Microsoft Active Directory Integration App Installation

Guide Overview

The Microsoft Active Directory App allows administrators to integrate Incident IQ with a local AD server. This allows districts the ability to automatically populate and update user data in iiQ directly from their AD server.

The following guide is designed to provide step-by-step instructions on the following:

  • How to install the Microsoft AD App
  • Downloading the correct integration files and creating an AD user
  • Configuring the AD executable
  • Creating an automated scheduled task to sync user data

 

Guide Index

You can use the following links below to quickly navigate to a specific section in this document. To quickly return to this index simply use the Return to Index link located at the end of any section.

  1. Microsoft AD App Installation
  2. Creating an Active Directory User
  3. Configuring and Downloading the App Executable
  4. Creating a Scheduled Sync Task
  5. Mapping User Role and Locations

 

App Installation

Before beginning the installation process you will need to ensure you have the following:

  • Ability to create and edit user permission in your active directory.
  • A machine that runs .NET Framework v.4.5.1 or higher and also has network access to reach your district's AD server.

Begin by selecting Incident IQ Apps > Browse on the left navigation bar.

Browse_Apps.png

Click on the Microsoft Active Directory App (v2) and then select Install to begin.

Microsoft_AD_App_Install_1.png

Step one of the installation process simply provides an overview of how installing the Microsoft Active Directory app will affect your Incident IQ installation. Select Continue once you are ready to proceed to step two.

Microsoft_AD_App_Install_2.png

The first phase of step two will ask you to assign a default role for users that have not already been assigned a group mapping. By default, this is set to Guest unless otherwise changed. Once you have assigned the default role select Continue.

Microsoft_AD_App_Install_3.png

In the second phase of step two, you will be asked to assign a default location for users for users that have not already been assigned a group mapping. Once you have assigned the default location select Continue.

Microsoft_AD_App_Install_4.png

At this time you may make changes to any section by clicking on any of the checked settings. Click Continue when you are ready to proceed.

Microsoft_AD_App_Install_5.png

In step three, you will be asked to review all of the changes that are about to be made to your Incident IQ site. Before moving on please keep in mind that after the installation process begins it cannot be stopped. Once you have completed your review select Install App to begin the integration process.

Microsoft_AD_App_Install_6.png

Once the installation has been completed you can now begin creating an active directory user.

Microsoft_AD_App_Install_7.png

[Return to Index]

 

Creating an Active Directory User

Once you've installed the Microsoft AD app in Incident IQ, you will now need to create a new user in your Active Directory. This user will need the following roles assigned to it:

  • Replicating directory changes.
  • Replicating directory changes in filtered set.
  • Replicating directory changes all.
  • Read.

warning.pngImportant Note:You will need to complete this step before proceeding. If you are unfamiliar with how to grant these specific permissions to a user then please refer to the following Microsoft help guide on Giving Users Replicating Directory Changes Permissions.

[Return to Index]

 

Configuring and Downloading the App Executable

Now you will need to download the application for the AD-iiQ sync. This application will need to be downloaded on a machine that has network access to reach an AD server (you can run it on the AD server itself, but that's not a requirement). Additionally, the machine that runs the app will need to have the .NET framework v4.5.1 or higher.

You can download this file from the Microsoft Active Directory (v2) app in Incident IQ. To access this file, begin by selecting Incident IQ Apps > Manage on the left navigation bar.

Manage_Apps.png

On the Installed Apps tab, find Microsoft Active Directory (v2) and click on Manage.

Managing_AD_App.png

This will take you to the app Overview tab. From here, you will need to click on Enable User Login and Enable User Sync to enable the integration app. Once these have been enabled click Save.

Configuring_AD_00.png

Next, you will need to configure and then download the executable file. To do so, begin by clicking on the Sync Executable tab.

Configuring_AD_01.png

From here, you will need to input the following information to configure your executable download:

  • AD Username
  • AD Password
  • AD Domain
  • AD Server IP
  • Group OU Searches (Optional)
  • User OU Searchers (Optional)
  • Additional AD Attributes to copy (Optional)

Sync_Executable_Tab_001.png

Once you have completed entering your configuration information, click on Download Executable to download the connector app. Please note, you will want to download this connector app to a device that has access to your AD server and also runs overnight.

App_Configuration_007.png

After downloading the connector file, you will want to run a manual sync to test the connection as well as download user data to Incident IQ. To do this, run the IncidentIQ.Connectors.MicrosoftAd application (ignore the CONFIG File and PDB File in this case.) In the connector app window that appears, click Run now.

App_Configuration_008.png

If the app runs successfully, a data packet of user data will be sent to Incident IQ that can then be used to run a system sync.

[Return to Index]

 

Creating a Scheduled Sync Task

To schedule the sync to occur automatically, you'll need to create a task in Windows Task Manager. You can do so by searching for Administrative Tools and selecting Task Scheduler. This will open the Task Scheduler window.

Task_Scheduler_1.png

In the Task Scheduler window, start by clicking on Action > Create Basic Task...

Task_Scheduler_2.png

This will open the Create Basic Task Wizard. At the very least, you will need to provide a name for the new task. You can also add a task if desired. Once complete, click Next.

Task_Scheduler_3.png

In the next step, you will be asked to select when this task should Trigger. We recommend running it daily (overnight) for the most accurate user data. Please ensure you set the task to run regardless of whether a user is logged in or not on the server. Once complete, click Next.

Task_Scheduler_4.png

For the next step, you will need to specify what action the task will take when running. Select Start a Program and then click on Next.

Task_Scheduler_5.png

When specifying the action to perform, locate the file IncidentIQ.Connectors.MicrosoftAd.exe in the Program/script file browser. Supply the argument -usersync in the Add arguments field. And finally, you will need to indicate the path you unzipped the files to in the Start in field. Once complete, click Next.

Task_Scheduler_6.png

In the final step, you may review all of the settings of your task. Once you have completed your review, check the Open the Properties dialog for this task when I click Finish option and then click Finish.

mceclip2.png

In the properties pop-up window, begin by selecting Run whether user is logged on or not. Additionally, you will also need to check Run with highest privileges. Failure to check both of these options can prevent the connector from processing requests.

mceclip1.png

[Return to Index]

 

Mapping User Roles and Locations

At this point in time you will want to log back into the Incident IQ Microsoft Active Directory app to set your user roles and location mappings. These will indicate automatic role and location assignments for users during system syncs. You can find these settings in the Role Mappings and Location Mappings tabs.

You will want to immediately set a default Role and Location for users. These settings will act as fallback options in the event a user account does not match any custom mappings you set further down down in these tabs. We recommend using the following for these options:

  • Default Role: During your initial setup you will want to set this to Guest. Once all of your custom mappings have been completed and user roles verified, you will most likely want to then set this to No Access instead.
  • Default Role: You will want most likely want to either use the Central/District Office location for this, or create another specific location (such as Unassigned) for this.

Role_Mappings_001.png

Location_Mappings_Tab_001.png

When mapping to roles and locations, you may use groups, OU fragments, location name, or any combination of the three. Please note, you do not have to map locations and role by the same method.

Role_Mappings_002.png

Location_Mappings_Tab_002.png

The custom mappings section allows you to specify your user groups or OUs you wish to utilize for mapping users to their respective roles. Please note, when using OUs you will want to structure them in the same format as the examples below:

  • OU=Staff and Faculty
  • OU=Students
  • OU=IT Staff

Role_Mappings_003.png

Location_Mappings_Tab_003.png

[Return to Index]

Was this article helpful?
0 out of 0 found this helpful