Companies maintain a store of users and their details. EMM provides a mechanism to either create a store of users in EMM
The Local Directory is available by default within EMM. It is a directory of all users created on EMM only by using the Add User. Local users are stored in EMM database.
ADs are external sources of users. Active Directories are
Important: As an administrator, you must have the appropriate permissions to configure multiple Active Directory instances.
Once you have logged into the Management Console, from the left pane, click the Authentication Settings under the Settings. The Authentication Settings page appears with a list of Directories configured within EMM. You can search ADs.
The Directory List view displays the following columns:
Column | Description |
---|---|
Domain | Displays the list of AD domains. |
Directory Type | Displays the directory type of the AD. |
Host or IP Address | Displays the list of host names or IP addresses. |
Port | Displays the port numbers of the Active Directory Servers. |
Created By | Displays the name of the administrator who created the configured Active Directory Servers. |
Created On | Displays the date and time details of when Active Directory Servers configured. |
Information Icon | Displays the number of users and groups imported from the Active Directory when you click on the information icon. If no users or groups are imported from a Directory, the information icon turns into a check box. If you want to delete an Active Directory, you must select the desired check box and then click the Delete button. |
Delete button | Deletes the selected Active Directory from the database. The Delete button dims because it is not available until a check boxes is selected. |
You can navigate the list view through the Previous and the Next buttons.
Active directories help ensure that only authenticated users and computers can access the network. These upcoming sections will help you learn more about managing your network resources:
The Authentication Settings page is used to configure communication between EMM database and an AD. The EMM Console uses database to fetch employee details, to provide user authentication, and to update and synchronize users.
Once you have logged into the Management Console, under Settings from the left pane, click Authentication Settings. The Directory List page appears. Click the +New Directory button. The Authentication Settings page appears with directory list. Click on any of the directory, the Directory Details page appears with two tabs: Configuration and Synchronization.
There are two types of ADs can be configured:
A Forest AD can have multiple sub-domains under the same. A No Forest AD on the other hand has only one domain associated with it.
To configure the ADs, follow these steps:
The system displays the Root Domain and the Root IP Address fields.
Following are the three types of groups of Forest ADs:
In case of Forest AD configuration, not all Groups can be imported (with User association in tact). Only Universal Groups can be imported from sub-domains. From root domain, all Groups can be imported.
Important: Do not add sub-domains of a Forest as a separate directory. While synchronizing Users and Groups, if common Users and Groups are found, it may result in erratic behavior.
If directory type is Forest AD, follow these steps:
Or
If directory type is No Forest AD, follow these steps:
Note: If you are configuring AD for Management Cloud, you need to configure a secure VPN for Cloud. To configure an AD with a Secured VPN for Cloud, refer to Secured VPN for Cloud.
Refer to the Note at Require Secure Connection field for default and recommended ports. You may choose to provide your own ports.
A Domain Context is a client-side representation of a domain service, providing access to all the functionality of the service.
For No Forest, if no context is specified, the system searches all Users from the root of AD by default. If you want Users to be searched from a specific node of the AD, specify the context. All searches shall happen form this context only.
For Forest, the Context field is used for Test Connection only. It is a non-mandatory field. If unspecified, the default context is the root domain. All live searches (non-test connection) happen from the root domain only.
Directory Type | If Secure LDAP = No | If Secure LDAP = Yes |
---|---|---|
No Forest | 389 | 636 |
Forest | 3268 | 3269 |
Click the Save button.
Save status message appears.
Important: In this application, wherever passwords need to be provided, some browsers may ask to Remember Password. Opt for Never as it is irrelevant. Your enterprise passwords should not be remembered
Once communication with ADs are configured, admin can configure synchronization of ADs based on time, days or weekly basis to get the latest information of Users or any newly added Users.
Synchronization can be done in one two ways:
To configure the synchronization, follow these steps:
The Calendar appears.
The selected Date and Time appears in the field.
Note: If an already
Note: If a sync job in progress, the Sync All and the Sync Imported buttons will be inactive.
Last Directory Sync Start Time: Displays the last Directory sync when started.
Last Directory Sync Completed Time: Displays the last Directory sync when completed.
Next Directory Sync Start Time: Displays the next Directory sync when scheduled.
You can search desired AD through the available search filters. You can apply a single or a combination of search filters to define the search criteria and get the refined outcome.
The Admin can click on the one of the table headers. Based on the sorted element, the system sorts the entire directory list to either ascending or descending order. The system displays an indicator to show if the sort is in ascending or descending order.
If the sort is in ascending order, the sort order is Numeric [0-9], Alphabetic [a-z, A-Z], Special characters.
Admin can also manually sort on the basis of all columns.
Admin can enter text in the text fields to filter the column. The text must be at the beginning of each word of the column entry.
The system will filter all elements of the column based on the search term present in the column.
For example, If Admin types "Herm" or "herm", and presses the Enter key, then the system displays all directory names that contain herm. For example, Herman Melville, Herman Schultz, Kermit Hermit and Sherman.
The following columns have textual filters:
An administrator can filter data by one of the following options:
Filter | Description |
---|---|
Created By:
|
The server only displays those directories (rows) that have the filtered entity.
Filters can be applied for one or more columns. If filters are applied across multiple columns, the system performs AND condition between all filters.
|
Created On:
|
You can specify dates and time with the Created On filters. The filters represent data based on the following:
All the above ranges are non-overlapping and ensures that no results are double counted. |
From the Directory List page, you can view the details on how many users and groups are imported.
Note: When there are no users or groups imported from an Active Directory (AD), the information icon turns into a check box. To delete an AD, you select the desired check box and then click the Delete button.
To view the details, click the information icon next to Domain column. The system displays the details of users and groups imported from the AD.
You can click anywhere outside of the dialog to close it.
You may need to update an AD settings for specific reasons, for example, you may need to update a port number or its search base.
From the Directory List page, click one of the AD in the Domain column.
The Directory Settings page appears.
The desired fields can be updated. There are no restrictions. Once an AD is updated, it must be saved again to come into effect.
To delete an Active Directory, imported Users and Groups of the active directory should be deleted first. To delete all users and groups from an active directory, an admin can either use the bulk action feature from the Users and Groups pages or the admin can use the Purge button on the pop-up box after clicking the Information icon. Following either action, when no more users or groups from a particular AD have been imported into EMM, the Information icon changes into a checkbox and the AD can be deleted.
Note: When there are no Users and Groups imported from that AD, only then the Information icon turns into a check box.
To delete a Directory, follow these steps:
The system displays Delete Directory Confirmation Message: "The chosen Directories shall be removed from the Directory list. Are you sure you want to do this?"
Kony Management suite helps you to delegate Enterprise Store user authentication to Kony Fabric Identity service. Kony Fabric Identity service is part of Kony Fabric that validates users accounts and applications for authentication and authorization.
Kony Management suite allows administrators to configure Kony Fabric Identity service. Kony Management suite supports Kony Fabric Identity service as an alternative authentication mechanism only for the Kony Management Enterprise Store log-in.
Support is not provided for the following authentication scenarios.
Users authenticated through Kony Fabric Identity service are mapped to existing users in Kony Management. If a Kony Fabric Identity service user does not exist in Kony Management server, the user is created in Kony Management Suite. When you set the Kony Fabric Identity service authentication for the enterprise store, based on your Kony Fabric Identity service provider configured, you will be redirected to your Kony Fabric Identity service authentication page
The following are the identity providers supported by Kony Fabric Identity Service in Kony Management Suite:
Important: Kony Fabric Identity service is supported only for iOS and Android devices.
Kony Fabric Identity tab displays the following:
Kony Fabric Identity Configuration
Note: For iOS, multiple SSO groups are not supported.
Note: If a child app exists before configuring Kony Fabric identity service settings, the child app must be re-wrapped.
Note: When a child app is re-wrapped, the entitlement.plist file is overwritten, and some features (for example, In app purchase) may not work.
Note: While using OAuth 2.0 for SSO, if you click on Forgot Password button and then return to the Login page to log in, you cannot log in to the Enterprise store. You need to kill the Enterprise store on your device and relaunch it.
Note: If you change AppKey, AppSecret, and Use SSO settings, for iOS and Android platforms, wrapping will be triggered for Enterprise Stores.
To configure Kony Fabric Identity settings, do the following:
For more information on Kony Fabric Identity service, click here.
For more information on Kony Fabric Identity App Key, App secret, and Service Doc, click here.
Rev | Author | Edits |
4.1 | PK | PK |
4.2 | PK | PK |
Copyright © 2018 Kony, Inc. All rights reserved. |