AD Admin account to be disabled when employee quits

I have case where customer would like to disable AD Admin accounts when person is left.

There are currently lot of admin accounts created directly in AD, first we would need to map them to identity, but we don't want to update information / birth rights to them. We just would need to disable those accounts when person is left. Persons do also have another AD account which they use in daily life, but those admin accounts are used to sign shared servers etc.

What is the preferred way to handle this kind of  scenario?

Parents Reply
  • Open the mapping of the user. The mapping rule could have custom "Key resolution by reference"-property on the OneIM side. This should point to the base property UID_Person. Then you need to use some property as the search property. The search property is used to search the corresponding person from the person table. 

    Then you map this custom property with the property that gives the value for the search property from active directory. Here might be needed some parsing depending on which property used as the search property.

    Your goal is to use this mapping only for the administrative accounts. Therefore a condition is needed. It could be something like Right.cn like 'adm_%'.

    Then everything is set and synchronizing the environment will fill the UID_Person fields of the administrative accounts.

    I would not encourage the custom process option, because it is quite straightforward with the Synchronization editor.

Children