What access should be granted to the service account used by RSA Identity Governance & Lifecycle to fully support Active Directory collection and Access Fulfilment Express (AFX) fulfillment?
Originally Published: 2018-05-05
Article Number
Applies To
RSA Version/Condition: All
Issue
Find all of the the Collector and Connector datasheets (aka Application Guides) on RSA Link.
Resolution
"Domain Account Name Admin account name to use for the collection and provisioning activities
Login Distinguished Name Administrator login- id with write permission on required tree scope
Bind DN Distinguished Name of the user on AD permitted to search
the directory within the defined search base. E.g.
Domain\Administrator
To configure RSA Identity Governance and Lifecycle ADC to collect data from Domain2 using the Domain1 administrator: "
Hence, the account needs to be an administrator's account which by default has all privileges to fully support Active Directory collection and AFX fulfillment to Active Directory.
Related Articles
Grant a Trusted User Group Access to Agents 5Number of Views Request a Cloud Access Service Account 30Number of Views Active Directory AFX 'Disable/Enable an Account' connector capabilities do not update added parameters in RSA Identity Gov… 232Number of Views How to grant administrator access to a user in RSA Via Lifecycle and Governance 87Number of Views How to grant privileges to a user to edit one or more reports without providing Admin access in RSA Identity Governance an… 116Number of Views
Trending Articles
Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory Quick Setup Guide - Connect Authentication Manager to Cloud Authentication Service RSA Release Notes for RSA Authentication Manager 8.8 RSA Authentication Manager Patch Updates Downloading RSA Authentication Manager license files or RSA Software token seed records
Don't see what you're looking for?