Click HERE to see how Saviynt Intelligence is transforming the industry. |
09/03/2024 02:34 PM
Hi Everyone -
We have multiple forest / domains that need to be integrated into Saviynt & a one-way trust between them (AD & Cloud AD. Accounts that exists in AD need to be added to the groups that are created in Cloud AD. Based on the above requirements we are thinking about leveraging ADSI connector since it is not supported with AD connector. Below are a few of my questions.
Thanks
Durga Pasupulati
09/03/2024 02:57 PM
ADSI Connector Trust Requirement: According to the documentation, the ADSI (Active Directory Service Interfaces) connector does indeed require a two-way trust relationship between all forests and domains for full functionality. This requirement ensures that the service account can authenticate and perform actions across all domains.
Working with One-Way Trust: If you have a one-way trust, it complicates the process since the ADSI connector expects two-way communication. However, you can consider a few workarounds:
Required Privileges: The documentation typically states that the service account should be a member of the Enterprise Admins group, which grants it extensive privileges across all domains. This is because the ADSI connector might need to create, update, move, or delete objects across domains, which usually requires elevated privileges.
Least Privilege Approach: If you want to operate with least privilege:
09/03/2024 03:31 PM
@rushikeshvartak
It's better to have a two-way trust present so that all the FOREST_DETAILS get populated and will help in the import.
Permission:
Provide the Least Privilege to the Service Account if the domain administrator rights are not granted to it:
Directory replication permissions across domains in a forest. This is only required for import.
Permissions to create, update, move, or delete an object and add or remove access from resources in a cross-domain environment. The account must also be a member of the Enterprise Admins group. This is only required for provisioning.
The following table provides information about the scope of access provisioning in Active Directory groups:
Domain Local (Security/Distribution) |
|
|
|
Universal (Security/Distribution) |
|
| Not Applicable |
Global (Security/Distribution) |
| Not Applicable | Not Applicable |