Creating a Connection
This guide walks you through creating a new connection to synchronize identity data from your directory services.
Before You Begin
Ensure you have:
- Administrator access to IdentityCenter
- Network connectivity to the target directory
- Service account credentials with appropriate permissions
- Required ports open in your firewall
Creating an Active Directory Connection
Step 1: Navigate to Connections
- Log in to IdentityCenter as an administrator
- Navigate to Administration > Connections
- Click New Connection
Step 2: Select Connection Type
- Choose Active Directory from the connection type dropdown
- Click Next
Step 3: Configure Basic Settings
| Field | Description | Example |
|---|---|---|
| Name | Friendly name for this connection | Corporate AD |
| Description | Optional description | Main corporate Active Directory |
| Enabled | Whether the connection is active | Yes |
Step 4: Configure Server Settings
| Field | Description | Example |
|---|---|---|
| Server | Domain controller hostname or IP | dc01.corp.local |
| Port | LDAP port number | 389 (LDAP) or 636 (LDAPS) |
| Use SSL | Enable encrypted connection | Recommended for production |
| Base DN | Root of the directory tree | DC=corp,DC=local |
Finding Your Base DN
If you're unsure of your Base DN, you can discover it:
Option 1: From Active Directory
# Run on a domain-joined computer
[System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain().GetDirectoryEntry().distinguishedName
Option 2: From IdentityCenter Leave the Base DN blank and click "Discover" - IdentityCenter will query the RootDSE to find it automatically.
Step 5: Configure Authentication
| Field | Description | Example |
|---|---|---|
| Username | Service account (UPN or DN format) | svc_idsync@corp.local |
| Password | Service account password | ******** |
| Authentication Type | How to authenticate | Simple (most common) |
Authentication Types
- Simple - Username and password (most common)
- Negotiate - Windows integrated authentication (Kerberos/NTLM)
- Anonymous - No authentication (rarely used)
Step 6: Test the Connection
- Click Test Connection
- Wait for the test to complete
- Review the results:
- Server reachable
- Authentication successful
- Base DN accessible
- Objects discoverable
If the test fails, see Connection Troubleshooting.
Step 7: Save the Connection
- Click Save
- The connection appears in your connection list
- Status should show Active
Creating an Entra ID Connection
Prerequisites
Before connecting to Entra ID, you need:
- An Azure subscription
- An App Registration with appropriate permissions
- Client ID and Client Secret
Step 1: Create an App Registration in Azure
- Navigate to Azure Portal > Azure Active Directory > App Registrations
- Click New Registration
- Configure:
- Name: IdentityCenter Sync
- Supported account types: Single tenant
- Redirect URI: Leave blank
- Click Register
Step 2: Configure API Permissions
- Go to API Permissions
- Click Add a Permission
- Select Microsoft Graph
- Choose Application permissions
- Add these permissions:
User.Read.AllGroup.Read.AllDirectory.Read.All
- Click Grant admin consent
Step 3: Create a Client Secret
- Go to Certificates & secrets
- Click New client secret
- Set description and expiration
- Copy the secret value immediately (it won't be shown again)
Step 4: Create the Connection in IdentityCenter
- Navigate to Administration > Connections
- Click New Connection
- Select Entra ID (Azure AD)
- Configure:
| Field | Description | Example |
|---|---|---|
| Name | Friendly name | Azure AD - Corp |
| Tenant ID | Your Azure AD tenant ID | xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx |
| Client ID | App Registration ID | xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx |
| Client Secret | The secret you created | ******** |
- Click Test Connection
- Click Save
Creating a Generic LDAP Connection
For OpenLDAP, eDirectory, or other LDAP servers:
Step 1: Gather Information
| Information | How to Find |
|---|---|
| Server address | Contact your LDAP administrator |
| Port | Usually 389 (LDAP) or 636 (LDAPS) |
| Base DN | Check your LDAP configuration |
| Bind DN | Your service account DN |
| User object class | Usually inetOrgPerson or person |
| Group object class | Usually groupOfNames or groupOfUniqueNames |
Step 2: Create the Connection
- Select Generic LDAP as connection type
- Configure server settings as above
- Configure schema mappings:
| IdentityCenter Field | LDAP Attribute |
|---|---|
| Username | uid |
| Display Name | cn |
| First Name | givenName |
| Last Name | sn |
- Test and save
Advanced Connection Settings
Connection Pooling
Configure connection pooling for improved performance:
| Setting | Default | Description |
|---|---|---|
| Min Pool Size | 1 | Minimum connections to keep open |
| Max Pool Size | 10 | Maximum simultaneous connections |
| Idle Timeout | 300s | Close idle connections after this time |
Timeout Settings
| Setting | Default | Description |
|---|---|---|
| Connect Timeout | 30s | Time to establish connection |
| Operation Timeout | 120s | Time for LDAP operations |
| Search Page Size | 1000 | Results per page for large searches |
Referral Handling
| Option | Description |
|---|---|
| Follow | Automatically follow LDAP referrals |
| Ignore | Ignore referrals (faster, but may miss data) |
| Throw | Fail on referrals (strictest) |
Post-Creation Tasks
After creating a connection:
- Verify Health - Check the connection status on the dashboard
- Create a Sync Project - Set up synchronization to import data
- Schedule Monitoring - Configure alerts for connection failures
- Document - Record the connection details for your team