Manage Active Directory role mapping
- Updated: 2023/03/15
Manage Active Directory role mapping
An administrator or a user with permission to view and manage roles can view the details of the available Active Directory role mappings.
Prerequisites
Ensure that you are logged in to the Control Room as the administrator.
By default, the Control Room will retrieve all security groups from the Users directory.
To create role mappings with filters for the Users directory along with other organizational units (OU), you must update the um.properties file. In the Control Room, the Users directory is considered similar to the OUs. Therefore, you must define the filter in the um.properties file.
um.ldap.groupmapping.domain.filter='mydomain.com:OU1&groupFilter|OU2&groupFilter|Users&groupFilter'
- Go to domain mydomain.com
- Retrieve all security groups from Organization Unit OU1 that have the group name starts with groupFilter.
- Retrieve all security groups from Organization Unit OU2 that have the group name starts with groupFilter.
- Retrieve all security groups from Users directory that have the group name starts with groupFilter.
This setting ensures that the users from the organization units OU1
and OU2
will be retrieved in addition to the
Users directory.
The filters defined in the um.properties file are stored in the database. When you update to a newer version of the Control Room, the Control Room references the filters stored in the database because the default um.properties file that comes with the installation will not contain these filters. If you define new filters in the default um.properties file, the Control Room references the filters defined in the um.properties file and overwrites the ones stored in the database.
Multiple Domain Mapping
Mapping supports multiple domains separated by a coma.
um.ldap.groupmapping.domain.filter='mydomain.com:OU1&groupFilter|OU2&groupFilter|Users&groupFilter,mydomain2.com:OU3|OU4'
- Go to domain mydomain2.com
- Retrieve all security groups from Organization Unit OU3.
- Retrieve all security groups from Organization Unit OU4.
Retrieving security groups from nested OUs
Example for retrieving security groups from nested OUs.
In the following example organization, consider "Marketing" as the parent OU with additional nested OUs and security groups located in each of these nested OUs.
- Marketing
- Group 1
- Group 2
- US_OU
- Group 3
- California_OU
- Group 4
- NoCal_OU
- Group 5
- SoCal_OU
- Group 6
um.ldap.groupmapping.domain.filter='mydomain.com:Marketing'
Active Directory role mapping
Navigate to Control Room. You can view or edit the role mappings. You can also create new role mappings or restart the role synchronization process between the Control Room and Active Directory.
and the page displays any role mappings that are created in theWhen enabled, this synchronization process is triggered once a day (1440 minutes) by default. You can trigger synchronizations in any interval by changing the number of minutes. We recommend that you set the interval settings larger than the default.
- You should set the interval settings larger then the default setting of 1440 minutes.
- The synchronization process mappings and users is process intensive. We recommend that you maintain a short list of groups and assign specific users to each of these groups on the Active Directory so that you can avoid any scalability issues.
- Do not use both Import and Do not import mappings in the same system because it may complicate use cases and make troubleshooting more difficult to correct any issues.
- If both Import and Do not
import mappings are defined and a user is included in
both mappings, then the Import mappings take
precedence over the Do not import mappings.
Consider these examples:
- AD Mapping A = Role A – Group A – Import users from this group into Automation 360
- AD Mapping B = Role B – Group B – Do not import users from this group
Where user D is included in both Groups A and B within Active Directory.
User D will be created in Automation 360 and will be assigned Role A.
- AD Mapping A = Role A – Group A – Import users from this group into Automation 360
- AD Mapping B = Role B – Group B – Do not import users from this group
- AD Mapping C = Role C – Group C – Import users from this group into Automation 360
Where user D is included in Groups A, B, and C in Active Directory (AD).
User D will be created in Automation 360 and will be assigned to Role A and Role C.
- Development
- Runtime
- AttendedRuntime
- CitizenDeveloper
You can change the default device license by adding the preferred keyword as a new entry in the um.properties file.
Keywords | License |
---|---|
Development | Bot Creator |
Runtime | Unattended Bot Runner |
AttendedRuntime | Attended Bot Runner |
CitizenDeveloper | Citizen Developer |
If a user is mapped to multiple mappings and the mappings have the same device license for different auto-login options (enable or disable), then the auto-login configuration will override the settings. As a result, we recommend that you keep the auto-login option consistent across all the mappings for the same device licenses.
um.ldap.groupmapping.sync.on.get.mappings=true
. Validation of
role mappings occurs when you sync the role mappings between the Active Directory and the Control Room.You can run automations either on the device which is set as your bot running device or from a device pool for which you have consumer privileges (Create a user ). When using Active Directory role mapping, if you want any mapped Active Directory user to be able to use more than one device, you must configure a device pool (Create device pools).