Re: Active Directory password propagation

2017-01-30 Thread Tech
The value in 'password.cipher.algorithm' was SHA1. We updated to AES, we changed again the password for the user and we tried to login again to the enduser portal. It's working, we tried to connect to AD but without success. We realized after that the password, with a difference with the other

Re: Active Directory password propagation

2017-01-30 Thread Francesco Chicchiriccò
On 30/01/2017 12:34, Tech wrote: When we create the user we are able to initialize the correct password, connecting to the target system we can verify that Syncope did its job. If the Admin tries to reset the password from the console, or if the user tries to change is password from the

Re: Active Directory password propagation

2017-01-30 Thread Tech
We are associating using a manual provisioning Here the main information: Connector version 1.3.2 -SSL enabled -Retrieve deleted users enabled -Retrieve deleted groups enabled -Trust all certs enabled Entry object classes: -Top -person -organizationalPerson -inetOrgPerson -user Custom user

Re: Active Directory password propagation

2017-01-30 Thread Francesco Chicchiriccò
On 30/01/2017 15:18, Tech wrote: Yes, I can confirm, right in this moment we are only performing manual provisioning. This is of course not the goal, but before moving to an automatic provision of accounts we want the manual one working What is your value for the 'password.cipher.algorithm'

Re: Active Directory password propagation

2017-01-30 Thread Francesco Chicchiriccò
On 30/01/2017 14:53, Tech wrote: This is what happen when I open the Password Manager, while when I update the password no log is generated. This is what I suspected: you could definitely find a confirmation if you are able to verify that the user on Active Directory has still the password

Re: Active Directory password propagation

2017-01-30 Thread Francesco Chicchiriccò
On 30/01/2017 15:11, Tech wrote: We are associating using a manual provisioning Do you mean that you are only relying on a push task for provisioning to AD? Could you confirm that you are *not* assigning the AD resource directly to the users, neither via group membership or template? Here

Re: Active Directory password propagation

2017-01-30 Thread Tech
Yes, I can confirm, right in this moment we are only performing manual provisioning. This is of course not the goal, but before moving to an automatic provision of accounts we want the manual one working On 30/01/2017 15:14, Francesco Chicchiriccò wrote: > On 30/01/2017 15:11, Tech wrote: >>

Re: Active Directory password propagation

2017-01-30 Thread Tech
I'm not sure about this step. As mentioned we can already propagate changes as "email, "first name" and "last name". The AD user that we are using is able to change the passwords of other AD users, create, update and delete other users. I think that there is an additional step that was not

Re: Active Directory password propagation

2017-01-30 Thread Tech
When we create the user we are able to initialize the correct password, connecting to the target system we can verify that Syncope did its job. If the Admin tries to reset the password from the console, or if the user tries to change is password from the enduser interface, the password is still

Re: Install Syncope

2017-01-30 Thread Marco Di Sabatino Di Diodoro
Hi, Il 30/01/2017 16:45, Anas Asharat ha scritto: Dears, I hope my email find you well. Am new with Syncope, I tried to install Syncope 2.0.1 with oracle database, I face installation failure every time I tried to install the application. Can you help me or give document with