Active Directory

Configuring the Active Directory integration for Veza Lifecycle Management

Overview

The Veza integration for Active Directory enables automated user lifecycle management, including user provisioning and deprovisioning, group membership management, and attribute synchronization.

Action Type
Description
Supported

SYNC_IDENTITIES

Synchronizes identity attributes between systems, with options to create new identities and update existing ones

โœ…

MANAGE_RELATIONSHIPS

Controls entitlements such as group memberships and role assignments for identities

โœ…

DEPROVISION_IDENTITY

Safely disables access for identities while preserving attributes for audit

โœ…

CREATE_ENTITLEMENT

Creates entitlements such as Active Directory groups

โœ…

RESET_PASSWORD

Allows password reset operations for Active Directory users

โœ…

DELETE_IDENTITY

Permanently deletes the user identity from Active Directory

โœ…

SOURCE_OF_IDENTITY

Active Directory can act as a source system for identity lifecycle policies

โœ…

This document includes steps to enable the Active Directory integration for use in Lifecycle Management, along with supported actions and notes. See Supported Actions for more details.

Enabling Lifecycle Management for Active Directory

Prerequisites

  1. You will need administrative access in Veza to configure the integration.

  2. Ensure you have an existing Active Directory integration in Veza or add a new one for use with Lifecycle Management.

  3. Verify your Active Directory integration has completed at least one successful extraction.

Configuration Steps

To enable the integration:

  1. In Veza, go to the Integrations overview

  2. Search for or create an Active Directory integration

  3. Check the box to Enable usage for Lifecycle Management

Configure the extraction schedule to ensure your Active Directory data remains current:

  1. Go to Veza Administration > System Settings

  2. In Pipeline > Extraction Interval, set your preferred interval

  3. Optionally, set a custom override for Active Directory in the Active Overrides section

To verify the health of the Lifecycle Management data source:

  1. Use the main Veza navigation menu to open the Lifecycle Management > Integrations page or the Veza Integrations overview

  2. Search for the integration and click the name to view details

  3. In the Properties panel, click the magnifying glass icon under Lifecycle Management Enabled

1. Create a Service Account

Create a dedicated AD user with the minimum required permissions:

Using Active Directory Users and Computers:

  1. Open Active Directory Users and Computers

  2. Navigate to the target Organizational Unit

  3. Right-click > New > User

  4. Complete the new user details form

    • Recommended name: "Veza AD Lifecycle Manager"

    • Set a strong password

    • Uncheck "User must change password at next logon"

Using PowerShell:

2. Configure Required Permissions

Grant the service account permissions to manage users in the target OUs:

Using Active Directory Users and Computers:

  1. Navigate to the target Organizational Unit

  2. Right-click > Delegate Control

  3. Click Add and enter the service account name

  4. Select these delegated tasks:

    • Create, delete, and manage user accounts

    • Reset user passwords and force password change

    • Read all user information

    • Modify group membership

Using PowerShell:

3. Configure the Integration in Veza

  1. Navigate to Configurations > Integrations

  2. Either:

    • Create a new Active Directory integration

    • Edit an existing Active Directory integration

  3. Enable Lifecycle Management:

    • Check Enable Lifecycle Management

    • Enter the Lifecycle Management Username (service account created above)

    • Enter the Lifecycle Management Password

  4. Save the configuration

The AD user created for lifecycle management can be the same as the primary AD user created for extraction, provided that the user has all the required permissions listed above.

Supported Actions

Active Directory can serve as a source for identity information in Lifecycle Management Policies. User identity details are synchronized from Active Directory, with changes propagated to connected systems.

Active Directory can also be a target for identity management actions, based on changes in another external source of truth or as part of a workflow.

The integration supports the following lifecycle management Actions:

Sync Identities

Synchronizes identity attributes between systems, with options to:

  • Create new identities if they don't exist

  • Update attributes of existing identities

  • Enable continuous sync to keep attributes aligned with the source of truth

Unique Identifiers

Active Directory uses composite unique identifiers to locate users. Only one unique identifier can be specified per action:

  • account_name (sAMAccountName) - Default unique identifier

  • distinguished_name - Full LDAP path (e.g., CN=John Doe,OU=Users,DC=company,DC=com)

  • user_principal_name - Login format (e.g., [email protected])

The following attributes can be synchronized:

Active Directory User Attributes
Property
Required
Type
Description
Notes

account_name

Yes

String

User's account name (sAMAccountName)

Can be used as unique identifier

distinguished_name

Yes

String

Full LDAP distinguished name path

Can be used as unique identifier

user_principal_name

Yes

String

User's principal name (login format)

Can be used as unique identifier

account_expires

No

Date/Time

Account expiration date and time

city

No

String

City

company

No

String

Company name

country_code

No

String

ISO 3166 Alpha-2 country code

country_or_region

No

String

Country or region name

department

No

String

Organizational department

description

No

String

User description

display_name

No

String

Display name

email

No

String

Email address

Can be used as unique identifier

given_name

No

String

First name

manager_id

No

String

Manager's sAMAccountName

office

No

String

Office location

physical_delivery_office_name

No

String

Physical office name

postal_code

No

String

Postal/ZIP code

primary_group_dn

No

String

Distinguished name of primary group

state_or_province_name

No

String

State or province

street_address

No

String

Street address

sur_name

No

String

Last name/surname

title

No

String

Job title

Manage Relationships

Controls relationships between users and Active Directory groups:

  • Entity Types: Active Directory Groups

  • Assignee Types: Active Directory Users

  • Supports Removing Relationships: Yes

Both adding and removing group memberships are supported. Group memberships can be managed individually or removed in bulk during deprovisioning.

Deprovision Identity

When a user is deprovisioned in Active Directory:

  • Entity Type: Active Directory User

  • Method: Account Disabled (sets userAccountControl to 514)

  • Remove All Relationships: Yes (optional - group memberships can be removed)

What is preserved:

  • User account structure (not deleted)

  • All user attributes (name, email, title, etc.)

  • Audit history and account information

  • Account can be reactivated by re-enabling

What changes:

  • Account is disabled (login prevented)

  • Group memberships are removed (optional, based on workflow configuration)

  • User cannot authenticate or access AD resources

The following unique identifiers can be used to locate the user:

Unique Identifiers for Deprovision
Property
Type
Description
Notes

account_name

String

User's account name (sAMAccountName)

Can be used as unique identifier

distinguished_name

String

Full LDAP distinguished name path

Can be used as unique identifier

user_principal_name

String

User's principal name (login format)

Can be used as unique identifier

email

String

Email address

Can be used as unique identifier

Create Entitlement

Creates new Active Directory groups:

  • Entity Type: Active Directory Group

  • Required Attributes: name

  • Optional Attributes: description, group_type, is_security_group, member_of, account_name, organizational_unit_dn

Group Creation Attributes
Property
Required
Type
Description
Notes

name

Yes

String

Group name

Maximum 64 characters

account_name

No

String

Group account name (sAMAccountName)

Maximum 256 characters, must be unique

description

No

String

Group description

group_type

No

String

Type of group

Values: Domain, System, Global, Universal, App Basic, App Query

is_security_group

No

Boolean

Whether this is a security group

member_of

No

String

Distinguished name of parent group(s)

organizational_unit_dn

No

String

Distinguished name of target OU

Reset Password

Resets a user's password in Active Directory:

  • Entity Type: Active Directory User

  • Idempotent: No (generates a new password with each execution)

  • Password Options:

    • Configurable password complexity (length, character types, excluded characters)

    • Option to require password change on next login

    • Passwords must comply with Active Directory domain password policy

Password Complexity Options:

  • Length: Configurable minimum password length

  • Character Types: Uppercase, lowercase, numbers, special characters

  • Disallowed Characters: Specify characters to exclude from generated passwords

  • Require Change: Force user to change password on next login

The following unique identifiers can be used to locate the user:

Unique Identifiers for Password Reset
Property
Type
Description
Notes

account_name

String

User's account name (sAMAccountName)

Can be used as unique identifier

distinguished_name

String

Full LDAP distinguished name path

Can be used as unique identifier

email

String

Email address

Can be used as unique identifier

user_principal_name

String

User's principal name (login format)

Can be used as unique identifier

Delete Identity

Permanently removes a user from Active Directory:

  • Entity Type: Active Directory User

  • Method: Permanent deletion (DROP USER equivalent)

  • Warning: This action cannot be undone

The following unique identifiers can be used to locate the user:

Unique Identifiers for Delete Identity
Property
Type
Description
Notes

account_name

String

User's account name (sAMAccountName)

Can be used as unique identifier

distinguished_name

String

Full LDAP distinguished name path

Can be used as unique identifier

user_principal_name

String

User's principal name (login format)

Can be used as unique identifier

email

String

Email address

Can be used as unique identifier

Example Workflows

Employee Onboarding

Automate user creation and group assignment when a new employee joins:

  1. Create a Lifecycle Management policy with your HR system as the source of identity

  2. Configure a workflow triggered when a new identity is detected

  3. Add a Sync Identities action to create the AD user:

    • Map HR attributes to AD attributes (name, email, department, title, manager)

    • Set initial password with "require change on next login"

  4. Add a Manage Relationships action to assign initial group memberships based on role/department

Role Change

Update access when an employee changes roles:

  1. Create a policy with your HR system as the source of identity

  2. Configure a workflow triggered when attributes change (department, title, or manager)

  3. Add a Sync Identities action to update user attributes

  4. Add a Manage Relationships action to:

    • Remove old role-based group memberships

    • Add new role-based group memberships

Employee Offboarding

Disable access when an employee leaves:

  1. Create a policy with your HR system as the source of identity

  2. Configure a workflow triggered when termination date is set or employee status changes

  3. Add a Deprovision Identity action:

    • Account will be disabled (not deleted)

    • Group memberships will be removed

    • Attributes preserved for audit

  4. Optionally schedule a Delete Identity action after retention period (e.g., 90 days)

Last updated

Was this helpful?