Re: Active Directory password propagation

2017-02-15 Thread Francesco Chicchiriccò
On 15/02/2017 13:56, Tech wrote: Hello, actually that field at that stage was not flagged. Checking them it's now working, but was generated confusion is that without checking them, the other information as FirstName, LastName etc are propagated. Is there a way to keep as default the

Re: Active Directory password propagation

2017-02-15 Thread Tech
Hello, actually that field at that stage was not flagged. Checking them it's now working, but was generated confusion is that without checking them, the other information as FirstName, LastName etc are propagated. Is there a way to keep as default the check [v] active? Thanks for the support!

Re: Active Directory password propagation

2017-02-15 Thread Andrea Patricelli
Good morning, we made a double check and password propagation on Active Directory was successful. In the user edit form (first tab of the wizard), beneath password and confirm password text areas, there are two (or more) checkboxes (depends on the number of resources associated to the

Re: Active Directory password propagation

2017-01-31 Thread Francesco Chicchiriccò
On 30/01/2017 16:02, Tech wrote: The value in 'password.cipher.algorithm' was SHA1. We updated to AES, we changed again the password for the user and we tried to login again to the enduser portal. It's working, we tried to connect to AD but without success. We realized after that the

Re: Active Directory password propagation

2017-01-30 Thread Tech
The value in 'password.cipher.algorithm' was SHA1. We updated to AES, we changed again the password for the user and we tried to login again to the enduser portal. It's working, we tried to connect to AD but without success. We realized after that the password, with a difference with the other

Re: Active Directory password propagation

2017-01-30 Thread Francesco Chicchiriccò
On 30/01/2017 15:18, Tech wrote: Yes, I can confirm, right in this moment we are only performing manual provisioning. This is of course not the goal, but before moving to an automatic provision of accounts we want the manual one working What is your value for the 'password.cipher.algorithm'

Re: Active Directory password propagation

2017-01-30 Thread Tech
Yes, I can confirm, right in this moment we are only performing manual provisioning. This is of course not the goal, but before moving to an automatic provision of accounts we want the manual one working On 30/01/2017 15:14, Francesco Chicchiriccò wrote: > On 30/01/2017 15:11, Tech wrote: >>

Re: Active Directory password propagation

2017-01-30 Thread Francesco Chicchiriccò
On 30/01/2017 15:11, Tech wrote: We are associating using a manual provisioning Do you mean that you are only relying on a push task for provisioning to AD? Could you confirm that you are *not* assigning the AD resource directly to the users, neither via group membership or template? Here

Re: Active Directory password propagation

2017-01-30 Thread Tech
We are associating using a manual provisioning Here the main information: Connector version 1.3.2 -SSL enabled -Retrieve deleted users enabled -Retrieve deleted groups enabled -Trust all certs enabled Entry object classes: -Top -person -organizationalPerson -inetOrgPerson -user Custom user

Re: Active Directory password propagation

2017-01-30 Thread Francesco Chicchiriccò
On 30/01/2017 14:53, Tech wrote: This is what happen when I open the Password Manager, while when I update the password no log is generated. This is what I suspected: you could definitely find a confirmation if you are able to verify that the user on Active Directory has still the password

Re: Active Directory password propagation

2017-01-30 Thread Francesco Chicchiriccò
On 30/01/2017 12:34, Tech wrote: When we create the user we are able to initialize the correct password, connecting to the target system we can verify that Syncope did its job. If the Admin tries to reset the password from the console, or if the user tries to change is password from the

Re: Active Directory password propagation

2017-01-30 Thread Tech
When we create the user we are able to initialize the correct password, connecting to the target system we can verify that Syncope did its job. If the Admin tries to reset the password from the console, or if the user tries to change is password from the enduser interface, the password is still

Re: Active Directory password propagation

2017-01-30 Thread Tech
I'm not sure about this step. As mentioned we can already propagate changes as "email, "first name" and "last name". The AD user that we are using is able to change the passwords of other AD users, create, update and delete other users. I think that there is an additional step that was not

Re: Active Directory password propagation

2017-01-27 Thread Fabio Martelli
Il 27/01/2017 16:32, Fabio Martelli ha scritto: Il 27/01/2017 15:53, Tech ha scritto: Yes, we are connecting via SSL. We know that the connection is working because we are still able to propagate the user modification like firstname and lastname. We can change the password and internally is

Re: Active Directory password propagation

2017-01-27 Thread Fabio Martelli
Il 27/01/2017 15:53, Tech ha scritto: Yes, we are connecting via SSL. We know that the connection is working because we are still able to propagate the user modification like firstname and lastname. We can change the password and internally is working, but it's not propagated to AD. When

Re: Active Directory password propagation

2017-01-27 Thread Tech
Yes, we are connecting via SSL. We know that the connection is working because we are still able to propagate the user modification like firstname and lastname. We can change the password and internally is working, but it's not propagated to AD. the On 27/01/2017 15:42, Fabio Martelli

Re: Active Directory password propagation

2017-01-27 Thread Fabio Martelli
Hi, find my comment in-line. Regards, F. Il 27/01/2017 12:12, Tech ha scritto: Hello, we are working on the password propagation using the AD connector. We are able to check the connectivity both using plain and SSL, we are able to create new users and to update information like email,