Windows and Active Directory Integration

Integration between Hitachi ID Identity Manager, Windows servers and Active Directory

Hitachi ID Identity Manager uses the directory client built into the Windows server OS to manage passwords both on individual Windows servers, Active Directory domains and AD forests.

Identity Manager can integrate with multiple domains, in multiple forests at the same time. Trust relationships are not required to do this.

Where Hitachi ID Password Manager is used to clear intruder lockouts, it can automatically choose appropriate domain controller(s) on which to do so, so as to expedite propagation.

No agent software is installed locally on Windows servers or domain controllers, to manage users or passwords on Windows or Active Directory.

A DLL can be installed on Windows servers and/or AD domain controllers to intercept native password changes, subject them to an extra password policy and trigger password synchronization.

Identity Manager can also manage objects outside of AD that pertain to AD users -- such as home directory shares and folders, mailboxes on Exchange or other e-mail systems, etc.

Identity Manager connectors can create, delete, enable, disable, modify, rename and move users on Windows 2000/2003/2008/2012 servers and Active Directory domains and forests. It creates new Windows users by cloning existing ones, copying and adjusting hundreds of native Windows, Active Directory and Exchange attributes in the process. It can also manage the membership of users in Windows and Active Directory groups.

When managing Windows/AD users, Identity Manager connectors can also create, update and move Exchange mailboxes; create, populate and set access rights on Windows home directories and more. In other words, it can manage the entire Windows-platform user profile, rather than just AD user objects.

Read More: