Skip to content
Cybersecurity & IAM

Cybersecurity & IAM

  • Allidm We are
  • Infographics
  • Privacy Policy

Configure New Directory in One Login – Integrating with Active Directory

Active Directory Connectors manage OneLogin user authentication against Active Directory and provide real-time synchronization of users between Active Directory (AD) and OneLogin. Active Directory Connectors also function as the redirect service in a Desktop SSO implementation.

Below the steps to configure the Active Directory within One Login.

Select Users | Directories | New Directory | Choose Active Directory

Login to the Server connected to your AD domain, and download the One Login AD Connector Version 5. Is important that you copy the token generated. This token number will be used during the AD connector installation.

Once downloaded double click on the file onelogin_ad_connector.msi to start the One Login AD Connector installation.

Accept the license agreement and click next.

Enter the installation token. This is the value provided during the download screen.

You have multiple options to run the connector service. Select Create One Login Service Account and click Next.

Installation creates the One Login Service Account.

Now you select the Port number, by default is 8080.

Now select the shard database

Now click install and One Login AD Connector 5 will start the installation.

Once completed, One Login AD Connector is ready and you can launch the domain configuration. Click finish.

At this point now you should be able to start configuring your AD domain at One Login and specify which domain or containers needs to be synced.

You will have the capability to add more features like:

  • Add Additional Active Directory Connectors for High Availability
  • Configure Desktop SSO with Active Directory Connectors

Share this:

  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • Share on LinkedIn (Opens in new window) LinkedIn

Gabriel Magarino

Gabriel Magarino – Senior Security Manager | IAM Evangelist - Experienced leader with over 20 years in the IT and cybersecurity industry, specializing in Identity & Access Management. Expert in Okta, One Identity, SailPoint (IdentityIQ & IdentityNow), OneLogin, Delinea, and CyberArk. Passionate about exploring IAM and emerging technologies, coaching, and training IAM teams. Holds a Master’s in Computer Science and multiple certifications, including Okta Professional & Administration, One Identity Architect & Instructor, SailPoint Identity Now, ITIL, Scrum Master, among others. Currently pursuing a PhD with a focus on Computer Science and Artificial Intelligence.

Published On April 10, 2020

Post navigation

Previous PostOkta – Enabling Self-Service Registration
Next PostInstalling One Identity Manager Operation Support Portal

Recent Posts

  • Okta Temporary Access Code (TAC) Authenticator
  • Streamline Your On-Call Access: Configuring Okta SSO for PagerDuty
  • SEO vs GEO: The New Frontier of Digital Visibility
  • Okta’s New “Block Restricted Content” Feature
  • Okta Access Testing Tool: Validate User Journeys with Confidence
  • Takeaway Digital Identity Risk Management (DIRM)
  • 12 Practical Tips for Effective Troubleshooting
  • Delinea Create Secret for Active Directory
  • Troubleshooting Framework for Resilient Identity & Security Platforms
  • Digital Identity Risk Management (DIRM) – Step 5: Continuously Evaluate and Improve

Infographics

Latest Post

  • Okta Temporary Access Code (TAC) Authenticator
Copyright © All right reserved
Created By: Fansee Themes