Skip to main content

Agents

Description

Soffid agents are the tool that allows the connection between the Soffid console and the target systems. To establish the connection with target systems, Soffid provides a large number of connectors that will be able to set up into the Soffid console.

You could see the complete list of Synchronization Server Connectors

Soffid administrator has the chance to easily customize attribute mappings for some connectors addons, without having to code it using Java. Soffid provides a graphical interface to perform attribute mapping.

An agent will appear disabled when this agent won't have a server assigned. Bear in mind to select the “Disabled” flag on Server URL criteria when you will query if you want to search for disabled, but defined agents.

Related objects

  1. Synchronization server
  2. Account naming rules
  3. User type
  4. Password policies

Standard attributes

Basic

  • Task engine mode: shows the current task engine configuration. For more information visit the Smart engine settings page.
  • Name: agent's identifying name.
  • Description: a brief description of the agent.
  • Type: identifies the connector type to use. Different implementations of the server plugins are included in the connectors installed into Soffid. Each type has a Java class bound, the name of the Java class implementing the connector is displayed next to the connector name.
  • Server: synchronization will be performed with the selected server. It is allowed to select two servers in cases high disponibility will be necessary. If you choose two servers, when one fails, the other will be used.
    • If “Each main synchronization server” is selected, the agent will be run by every sync server.
    • If "-disabled-" is selected, the agent will be disabled. 
    • If you select a single sync-server, the agent only will be run on that server.
  • Shared Thread: if it is enabled, the same thread will be shared to several synchronization servers. 
  • Dedicated Thread: if "Shared thread" is disabled, it will be available the option to choose the number of threads to dedicate to the synchronization process.
  • Task timeout (ms): add a timeout to the synchronization server tasks (query, insert, update, delete, update password, etc). If you add a timeout, when the connection gets this timeout, the synchronization server will stop the request and add it to the queue for a new retry later.
  • Long task timeout (ms): add a timeout to the reconciliation server tasks (user, group, role, account, grants, etc). If you add a timeout, when the connection gets this timeout, the synchronization server will stop the request (no retry is added).
  • Trust passwords: check if you can trust it to propagate their passwords to Soffid. Trusted password agents differ from the non-trusted ones in:
    • Temporary passwords generated from the console only propagate to agents that have trusted passwords checked. In the other case, the agents only receive definitive passwords.

    • When a password has reached its expiry date, it will automatically be disabled on agents where the trusted password is not checked, so the user can no longer access it.

    • When the managed system detects a change in the user request password, the password will be propagated to Soffid only if the agent associated trusted password is checked.

  • If you want to forward the authentication requests to trusted target systems, you must enable the Trust passwords option and the proper feature on the Authentication page.
  • Authoritative identity source: check if the agent will be used as the source for users' information. It is usually checked for the first load of users into Soffid, and then it is unchecked, being Soffid that manages users. Optionally, you can select a custom workflow to process incoming changes. 
  • Read-only: if it is checked, no change will be applied to the managed system. Only read operations will be allowed.
  • Manual account creation:
    • If you check NO, Soffid will create the new user accounts applying the defined policies.
    • Check YES if you don't want Soffid to create automatically new accounts for the users.
  • Role-based: when "Manual account creation" is not checked (option selected is No), it will show "Role-based". Check it if only users with any role on this agent should be created. When the identity or account loses its permissions, the account will be disabled. Uncheck to allow users with no role on it.
  • Groups: when "Manual account creation" is not checked (option selected is No), it will show "Groups". Identify the business units that are allowed to have an account on this system.
  • User domain: it is the rule used to determine how to generate account names.  If the account name is the same as the user name (as is normally the case), the “Default user domain” should be used. The user domain values are defined on the Account naming rules page.
  • Password domain: determines the password policies that will be used. If the "Default password domain" is selected, Soffid passwords will be shared with the managed systems. The user domain values are defined on the Password policies page.
  • User Type: when "Manual account creation" is not checked (option selected is No), it will show User Type. Only users of the selected types will be created. Any change made in this field involves all accounts to be recalculated. New ones will be added to the repository and managed systems. Some accounts will get disabled if the owner user no longer belongs to any authorized user type.

When uploading authoritative data for identities from a managed system, firstly, users will be created in Soffid as indicated in the attribute mapping, and secondly, accounts will be created for the managed systems only if the agent option "Manual account creation" is not checked and only for User Types indicate.

Connector parameters

The custom attributes depend on the used plugin. 

Here you will find all the information needed about the available Soffid connectors to integrate external managed systems.

  1. AWS Connector
  2. CSV Connector
  3. Google Apps Connector
  4. JSON REST Web Services Connector
  5. LDAP Connector
  6. Oracle Connector
  7. Oracle EBS Connector
  8. SAP Connector
  9. SCIM Connector
  10. Shell Connector
  11. SQL Connector
  12. Windows Connector
  13. Zarafa Connector

Integration flows

Some connector addons have associated integration workflows. On the Integration flows tab you can view the integration flows related to the agent. You also can view in detail the workflows and test them. 

Attribute mapping

The attribute mapping tab only appears when the agent allows such customization. Soffid administrators have the chance to easily customize attribute mappings without having to code them using Java. The administrator users can select system objects and the Soffid objects related, manage their attributes, and make either inbound and outbound attribute mappings.

There is an action that creates all the default mapping depending on the agent connector type. That option creates automatically system objects with their attributes and properties, you can select it by clicking on the hamburger icon and then the Create default mapping option . Once created the default mapping, those can be customized as required. 

Properties

Some agents require to configure some custom attributes in their properties section.

These properties are specific for each type of connector. You could see all these properties visiting each connector type page.

Methods

This option is only available on some types of connectors. It is used to define methods that can be called using the defined properties.

Attributes

Each object mapping defines an agent object name and one bound Soffid object type.

The left hand side attributes are managed system attributes, so they are agent dependent that is being configured. The right side attributes are Soffid attributes and must be selected from an existing list. 

It is allowed to use bean Shell expression in the source when the mapping is one-way.

System attributes

A configuration agent must define objects types that can be created on it. Each object mapping defines an agent object name and needs bound Soffid object type.

At this column, the system's attribute name will be displayed.

Directions

At the center column, an arrow will show the direction the information flows.

When the information flows from the system (left), to Soffid (right), the left column name can be replaced by a bean shell expression. This expression will be evaluated on the system object prior to uploading it to Soffid.

When the information flows from Soffid (right) to the managed system (left), the right column can contain a bean shell expression that will be evaluated prior to provisioning the user.

Here are some examples:

System attribute Direction Soffid attribute Meaning

cn

<=>

accountName

The account name is the CN attribute of the LDAP

departmentNumber

<=

for (group: secondaryGroups) {
  if  (group.get("name").equals(primaryGroup)) {
    return group.get("description");
  }
}
return null;

Assigns the group description of the primary group to the departmentNumber attribute

baseDN

=>

"ou="+primaryGroup+",dc=soffid,dc=org"

Assigns the base dn of the user to the proper organization unit that is below dc=soffd,dc=org.

Soffid attributes

You can consult the list of Soffid attributes:

When evaluatting any expression, either the system or soffid attributes are available as script variables. More over, the following variables are available:

Variable Content

serverService

Server API that enables an easy object query [ Search the link "Public API Module" or "Data & Service model" ]

serviceLocator

Spring Singleton that gets access to any published service bean. Only availble on main syncserver

remoteServiceLocator

Singleton that gets access to any remote published service bean.

THIS

HashMap that contains any soffid or system managed attribute. It can be used when the attribute name is not a valid java identifier.

dispatcherService

Service that allows the script to get or update information in target system.

Test

For the definition of an object, you can check the system attributes defined, in both the final system and in Soffid.

1. First of all, you need to click the Test button, then Soffid will display a text field and some buttons to perform new actions.

2. Secondly, the text field must be filled in with the appropriate data. It can be a user, an account, a group or another system object. It depends on the system object you are checking.

3. Then, you can choose the action to perform.

Text expression: allows you to test a system object.

Synchornize now: allows you to synchronize the data object to the target system.

Fetch system raw data: brings the data of an object from a target system.

Fetch Soffid object: brings the data of a specific system object with processed data to update into Soffid

Triggers

It is allowed to define BeanShell scripts that will be triggered when data is loaded into the target system (outgoing triggers). 

The trigger result will be a boolean value, true to continue or false to stop.

A configuration agent can configure triggers related to the operation to be performed. There are different trigger type, that determines the specific moment on which the script will be triggered.

    Triggers can be used to validate or perform a specific action just before performing an operation or just after performing an operation intoon target objects. 

    To access to Soffid data, you can use source{"attributeName"}, thatwhich recoverrecovers the value of the attributeName. That object will be Soffid format.

    Also you can use newObject{"attributeName"} to create the new value  or oldObject{"attributeName"} to get the old value of the target system, those objects will be target system format.

    Trigger

    preInsert

    It will be triggered just before the insert action. It will be used to validate or prevent the insert action, and also to prepare objects or actions when a new object will be inserted

    preUpdate

    It will be triggered just before the update action. It will be used to validate or prevent update an object.

    preDelete

    It will be triggered just before the delete action. It will be used to validate or prevent delete an object.

    postInsert

    It will be triggered just after the insert action. It will be used to trigger or prevent an action.

    postUpdate

    It will be triggered just after the update action. It will be used to trigger or prevent an action.

    postDelete

    It will be triggered just after the delete action. It will be used to trigger or prevent an action.

    Example 1

    Get the attribute company option 1:

    company = source{"attributes"}{"company"};

    Get the attribute company option 2

    userName = source{"userName"};
    attributes = serviceLocator.getUserService().findUserAttributes(userName);
    company = attributes.get("company");
    Example 2
    role = serviceLocator.getAplicacioService ().findRoleByNameAndSystem ( "Domain Users", "AcitveDirectory");
    rg = new java.util.HashMap();
    rg.put ("grantedRoleId", role.getId ());
    
    list = new java.util.LinkedList ();
    list.add (rg);
    newObject{"ownedRoles"} = list;
    
    return newObject{"name"} != null
    Example 3
    if (oldObject.get("userPrincipalName") != null)   {
    	newObject.remove("userPrincipalName");   
        newObject.put("groupType", oldObject{"groupType"});
    }

    For more examples you can visit the Incoming Triggers examples page.

    Load triggers

    On the Load trigger tab, it is allowed to set up a specific configuration for the agent and define BeanShell scripts that will be triggered when data is loaded into Soffid (incoming triggers).

    • Full reconciliation: switch off to enable incremental load process and disable Soffid object removal.
    • Propagate changes: switch off to prevent sync-server to create synchronization tasks after loading incoming changes.

    To add a new trigger, it is mandatory first of all, to select a Soffid object on which the action will be performed. Then to select the trigger, that determines the moment on which the script will be triggered. Finally to define the BeanShell script that will be executed. The available objects are the following:

    • User
    • Account
    • Group
    • Role
    • Grant

    Triggers can be used to validate or perform a specific action just before performing an operation or just after performing an operation into Soffid objects. The trigger result will be a boolean value, true to continue or false to stop.

    In a Load Trigger, it is not possible access to mapping definitions configured on the attribute mapping tab. It will be necessary to use newObject{"attributeName"} to get the new value, or oldObject{"attributeName"} to get the old value. Those objects will be Soffid format.

    For more info about the Soffid format you can visit the Soffid Objects page.

    Trigger

    preInsert

    It will be triggered just before the insert action. It will be used to validate or prevent the insert action.

    preUpdate

    It will be triggered just before the update action. It will be used to validate or prevent update an object.

    preDelete

    It will be triggered just before the delete action. It will be used to validate or prevent delete an object.

    postInsert

    It will be triggered just after the insert action. It will be used to trigger or prevent an action.

    postUpdate

    It will be triggered just after the update action. It will be used to trigger or prevent an action.

    postDelete

    It will be triggered just after the delete action. It will be used to trigger or prevent an action.

    Example 1
    userName = newObject {"userName"};
    system = "ActiveDirectory";
    
    accounts = serviceLocator.getAccountService()
      .findAccountByJsonQuery("(system eq \"" + system + "\") AND name eq \"" + userName + "\" AND (type eq \"I\")");
    .....
    user = serviceLocator.getUserService().findUserByUserName(userName);
    .......
    Example 2
    ...........
    if (isFound) {
      newObject{"id-indicator"} = "1";
    } else {
      if (contFalse > 0) {
        newObject{"id-indicator"} = "0"; 
      } else if (contNull > 0) {
        newObject{"id-indicator"} =  null;
      } 
    } 
    

    For more examples, you can visit the Outgoing Triggers examples page.

    Massive actions

    Provisioning all users on to managed systems

    One of the main features in identity and access management (IAM) is automated user provisioning.  User provisioning is the process that ensures the users are created, with proper permissions, updated, disabled, or deleted on to managed systems.

    All managed systems must have an agent configuration, which will determine the way to perform the provisioning.

    Soffid shows information about the last time that the option was run and a report with the details. You can access to the report by clicking the verification icon (✓).

    Propagate groups to agent

    This option allows pushing to the managed system all the defined groups in Soffid. 

    Soffid shows information about the last time that option was run and a report with the details. You can access to the report by clicking the verification icon (✓).

    Reconcile (load target system objects)

    The main purpose of reconciling process is to provide a mechanism to ensure that all users are aligned on the specific roles and responsibilities. Reconcile process discovers new, changed, deleted, or orphaned accounts to determine user access privileges.

    Not every system connector has the capabilities needed to execute the reconcile process.

    When "Read only" property, in Basic parameters, is checked (selected value is Yes), the reconcile process only considers unmanaged accounts. 

    Soffid shows information about the last time that the option was run and a report with the details. You can access to the report by clicking the verification icon (✓).

    Load authoritative data for identities and groups

    Identities use to live on authoritative identity sources and they do in Soffid as well. Each identity may have any number of accounts on each managed system.

    When "Authoritative identity source" is checked (option selected is Yes) Soffid will show the option that allows load authoritative data for identities and groups. 

    That option performs the operations to load data of groups and data of identities from the managed system into Soffid,  following the rules configured in the agent.

    Soffid shows information about the last time that the option was run and a report with the details. You can access to the report by clicking the verification icon (✓).

    Also, Soffid create a parameter on the Soffid parameters page, with the information about the version of the data. If you need to perform the load authoritative action, it will be mandatory delete this parameter before perfom the action.

    Generate target system potential impact

    That option allows you to generate a report with all the potencial changes that would be perform on the manged system with the current agent configuration

    If that option was perform previously, Soffid will show information about the last time that the option was run and the report with the potential impact. You can access to the report by clicking the verification icon (✓).

    Account metadata

    Agents allow you to create additional data, on the "Account metadata" tab, to customize the accounts created for that agent. This additional information will be loaded with the agent's information, or calculated as defined in the mappings.
    The additional data can be used in both mappings and triggers.

    To get the Account Metadata value , or to put value, you need to use accountAttributes{"ATT_NAME"}

    Standard attributes

    • Code: short name used by scripts and connectors to access the underlying information. It is suggested to use short names without blanks or special characters to make it easier to use.
    • Label: text displayed just beside the attribute value. It is advised to use short descriptions in order to keep the screen cleaner.
    • Data type: The attributes can have different data types
    • Prevent duplicated values: mark this field as a unique key for the object type. There is no chance of two objects with the same attribute value. Soffid smart engine will avoid the creation of duplicated objects.
    • Multiple values: some attributes can contain multiple values for the same object. For instance, an attribute containing the languages a user can speak can be multi-valued, as a user can speak multiple languages.
    • Maximum number of rows to display: when an attribute is multivalued, the screen size can grow a lot. To prevent such a big form, the system will only display a maximum number of values, and a scroll bar will appear to browse through the attribute values.
    • Size: primarily for string attributes, specify the maximum length in characters of the attribute value.
    • Values: primarily for string attributes, you can specify the allowed values for the attribute. Then, the text box that the user has to fill in the data will be replaced by a drop-down list.
    • Visibility expression: write an optional BeanShell expression to check if the field should be displayed or not. The expression should return true or false. The following variables are exposed to the expression:
      • ownerObject: current object owning the attribute.

      • value: current attribute value.

      • requentContext: tip about the screen using the attribute.

      • inputField: the ZK input object (ZK Framework).

      • inputFields: a map to get access to any other ZK input object (ZK Framework).

      • serviceLocator: locator to use any Soffid engine microservice.

    • Validation expression: write an optional BeanShell expression to check if the field value is acceptable or not. The expression should return true if the value is acceptable. If the expression returns false or any other object, a warning message will be displayed. When the expression returns a string value, the return value will be considered the warning message to present to the end-user. The following variables are exposed to the expression: 
      • ownerObject: current object owning the attribute
      • value: current value to evaluate.
      • requentContext: tip about the screen using the attribute
      • inputField: the ZK input object (ZK Framework).
      • inputFields: a map to get access to any other ZK input object (ZK Framework).
      • serviceLocator: locator to use any Soffid engine microservice.
    • onLoad trigger:  write an optional BeanShell expression that will be executed just after preparing the user interface. The script can modify in any way the inputField object before it is displayed, but cannot modify other input fields.

      The following variables are exposed to the expression:

        • ownerObject: current object owning the attribute
        • value: current value to evaluate.
        • requentContext: tip about the screen using the attribute
        • inputField: the ZK input object (ZK Framework).
        • inputFields: a map to get access to any other ZK input object (ZK Framework).
        • serviceLocator: locator to use any Soffid engine microservice.
    • onChange trigger: write an optional BeanShell expression that will be executed just after the user has changed the object value. The script can modify in any way the inputField object or any other input fields.

      The following variables are exposed to the expression:

          • ownerObject: current object owning the attribute.
          • value: current value to evaluate.
          • requentContext: tip about the screen using the attribute.
          • inputField: the ZK input object (ZK Framework).
          • inputFields: a map to get access to any other ZK input object (ZK Framework).
          • serviceLocator: locator to use any Soffid engine microservice.
      Example 1

      Into the attribute mappings save the value of an account metadata:

      varX <= accountAttributes{"att_name"}
      Example 2

      Get the value from the attribute account metada to use it into a trigger

      strValue = source.get("attributes").get("att_name");
      if (strValue != null) {
      	.....
      	.....
      } else {
      	.....
          .....
      }

      Actions

      Agents query actions

      Query

      Allows you to query roles through different search systems, Basic and Advanced.

      Add new

      Allows you to add a new agent in the system. You can choose that option on the hamburger menu or clicking the add button (+).

      To add a new role it will be mandatory to fill in the required fields

      Delete

      Allows you to remove one or more agents by selecting one or more records and next clicking the button with the subtraction symbol (-).

      To perform that action, Soffid will ask you for confirmation, you could confirm or cancel the operation.

      Download CSV file

      Allows you to download a CSV file with the basic information of all agents. 

      Agent detail actions

      Apply changes

      Allows you to create a new agent or to update an exist agent. To save the data it will be mandatory to fill in the required fields

      Delete

      Allows you to delete a specific agent. You can choose that option on the trash icon.

      To perform that action, Soffid will ask you for confirmation, you could confirm or cancel the operation.

      Undo

      Allows you to quit without applying any changes made.

      Import

      Allows you to upload a XML file with the attribute mapping data. This option delete previous attribute mappings and create new attribute mapping.

      Export

      Allows you to export  an XML file with attribute mappings.

      Create default mapping

      Allows you to create automatically default mappings for the specific Type selected.

      Test

      Check if there is a connection to the target system.

      Integration flows

      Open flow

      Opens a window with the workflow.

      Test

      Allows you to test the workflow.

      Attribute mapping

      Apply changes/Save

      Allows you to update the agent with the changes made on Attribute mappings.

      Add System Objects

      Allows you to add a new system object based on a Soffid object. You need to click the button with the add symbol (+) located at the end of the row of System Objects. Once you clic the button, Soffid add new fields to the form to add new attributes, properties and/or Triggers depend on the agent type.

      It is mandatory to apply changes clicking the diskete button to update the agent.

      Delete System Objects

      Allows you to delete a system object. You need to clic the button with the subtraction symbol (-) located at the end of the row system object which you want to delete.

      It is mandatory to apply changes clicking the diskete button to update the agent.

      Add Property

      Allows you to add properties to a specific system object. You need to click the button with the add symbol (+) located at the end of the row of Properties. Once you clic the button, Soffid add new fields to the form to add the propertie.

      It is mandatory to apply changes clicking the diskete button to update the agent.

      Delete Property

      Allows you to deletele properties from a specific system object. You need to clic the button with the subtraction symbol (-) located at the end of the row propertie which you want to delete.

      It is mandatory to apply changes clicking the diskete button to update the agent.

      Add System attribute

      Allows you to add attribute mappings to a specific system object. You need to click the button with the add symbol (+) located at the end of the row of System attribute. Once you clic the button, Soffid add new fields to the form to add the attribute.

      It is mandatory to apply changes clicking the diskete button to update the agent.

      Detele System attribute

      Allows you to delete attribute mappings of a specific system object. You need to clic the button with the subtraction symbol (-) located at the end of the row System attribute which you want to delete.

      It is mandatory to apply changes clicking the diskete button to update the agent.

      Test expression

      Allows you to test a system object. When you click that option, Soffif will show you new fields and operation to test the system attribute config.

      Synchronize now

      Allows you to synchronize a specific system object to the target system.

      Fetch system raw data

      Brings the data of a specific system object from a target system.

      Fetch Soffid object

      Brings the data of a specific system object with processed data to update into Soffid

      Add Trigger

      Allows you to add a trigger to a specific system object that will be executed when data is loaded into a target system. You need to click the button with the add symbol (+) located at the end of the row of Trigger. Once you clic the button, Soffid add new fields to the form to add the trigger.

      It is mandatory to apply changes clicking the diskete button to update the agent.

      Delete Trigger

      Allows you to delete a trigger of a specific system object. You need to clic the button with the subtraction symbol (-) located at the end of the row Trigger which you want to delete.

      It is mandatory to apply changes clicking the diskete button to update the agent.

      Load triggers

      Apply changes

      Allows you to update the Load trigger data with the changes made on Load Trigger

      Add Trigger

      Allows you to add a trigger that will be executed when data is loaded into Soffid.

      You need to click the button with the add symbol (+) located at the end of the row. Once you clic the button, Soffid add new fields to the form to add the trigger. Then you need to select the Object and the type of trigger, and write the customize script.

      Finally yo need to apply changes to update the agent.

      Delete Trigger

      Allows you to delete a trigger. You need to clic the button with the subtraction symbol (-) located at the end of the row which you want to delete.

      It is mandatory to apply changes clicking the diskete button to update the agent.

      Massive actions

      Provisioning all users on to managed systems

      Run the process to ensure the users are created, with proper permissions, updated, disabled, or deleted on to managed systems.

      Propagate groups to agent

      Run the process to push all the groups of Soffid into the managed system.

      Reconcile (load target system objects)

      Run the process to discover new, changed, deleted, or orphaned accounts to determine user access privileges.

      Load authoritative data for identities and groups

      Run the process to load data of groups and data of identities from the managed system into Soffid

      Generate target system potential impact

      Generate a report with all the potencial changes that would be perform on the manged system.

      Account metadata

      Add account metadata

      Allows you to update the agent with the changes made on metadata.

      Add account metadata

      Allows you to add account metadata. You need to click the button with the add symbol (+) located at the end of the row. Once you clic the button, Soffid shows you an empty form to fill in with the new account metada.

      Finally yo need to apply changes.

      Delete account metadata

      Allows you to delete one account metadata. Fist, you need to click on the account metadata which you want to delete. Then Soffid show a form with the detail account metada. On the hamburger icon of that form, you can find the delete action. 

      In this case Soffid will not ask you for confirmation to delete.



      Scripting

      In the agents configuration it may be possible to use scripting to include logic in the attribute mappings and in the trigger scripts.

      In the attribute mapping, if you use a script on one side, it will be mandatory a single direction to the other side:

      • System attribute <= script
      • script => Soffid attribute

      Below an easy script to send a full name to the system:

      system attribute <= return firstName + lastName;

      Below a more complex script to create a main domain if it doesn't exist in Soffid:

      String mailDomain = null;
      if (email != void && email != null && email.contains("@")) {
          String[] mailTokens = email.split("@");
          mailDomain = mailTokens[1];
      }
      com.soffid.iam.service.MailListsService service = com.soffid.iam.ServiceLocator.instance().getMailListsService();
      com.soffid.iam.api.MailDomain domain = service.findMailDomainByName(mailDomain);
      if (domain==null) {
          domain = new com.soffid.iam.api.MailDomain();
          domain.setCode(mailDomain);
          domain.setDescription(mailDomain);
          domain.setObsolete(new Boolean(false));
          domain = service.create(domain);
      }
      return mailDomain;
       
      => mailDomain

      ou could find a set of sample scripts: Sample scripts

      You could find a link with the SCIM Query Language used in some methods as findUserByJsonQuery("query"). You can visit the SCIM chapter.

      Below you could find a set of custom utility classes: Utility classes


      More information

      Password synchronization

      The passwords a user has on an agent will be synchronized with any other "single user account" the user has on this agent. Shared accounts will never get its password synchronized.

      Password in an agent will be also synchronized with any other account the user has on other agents that are sharing the same password domain.

      The password change can be produced by an operator using the Soffid console, the user itself using the Soffid Self Service portal, or a timed automatic task. Furthermore, some managed systems can forward their password to Soffid in order to get them synchronized. In order to accept this password changes coming from managed systems, the trusted passwords box must be checked for the source agent.

      Mind that this is the flow for normal user passwords. Temporary passwords generated by the Soffid console will only be sent to agents marked as trusted. Agents not checked as trusted will have a random new password instead. Later, when the user changes the password on Soffid or any trusted system, the new password will be notified to Soffid by the managed system, and every agent on the same password domain will actually get the new password.

      Agents account management

      The agent configuration sets the way accounts are created and disabled.

      Whenever a user is modified, the following rules will be applied to check if the user should have or not an account on this agent:

      1. The user type is checked against valid user types.
      2. If there is a business unit or group bound to the agent, the user membership will be assessed.
      3. If the role based box is checked, the system will verify if the user has any role or entitlement assigned on this agent.

      If the user does not apply for any of the conditions, every account the user has at this agent will be changed to Disabled status.

      If the user verifies every one of the conditions, the user can have an account on this agent. Every account the user has at this agent will be changed to Enabled status.

      Unless the "Manual account creation" is checked, if the user can have an account on this agent, but it has no one, the account creation method will be invoked. To create it, Soffid will search for the user domain bound to this agent and will follow its configuration. If the user domain is configured with a script, this script will be executed and the result value will be accepted as the new account name. Mind that if the script returns a null value, no account can be created. 

      If the returning value from the script clashes with an existing account, the existing account will remain unchanged, unless the existing account is marked as an unmanaged account. In such a case, the account will be changed from unmanaged state to a single user.


      Operational

      Monitoring

      After the agent configuration you could check on the monitoring page if the service is running in the Synchronization Server, please go to:

      Main Menu > Administration > Monitoring and reporting > Syscserver monitoring

        Tasks

        Authoritative

        If you are checked "Authorized identity source", an automatic task to load identities from the managed system to Soffid is available, please go to:

        Main Menu > Administration > Monitoring and reporting > Scheduled tasks

        And you will something like "Import authoritative data from <AGENT_NAME>".

        image-1659012997074.png

        You can also run the Authoritative load from the Massive actions tab in the Agent

        image-1659013094703.png

        Reconcile

        If you are configured the "Attribute Mapping" tab with some of our objects: "user, account, role, group or grant", an automatic task to synchronize these objects from the managed system to Soffid is available, please go to:

        Main Menu > Administration > Monitoring and reporting > Scheduled tasks

        And you will do something like "Reconcile all accounts from <AGENT_NAME>".

        image-1659013025873.png

        You can also run the Reconcile from the Massive actions tab in the Agent

        image-1659013126808.png

        Synchronization

        Regarding the synchronization of the objects, there are two possible options:

        • If the "Read Only" attribute is checked in the "Basics" tab (select Yes option), only the changes in the managed systems will be updated in Soffid. We recommend these options until the global configuration of Soffid will be tested.
        • If the "Read Only" attribute is not checked in the "Basics" tab (select No option), all the changes in Soffid or the managed system will be updated in the other. Note that this synchronization must be configured in the "Basic" tab correctly.

        For more information about how you may configure the generic parameters of the agent, see the following link: Agents configuration