to.
The default email address is that of the logged in system administrator. You can enter a new email address by editing the default address.
-
Click Save.
Mapping custom Cloud Directory attributes
You can use the Identity Administration portal to run a script mapping Cloud Directory custom fields to relevant Active Directory attributes.
-
Log in to the Identity Administration portal.
-
Click Settings > Users > Inbound Provisioning.
-
Select the provisioning rule for which you want to add the script.
-
Click the Attributes tab.
-
Confirm that the Use Attribute Mapping Script checkbox is enabled.
-
Click Load Sample to load the sample script.
-
Update the script as necessary for your purpose.
Custom attributes are available in the Script Help window under SourceUserRecord.
For example, resolve
DisplayName
conflicts by using thecheckValueExists
function to see if theDisplayName
already exists in AD. IfcheckValueExists
returnsTrue
, create a new function to create a uniqueDisplayName
for the user you are trying to provision.Refer to Conflict resolution for more information about resolving conflicts with scripting.
-
(Optional) Click Test to verify that the script meets your purpose.
- Enter an Employee ID for an employee with relevant attributes.
- Click Next.
Attribute values associated with the Employee ID are displayed.
- Click Save.
When a synchronization between Cloud Directory and Active Directory is triggered, the script runs automatically.
Click here for an example of a script mapping the custom data source attribute
divison
to the target attribute Division
.