Skip to main content

Legacy Active Directory

Connector name

agtad

Type

Executable

Target system description

Legacy Active Directory

Target system versions supported/tested

Active Directory installed on Windows 2008R2/2012/2016/2019/2022 servers.

Connector status

Deprecated / Removed

Support

Not supported as of Connector Pack version 4.6.0. Clients may contact Bravura Security support for assistance with migrating to the Active Directory DN connector

Upgrade notes

Caution

This connector is shipped with Connector Pack 4.5 or earlier, however as of version 4.6.0 this connector is no longer available.

Connection to the domain can either be made using a domain administrator account or delegated ID. ADSI services are used to connect to the domain. On most operations, the connector uses the ADSI LDAP provider. If the target system is configured to use SSL, an LDAP SSL connection is used. Otherwise, a secure connection using Kerberos is made over LDAP. Other operations use the ADSI WinNT provider.

The Bravura Security Fabric Active Directory connector is able to dynamically identify the most suitable domain controllers on which to make password updates in order to expedite replication of the new password and intruder lockout flag for the user. For example, a password update and cleared lockout may be set on a DC in the same site as the user’s current workstation (identified by IP address), or nearest the user’s home directory file server. In either case, no connector software is installed on the target Windows domain controllers.

The following Bravura Security Fabric operations are supported by this connector on user, account and account group type objects (depending on your product license and version):

  • user verify password

  • get server information

  • user change password

  • administrator reset password

  • expire password

  • check password expiry

  • administrator verify password

  • enable accountdisable account

  • check account enabled

  • unlock account

  • check account lock

  • create account

  • delete account

  • rename account

  • update attributes

  • move contexts

  • add user to group

  • delete user from group

  • add owner(user) to group

  • remove owner(user) from group

  • add owner(group) to group

  • remove owner(group) from group

  • create group

  • delete group

  • check account expiry

  • unexpire account

  • expire account

  • List:

    • accounts

    • attributes

    • groups

    • members

    • computer objects

For a full list and explanation of each connector operation, see Connector operations.

When Bravura Identity is installed, the connector can be configured with the nrsmb or nrcifs program to:

  • List network resources

  • List permissions for each network resource

  • List the owners of a network resource

  • Add or delete owners for a network resource

  • List the ACLs on a directory or share

The connector is called by the Transaction Monitor Service (idtm). When Bravura Identity is installed, the connector is run by the View and update profile (IDR) module whenever users view resource details or manage group owners.

The following sections show you how to:

  • Define an account for the target system administrator in Active Directory

  • Create a delegated ID and modify the AdminSDHolder object.

  • Enable SSL connections

  • Create template accounts in Active Directory

  • Set the Active Directory target system address in Bravura Security Fabric

Set up Active Directory so that network resources can be managed in Bravura Identity

This chapter also describes how Bravura Security Fabric handles special attributes used when creating or modifying accounts on an Active Directory target.

See also