Setting up user synchronization between Active Directory and IFS Applications

This guide describes how to setup and configure IFS Applications to synchronize user information from an Active Directory server.

The user concepts are described in About Users .

Note: It is recommended to create and verify the configuration in a test environment before applying the synchronization scheme in a production mode environment. The synchronization job will automatically create user accounts in IFS Applications and licensing can be affected.

When to use this information:

Use this page when you want to set up synchronization of users and user information from an Active Directory into IFS Applications.

Contents

An overview of the setting up synchronization and a closer look at the process.

Some things to consider even before you start out setting up the configuration.

Process overview

Prepare configuration

Setting up synchronization of users from Active Directory into IFS Applications needs thorough preparations to succeed. These are the steps you need to perform to set up a fully functional synchronization configuration.

  1. Categorize users and identify roles to be used in IFS Applications

  2. Prepare the Active Directory by

    1. create groups in accordance to the role hierarchy you determined in step 1

    2. create a system service account with read-access rights to the AD

    3. find out which domain controllers to connect to

  3. Prepare the permission sets you plan to use.

  4. Locate the 'Active Directory User Integration Configuration' in Solution Manager and create a new configuration

  5. Review attribute mappings and add mappings between AD group and IFS user group and permission set.

  6. Verify the configuration by making a test run (no information will actually be committed in IFS Applications)

  7. Run the synchronization manually

  8. Verify the synchronization by looking at some sample users. Did the right AD attributes get synchronized?

  9. If anything needs to be adjusted, go back to step 4

  10. If the synchronization was successful:

    1. set up the synchronization job as a scheduled application server task to run in the background

    2. set up event actions to handle errors and/or job status notifications

Note: It is advisable to do all steps in a test environment before applying the configuration to a production environment.

Synchronization process

The synchronization job itself can be divided into separate steps.

  1. User information is transferred from the Active Directory into load tables.
  2. Load tables are processed and user information is synchronized into IFS Applications User Registry.
  3. Load tables are processed and role information is synchronized; permissions are granted or revoked.

The information fetched from the Active Directory is limited to those attributes that are present in the configuration mapping.

Default attribute mappings

A template with a set of mappings is installed as default for new configurations. These mappings might need some adjustments to fit your environment. There is a fixed set of Active Directory attributes available to map onto IFS Application domain properties. Some mappings can have hard-coded values while others can be left empty if no synchronization is desired.

Role granting

When the synchronization job is set up completely you can start manage users and roles in the Active Directory instead of IFS Applications. The concept is simple - adding users to a mapped Active Directory group will grant permissions to them while removing users from a group will revoke the configured permission sets. If the user does not exist in IFS Applications it will be created.

Note: It is still possible to manage users from within IFS Applications. But they must not be member of any of the groups (in the Active Directory) set up in the configuration. If you make changes to an user that is managed by the sync job your manual changes will be overwritten by the sync job at the next run. Granting an user a permission set manually might work; as long as the permission set is not configured in any mapping in the configuration. The recommendation is to either let the sync job handle the user or let the system administrator manage the user manually in Solution Manager.

Logging

There are two different forms available to perform follow up on the synchronization. Both are located under Solution Manager / Security / Users . They give two different views of the log entries that are created when the sync job runs. You can either locate a given sync job by id and timestamp and see which users it affected by it - or the other way around - looking at user accounts and identify which configurations have been modifying the accounts.

Checklist

Before you start setting up the configuration it is a few things that need consideration.

Active Directory structure and administration

Contact your network administrator to discuss how to organize groups in the Active Directory. Where should the new groups for user and role synchronization be placed? Who should create it? Who should manage the group and its members?

Identity matching

The synchronization process assumes that the usernames in IFS Applications are the same as the Windows usernames. This is how users are mapped between Active Directory and IFS Applications.

Note: If you for some reason do not have the same username in IFS Applications as in Windows, you have to manually load the database table AD_USER_MAPPING_TAB with the mappings between the user id in the Active Directory and the user id in IFS Applications user registry. Otherwise the synchronization process will have no knowledge of how users are mapped.

Does your system use ADFS or Azure AD as Open Identity Providers?

If your system is set up to use ADFS or Azure AD as Open Identity Providers for user authentication when creating a new configuration make sure that directoryId property of FndUser is mapped to the Active Directory attribute userPrincipalName. This is the default mapping. As authentication is handled by the Active Directory or the Azure Active Directory there is no need to create individual Oracle-accounts for each user.

Note: If you are using Azure Active Directory as the Open Identity Provider you will have to enable Domain Services in your Azure AD to be able to perform Active Directory Synchronization. More information about how to do this can be found here >>..

Does your system use IFS Open Identity Provider?

If your setup is configured to use IFS Identity provider then Oracle based user authentication is used.  In this case you need to change the default mappings used in synchronization . The FndUser.DirectoryId should be mapped to the Active Directory attribute sAMAccountName. An Oracle account will be created for new users and the account name will be the standard Windows username.