Previous Topic: Synchronizing Email Addresses

Next Topic: Example Import Operation

Account Import Wizard

To import user details using the Account Import wizard, choose Tools > Account Import Wizard. The wizard steps you through each stage of the import process.

Note: Some wizard screens may not appear, depending on which import options you choose.

  1. Select source of account data screen

    In the first wizard screen, you must specify the source for the imported user details.

    Synchronize to Data Source

    Choose the LDAP Database or Data File check boxes to synchronize your existing CA DLP user hierarchy with these external sources.

    If you choose both check boxes (that is, you want to simultaneously import from an LDAP directory and a data file), you can specify how Account Import handles duplicate records (any user listed in both sources). By default, the record in the data file is imported while the user record in the LDAP directory is ignored, but you can override this default.

    Input from Command File

    Specify the command file containing the changes or additions to your existing CA DLP user hierarchy.

    Note: By default, when you export any branch of the CA DLP user hierarchy to a command file, the target file name has an .acc extension.

  2. LDAP Logon screen

    Applicable if importing from an LDAP directory—see step 1.

    You must supply logon details for the source LDAP Directory:

    LDAP Server

    Identify the server hosting the source LDAP directory. Enter its name or an IP address.

    Port number

    Enter the TCP/IP port number used to connect to the LDAP server. CA DLP uses this port to communicate with the LDAP server. The default is port 389.

    Base DN/Domain

    Identify the LDAP server’s base DN or domain. For example, to specify an Active Directory domain, enter one of these formats:

    company.com or dc=company,dc=com
    

    Note: If Account Import can detect the default DN, it is shown automatically. Also, some configurations, for example Domino Server, may require you to leave this field empty.

    User

    Enter your user name on the LDAP Server. The name format depends on the type of LDAP database. For example, if you import users from a Microsoft Exchange server, this name will be the same as your domain user name, with your domain and name separated by a backslash:

    unipraxis\frankschaeffer
    

    On other LDAP databases, this name may be a fully qualified LDAP distinguished name, for example:

    cn=frankschaeffer,o=unipraxis
    

    Note: If the LDAP server permits anonymous access, leave both the User and Password fields blank.

  3. LDAP Search Filters screen

    Applicable if importing from an LDAP directory—see step 1.

    Where possible, the wizard automatically detects the type of LDAP directory (for example, Microsoft Active Directory) and key details about the LDAP directory structure. The wizard provides ‘best guess’ default values, but you can override these if necessary. Specifically, you must ensure that the following fields contain correct values.

    User Name Attribute

    You must specify the LDAP attribute that holds the user names.

    User Search Filter

    Specify the LDAP search filter needed by the wizard to extract users from the LDAP database.

    Group Search Filter

    Specify the LDAP search filter needed by the wizard to extract the LDAP containers that correspond to CA DLP user groups.

    Note: If you override the default search filters and specify different object classes and categories, ensure that the new filter conforms to RFC 2254.

  4. LDAP Source Directory screen

    Applicable if importing from an LDAP directory—see step 1.

    You must specify the root directory for user data extracted from the LDAP directory.All users and groups at and below this root directory will be copied into CA DLP.

    Click the Browse button to select the root LDAP tree level. For example, select ‘ou=Unipraxis/ou=Sales’ to import all users from this level downwards:

    LDAP tree

    Example LDAP directory structure

  5. Users Tree Root screen

    Specify the target parent group in the CA DLP user hierarchy; you can only choose one of your management groups as the parent group.

    All users and groups imported from LDAP and or a data file will be added to this parent group.

    Note: If you choose to reorganize existing CA DLP users to match the directory structure in LDAP or the structure specified the data file (you choose this in step 6), the reorganization only affects CA DLP users within the target parent group.

  6. Synchronization Scope screen

    Applicable if importing from an LDAP directory or data file—see step 1.

    AI wizard step 6

    Now define the synchronization scope. The Account Import wizard enables you to synchronize your CA DLP user hierarchy with an external source. You can select any combination of the following synchronization options.

    Create new users

    This option creates new CA DLP accounts for unknown users. That is, it creates a new account for each imported user who has no corresponding account in CA DLP.

    Note: If a user is created with a user name matching a user account that was previously deleted, CA DLP can automatically recreate the deleted user. See the Administration console online help for details; search the index for ‘users, recreating’.

    Re-organize existing users

    This option rearranges the existing hierarchy of CA DLP users to synchronize it with the hierarchical group structure specified in step 7. If you do not select this option, all existing CA DLP users stay in their current group.

    Copy user attributes

    This option updates existing user accounts with email addresses and attributes imported from corresponding users in the LDAP directory or data file. See steps 9 and 10 for details.

    Note: The full name associated with each CA DLP user account is imported automatically from the LDAP directory.

    • Email addresses can be deleted: This option specifies whether emaildelete commands are carried out by the synchronization.

      Important! We do not recommend that you use this parameter, as existing email events may no longer be associated with the correct user—see the /ed parameter for details.

    Synchronize users from this domain

    This option prefixes names for new user accounts with the specified domain (such as unipraxis\srimmel). If the user names in the LDAP directory or data file do not have a domain prefix (that is, the user name does not contain a backslash), this setting will automatically add one.

    Note: This option is essential if single sign-on is enabled on your CMS.

  7. Import Options screen

    These options determine how to handle anomalous users and groups, whether you must confirm the changes, and how new user names are composed.

    AI wizard step 7

    Group Structure

    The available options determine how imported users are organized into parent groups in the CA DLP user hierarchy:

    • Use LDAP hierarchy to group users: This option creates a new set of user groups that match the hierarchical structure of the source LDAP directory or data file. The new group structure is rooted at the source LDAP directory specified in step 4. It is created below the CA DLP parent group specified by the User Tree Root in step 5.
    • Place all users in User Tree Root: This imports all users into a flat, non-hierarchical group structure. That is, all imported users are added to the parent group specified by the User Tree Root in step 4.
    • Use LDAP attributes to group users: This option derives a hierarchy of parent groups based on a concatenation of specified LDAP attributes, or attributes specified in a data file. For details, see step 8.
    Create empty groups

    Available only if you selected ‘Create new users’ in step 6.

    The source LDAP directory structure may contain empty containers. These are containers that hold subcontainers or other items, but no users. When importing users, you can set up Account Import wizard to ignore these empty containers or to create corresponding empty user groups in CA DLP.

    If you select this option, the wizard creates empty user groups for each empty LDAP or data file container.

    If you clear this option, the wizard ignores empty containers. For example, an LDAP directory may include the following branch:

    LDAP: ou=Unipraxis/ou=London/ou=Sales
    

    If the ‘Sales’ container is empty of users but the ‘London’ container is not empty, the wizard creates the following hierarchy in the Administration console:

    CA DLP: Unipraxis/London
    
    Move unknown users to...

    Available only if you selected ‘Re-organize existing users’ in step 6.

    If your existing CA DLP user hierarchy contains users not present in the LDAP directory, you can move them to an ‘exceptions’ group. This can be any existing group in the user hierarchy. If you do not select this option, these non-LDAP users are preserved in the CA DLP user hierarchy.

    Note: This setting only affects CA DLP users within the specified target parent group.

    Note: Users prepended with a domain name other than the one set on the Synchronization Scope screen are not moved (see Synchronize users from this domain in step 6).

    Manual confirmation

    If you select this option, you must confirm all of the resulting changes to the user hierarchy. See step 13 for details.

    If you do not select this option, synchronization is automatic. (Note that you cannot confirm or reject individual changes.)

  8. Create Group from LDAP attributes screen

    Available only if you selected ‘Use LDAP attributes to group users’ in step 7.

    AI wizard step 8

    If required, Account Import can derive a hierarchy of parent groups based on a concatenation of specified LDAP attributes.

    Choose which LDAP attributes to use, and specify the order in which they are used to derive a group hierarchy. For example, these LDAP attributes arranged in the following order:

    country

    office

    department

    Produce this group hierarchy in CA DLP:

    ui wiz uh tree 3a

    Adding custom attributes

    Account Import only displays the most commonly used LDAP attributes in this screen. If you need to add an attribute not listed here (for example, an employee attribute custom created for your organization), use the Edit and Save buttons to add this attribute to the list.

    Modifying attribute values

    If you need to modify the values of an LDAP attribute before using these values to derive a group hierarchy in CA DLP, you can append a conversion expression, enclosed in square brackets, to the attribute name. Use the Edit and Save buttons to add the attribute-plus-expression to the attribute list.

  9. Email attributes screen

    Available only if importing from an LDAP directory (see step 1) and you selected ‘Copy user attributes’ in step 6.

    Account Import can synchronize e‑mail addresses in the CMS database with addresses in an external source, typically an LDAP directory. Such synchronization is essential for CA DLP features that rely on email address mapping!

    In this screen, add the LDAP attributes that contain email addresses. If required, Account Import can select the default email attributes. Each imported address is associated with a CA DLP user.

    Note: If you use the ICAP agent to integrate with BlueCoat ProxySG servers, you need to import the distinguishedName attribute.

  10. User Attributes screen

    Available only if importing from an LDAP directory (see step 1) and if you selected ‘Copy user attributes’ in step 6.

    AI wizard step 10

    CA DLP lets you define custom attributes for user accounts. For example, you can create an Employee ID attribute and assign a unique ID to each user in your organization. Account Import can copy user attributes from an LDAP directory or data file to the custom user attributes defined in CA DLP.

    In this screen, the CA DLP attributes are listed on the left. To map an LDAP attribute to CA DLP attribute, select CA DLP attribute then choose an LDAP user attribute from the drop-down list.

    Combining LDAP attributes

    To combine multiple LDAP attributes and write them as a single value to a CA DLP attribute, double-click the LDAP attribute, then manually type a comma separated list of the LDAP attributes you want to combine. For example:

    DeskLocation: building,floor,deskNumber

    Renaming attributes

    If necessary, you can rename any CA DLP or LDAP attribute. To do this, double-click the attribute and type its new name.

    Modifying attributes

    If necessary, you can modify the imported value for any LDAP attribute before writing them to an attribute of a CA DLP user account. To do this, double-click the LDAP attribute, then append a conversion expression, enclosed in square brackets, to the attribute name.

    When the import operation runs, the Account Import will update the attributes for each CA DLP user with the corresponding attribute values in the LDAP directory.

  11. Anchor attribute screen

    Select which CA DLP account attribute maps CA DLP users to LDAP (or data file) users when synchronizing the CA DLP user hierarchy with that in LDAP (or the data file). This anchor can be the user name, the user full name, or any of the defined user attributes.

    Account Import uses the specified CA DLP attribute to locate the corresponding user in the LDAP directory (or data file). Having established a link between the target user account in CA DLP and the source user, Account Import can then update the account details in CA DLP with the imported information (the user’s parent group, e‑mail addresses and other attributes). If you choose to anchor the user synchronization on:

    User name

    The LDAP attribute mapped to CA DLP user names was specified in the User Name Attribute field in step 3.

    Full name

    The LDAP attribute mapped to CA DLP user full names was specified in step 10.

    Attribute index

    The LDAP attributes mapped to CA DLP account attributes were specified in step 10. Enter a value in the Attribute Index field, where index 1 refers to UserAttribute1, index 2 to UserAttribute2, and so on.

    User renames allowed

    It is possible that the user name in the CA DLP database is different to the value of the XML <user> tag or LDAP attribute used for the user name. For example, if a user has recently married.

    To stop the user name in the CA DLP database being overwritten during a synchronization process, you need to ensure that this check box is not selected.

    Note: This check box is automatically selected and disabled if you choose to anchor the user synchronization on the user name. This is because the synchronization will not match against a CA DLP user unless the user name is the same.

  12. Import Assessment screen

    Wait while Account Import identifies all the changes and additions that will be made to the CA DLP user hierarchy.

  13. Confirm Changes screen

    If you selected the ‘Manual confirmation’ option in step 7, the wizard lets you confirm or reject the changes to the existing user hierarchy.

    In the Confirm Changes screen:

    Display Changes

    Click to view a list of the proposed changes to the CA DLP user hierarchy. Note that these changes may take several minutes to appear if the import operation involves substantial additions or changes to the user hierarchy. When the list of changes appears, click Next to accept the changes and proceed to the next screen; click Cancel to reject all of the changes and quit the wizard.

    Email addresses can be deleted

    Select this check box to that any emaildelete commands in the command file will be carried out during the import operation.

    Important! We do not recommend that you use this parameter, as existing email events may no longer be associated with the correct user—see the /ed parameter for details..

    Note: This option is only enabled if importing from a command file—see step 1. If you have carried out a synchronization, then the value of the E‑mail addresses can be deleted option in the Synchronization Scope screen (see step 6) is matched in this disabled option.

  14. Importing screen

    The wizard now has all the information it needs. Wait while it imports the user data and updates the CA DLP user hierarchy.

  15. Import Complete screen

    Details about the import operation are recorded in a log file.

More information:

Import Sources

Handling for Unknown Users

Delete an Email Address

Parameter Files

About Single Sign-On

Modify LDAP Values with Conversion Expressions

Features That Use Email Address Mapping

Import DN Details to CA DLP User Address Lists

Combining Multiple LDAP Attributes in Single CA DLP Attributes