I am a Zivver admin
Configure and manage Zivver
07a. Synctool LDAP sources
Introduction
LDAP sources are commonly used to create Zivver user accounts based on Microsoft Active Directory (AD) user accounts.
Synchronization is one-way: from AD to Zivver, not the other way around. You can determine which accounts are synchronized from AD to Zivver using filters. Filters can, for example, be an AD Organizational Unit (OU) or Security Group (SG).
It is not recommended to create Zivver user accounts for (suspended) AD user accounts that belong to an Exchange shared mailbox. See Configure Exchange sources to synchronize Exchange shared mailboxes with Zivver.
Source details
- Enter a Source name.
For example: “Microsoft Active Directory” or the Active Directory forest name. - Enter a Source description.
For example: the name of the administrator who configured this LDAP source. - Select a Default phone number region.
This allows the Synctool to easily recognize mobile phone numbers with a country code prefix.
Connection
These settings allow the Synctool to connect to a server that hosts your Active Directory.
Host name
This is the host name of the Domain Controller, for examplead.example.org, or the IP address of that server. This is a mandatory field.Port
This port will be used for the LDAP connection. Enter636and check Use implicit TLS. This is a mandatory field.Authorized user
Enter the username of the (service) account with read-only rights in Active Directory, as mentioned in the Synctool prerequisites. Usually, this must be provided along with the domain name — for examplecompany\svc_account. This is a mandatory field.Password
Enter the password for the service account. This is a mandatory field.Base DN
From your Active Directory, enter the distinguished name of the Organizational Unit that contains all your users. This is a mandatory field.Note
Choose a Base DN high in your AD forest
Users that are not in the OU entered at Base DN will not be synchronized to Zivver, despite applied filters. Conversely, Zivver accounts will be suspended or deleted in Zivver if they do not fall under the OU entered at Base DN.- Open Active Directory Users and Computers.
- Right-click the Active Directory Organizational Unit that contains all your users (i.e. the parent OU).
- Select Properties.
- Select the Attribute Editor tab.
In the Attribute Editor you can find the distinguished name. - Copy the distinguished name.
- In the Synctool, paste the distinguished name in Base DN.
Try choosing a Base DN higher in the AD domain hierarchy, such as
DC=company,DC=org. Don’t worry about getting too many results — you can filter them later.Paging
Increase paging to a value greater than1,000if the result set might contain more than1,000users.Tip
Still not finding all users in Data Preview?
Queries in AD without paging are limited to the first1,000users. When you enable paging in the Synctool, it retrieves multiple sets of the configured amount and displays them as one large set. If not all accounts are shown, gradually increase the paging number in steps of1,000until all users appear. You can increase the number up to100,000.
Read more about paging in AD.LDAP query (replaces the Base DN)
You can use LDAP queries to directly query Active Directory. Leave this field empty if you’re not familiar with LDAP queries.
For more information, visit Microsoft’s Wiki page for LDAP filters.Test connection
Click to verify that the Synctool can establish an LDAP connection with the configuration provided.
If the connection is refused, it means that the Synctool cannot connect to the AD server via LDAP using the supplied credentials. Common causes include:- The host name is incorrect.
The IP address can also be used instead of the FQDN. - The port entered is blocked by a firewall.
Try both636with Use implicit TLS enabled, and389with it disabled. - The authorized user does not have read permissions on this Active Directory.
- The authorized user requires or does not require the domain prefix.
Try bothcompany\svc_accountandsvc_account. - The password is incorrect.
Try entering the password again.
- The host name is incorrect.
Users
User Field Mapping (LDAP) maps Active Directory user attributes to Zivver user attributes, allowing Zivver users to be automatically generated based on the information provided from Active Directory.
For each Zivver attribute (in bold) in the Synctool, you can select an Active Directory attribute from the drop-down menu.
You can use the default AD attributes by clicking to quickly fill in the best-practice AD attributes.
Internal Id
- Default AD attribute:
objectGUID
Zivver uses the Internal ID to identify users. Microsoft AD’s objectGUID is a reliable identifier because it never changes, even if the user is renamed or moved. Using the Internal ID allows you to automatically update the user’s email address in Zivver when it changes in Exchange.
See Account Mapping for more information about the Internal ID.
- Default AD attribute:
proxyAddresses(SMTP)
Zivver accounts must have an email address as the username. proxyAddresses takes the primary email address (SMTP address) from the AD attribute proxyAddresses.
If you do not want to synchronize aliases to Zivver, or your organization does not use aliases, you can also use mail as the AD attribute. To do so, open the drop-down menu and select an alternate AD attribute.
Full name
- Default AD attribute:
name
The name of a user. This name is displayed in Zivver notification messages, so it is recommended to select an attribute that contains both the first and last name. Common alternatives include displayName, userPrincipalName, and givenName. Use one of these if name does not return the correct user name.
ZivverAccountKey
- Default AD attribute:
objectGUID
It is recommended to select an AD attribute with a long, random, and unique identifier as the value for the ZivverAccountKey. If no such identifier is available for every user in AD, use objectGUID instead.
Mobile phone
- Default AD attribute:
mobile
Mobile phone numbers are used to automatically configure 2FA via SMS for users who have a mobile number set in AD. Landline numbers should be avoided, as they often cannot receive SMS codes — meaning the user will be unable to log in when Zivver requests a second factor.
Is active
- Default AD attribute:
userAccountControl
The value in userAccountControl determines whether a Zivver account is created, suspended, or deleted. If an AD user is active and has an email address, name, and ZivverAccountKey, a Zivver account will be created if none exists for that email address. It is not recommended to change userAccountControl to a different AD attribute.
Delegates
- Default AD attribute:
MsExchDelegateListLink
Delegates get full access to the Zivver inbox of a personal account. Full access delegations configured in Exchange are automatically mapped to the MsExchDelegateListLink attribute in AD.
Auto-mapping does not work as expected in Office 365 hybrid environments. This Microsoft article explains that auto-mapping to
MsExchDelegateListLink does not work when your organization uses Active Directory on-premises together with Exchange Online (Office 365 Hybrid).
Use Exchange source synchronization instead.Aliases
- Default AD attribute:
proxyAddresses(smtp)
Fetches SMTP addresses from the AD attribute proxyAddresses. Other address types such as SIP and X500 are ignored.
Make sure that all domains listed under SMTP addresses are either excluded by the Domain Filters or are claimed in Zivver.
Groups
Group Field Mapping (LDAP) maps suspended Active Directory user accounts associated with Exchange shared mailboxes to Zivver functional account attributes, allowing Zivver functional accounts to be automatically generated based on the AD object linked to an Exchange shared mailbox.
This is a legacy feature, and Zivver does not recommend using it. Please use Exchange source synchronizations to synchronize shared mailboxes to Zivver.
Enable Get Active Directory groups from LDAP to synchronize Active Directory mail-enabled security groups to Zivver as functional accounts.
Enable both Get Active Directory groups from LDAP and Get users with members as groups (this will disable getting users in this source) to synchronize suspended AD objects to Zivver as functional accounts.
If you enable this feature, you cannot synchronize AD objects associated with user mailboxes from this source. Add another LDAP source to synchronize AD objects associated with user mailboxes.
Internal Id
- Default AD attribute:
objectGUID
Zivver uses the Internal Id to identify objects. Microsoft AD’s objectGUID is a reliable identifier because it never changes, even if the object is renamed or moved. Using Internal Id allows the email address in Zivver to automatically update when it is changed in Exchange.
Visit Account Mapping for more information about the Internal Id.
- Default AD attribute:
proxyAddresses(SMTP)
Zivver accounts must have an email address as a username. proxyAddresses takes the primary email address (SMTP address) from the AD attribute proxyAddresses.
If you do not want to synchronize aliases to Zivver or your organization does not use aliases, you can also use mail as the AD attribute. Select an alternate AD attribute from the drop-down menu.
Full name
- Default AD attribute:
displayName
The name of a shared mailbox. This name will be displayed in Zivver notifications. It is recommended to select an attribute that contains the complete name. Other commonly used attributes are displayName, userPrincipalName, or givenName. Use these alternatives if name does not provide the full name of the shared mailbox.
Is active
- Default AD attribute:
<empty>
This field must always remain empty. If it shows userAccountControl, remove it and ensure the field is blank.
Aliases
- Default AD attribute:
proxyAddresses
Fetches SMTP addresses from the AD attribute proxyAddresses. Other addresses, such as SIP addresses and X500 addresses, are ignored.
Ensure that all domains listed under SMTP addresses are either filtered out by the Domain Filters or are claimed in Zivver.
Mapping of the group members User is member of group
- Default AD attribute:
memberOf
Fetches the members of mail-enabled security groups from the memberOf attribute.
Group has members
- Default AD attribute:
MsExchDelegateListLink
Delegates receive full access to the Zivver inbox of a personal account. Full access delegations configured in Exchange are automatically mapped to the MsExchDelegateListLink attribute in AD.
If users are allowed to delegate access to their mailbox via Outlook, you can also use publicDelegates as input.
Auto-mapping does not work as expected in Office 365 hybrid environments. This Microsoft article explains that auto-mapping to
MsExchDelegateListLink does not work when your organization uses Active Directory on-premise together with Exchange Online (Office 365 Hybrid). Please use Exchange source synchronizations instead.Find group members recursively (add members of child groups also to the parten group)
This feature only works if you synchronize mail-enabled security groups that contain other security groups in the memberOf field.
Organizational Units
Organizational Units Mapping maps users and groups from your LDAP source to organizational units (OUs) in Zivver.
If your organization does not use organizational units in Zivver, leave the default None or Excel selected.
If your organization uses organizational units in Zivver, you should have access to the Organization Units tab in Zivver. If you do not have access, either your organization does not use organizational units in Zivver, or you do not have administrator rights.
If your organization uses organizational units in Zivver, select an option based on your configuration of OUs in the Zivver admin panel.
You can check the Organizational Unit Identifier by browsing to the Organization Units tab in Zivver, clicking on one of the OUs listed, and editing edit the Organizational Unit. The identifier will be shown in a popup under Organization Unit Identifier.
Source Filter
Object Filter (LDAP) allow you to filter users based on a given Active Directory attribute value.
- Check Enable LDAP Source filtering.
- Choose an AD attribute from the drop-down table at Filter variable.
- Enter the filter value(s) at Filter text.
If you want to enter more than one filter value, add each value on a separate line. - Choose between a positive filter (include) or negative filter (exclude).
You cannot include and exclude in the same filter.
View the results at Data Preview.
Example: filter on OU
- Check Enable LDAP Source filtering.
- Choose
distinguishedNamefrom the drop-down table at Filter variable. - Enter the
distinguishedNameof the organizational units separated by a line break at Filter text.
For example, if you have two OUs to filter on:
OU=Example,OU=Users,DC=company,DC=org
OU=AnotherExample,OU=Users,DC=company,DC=org - Choose whether to include or exclude the results from your filter.
Your LDAP filter is now configured.
Example: filter on SG
- Check Enable LDAP Source filtering.
- Choose
MemberOffrom the drop-down table at Filter variable. - Enter the
commonNameof the SGs separated by a line break at Filter text.
For example, if you have two SGs to filter on:
Zivver-security-group1
Zivver-security-group2 - Choose whether to include or exclude the results from your filter.
Your LDAP filter is now configured.
Merge Settings
Use Source Merge Settings to choose what Synctool should do if distinct sources (e.g., an LDAP source and an Excel source) contain identical entries.
If this is the first source in the Source Overview, no merge settings are available.
- Overwrite
Objects found in the currently selected source overwrite duplicate objects from previous sources. - Ignore
Objects found in the currently selected source are overwritten by duplicate objects from previous sources. - Conflict
Prompt the admin to resolve duplicates before synchronizing.
Data Preview
Source Data Preview (LDAP) allows you to preview all user accounts and functional accounts found in your LDAP source. Take into account that the Synctool can only find accounts that reside within the configured Base DN and Source Filter.
Click to get a preview of all user accounts and functional accounts found in your LDAP source.
Next steps
If the data preview is returned as you would expect, you can either configure another source, or go to Syncing.