Active Directory Setup
You can integrate with Active Directory by mapping Gemini Security Groups to Active Directory Groups.
The selected account for accessing AD should ideally be a service account with a non-expiring password. Syntax for AD username:
- [domain name]\user
- user@[domain name].[node extension]
Examples:
- my_domain\bob
- bob@my_domain.com
You can also choose to create new users in Gemini that exist in Active Directory.
TipIf you need to connect to more than one domain the connection strings can be double pipe (||) delimited.
Connection String
There are various ways to specify the AD connection string. Syntax:
- dc=[domain name],dc=[node extension]
- [domain controller]/dc=[domain name],dc=[node extension]
Examples:
- dc=my_domain,dc=com
- server_name/dc=my_domain,dc=com
NoteMake sure you give read "useraccountcontrol” permission to the OU for the AD user you've specified.
Validating
Once you have saved your configuration wait 5 minutes then navigate to any Group and click on the Active Directory multi-select field. If there is no error in the connection you will see a list of your AD Groups.
Import Rules
To help with Active Directory congestion and Gemini performance, Gemini is configured to only import an AD user as long as it meets the three (3) following criteria:
- The AD account must not be disabled.
- The AD account must have an email associated with the AD "email" field if you have enabled "Only synchronzie users with valid email" option.
- The AD account must have logged in at least once to the domain if you have enabled "Only synchronzie users that have logged in at least once" option.
TipIf you want to force a specific domain name for new users. Just simply enter a value of domain in "AD Domain" field.
NoteThe user's email address will be imported only when the user is new in Gemini. Email address for existing users will not be upadted.
Mapping between AD user attributes to Gemini custom fields
Gemini allows you to map Active Directory user attributes to custom fields. So when you view a ticket you can see the active directory mapped information in the ticket
Configuration
From the Apps section you can set the interval between each AD sync, check for errors and even force the sync to run immediately.