SID History Synchronization Quick Start Guide
SID History Synchronization Quick Start Guide
This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a
software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the
applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or
mechanical, including photocopying and recording for any purpose other than the purchaser’s personal use without the written
permission of Quest Software Inc.
The information in this document is provided in connection with Quest Software products. No license, express or implied, by
estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Quest Software
products. EXCEPT AS SET FORTH IN THE TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR
THIS PRODUCT, QUEST SOFTWARE ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR
STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL QUEST
SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES
(INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF
INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF QUEST SOFTWARE HAS
BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Quest Software makes no representations or warranties with
respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications
and product descriptions at any time without notice. Quest Software does not make any commitment to update the information
contained in this document.
If you have any questions regarding your potential use of this material, contact:
Quest Software Inc.
Attn: LEGAL Dept
4 Polaris Way
Aliso Viejo, CA 92656
Refer to our Web site (https://www.quest.com) for regional and international office information.
Patents
Quest Software is proud of our advanced technology. Patents and pending patents may apply to this product. For the most current
information about applicable patents for this product, please visit our website at https://www.quest.com/legal .
Trademarks
Quest, the Quest logo, and Join the Innovation are trademarks and registered trademarks of Quest Software Inc. For a complete list
of Quest marks, visit https://www.quest.com/legal/trademark-information.aspx. All other trademarks and registered trademarks are
property of their respective owners.
Legend
IMPORTANT, NOTE, TIP, MOBILE, or VIDEO: An information icon indicates supporting information.
Setup .............................................................................................................................. 7
Setup Environments .................................................................................................................... 7
Setup Templates ......................................................................................................................... 8
How to create a Local to Local template............................................................................................ 8
Setup Workflows ......................................................................................................................... 9
How to create a one-way sync workflow for Local to Local ......................................................... 9
Set up Test Objects ..................................................................................................... 12
Validating the Workflow.............................................................................................. 13
Common Troubleshooting Guide .............................................................................. 13
This guide will focus on sIDHistory synchronization between two on-premises Active Directory
environments without a Trust enabled between two Directories. To set up Power365 Directory Sync for
sIDHistory migration, four (4) configurations must be completed prior to the first synchronization.
1. Set up Environments
3. Set up Templates
4. Set up Workflows
The next section will provide the list of requirements needed to successfully migration sIDHistory between
two Active Directory environments.
Requirements
In order to facilitate the sIDHistory migration, the following is a list of minimum requirements to get set up
using Power365 Directory Sync with your On-Premises Active Directory. Power365 Directory Sync
supports sIDHistory migration for environments that have an Active Directory trust configured as well as
environments without a trust configured.
1. In the source domain, create a local group called SourceDomain$$$, where SourceDomain is the
NetBIOS name of your source domain. For example, if your domain's NetBIOS name is ADM,
you must create a domain local group named ADM$$$.
Notes: sIDHistory synchronization will fail if members are added to this local group.
a. On the domain controller in the source domain that holds the PDC emulator operations
master (also known as flexible single master operations or FSMO) role, click Start, and
then click Run.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA
d. Modify the registry entry TcpipClientSupport, of data type REG_DWORD, by setting the
value to 1.
c. Navigate to the following node: Forest | Domains | Domain Name | Domain Controllers |
Default Domain Controllers Policy
e. In Group Policy Management Editor, in the console tree, navigate to the following node:
Computer Configuration | Policies | Windows Settings | Security Settings | Local Policies |
Audit Policy
f. In the details pane, right-click Audit account management, and then click Properties.
g. Click Define these policy settings, and then click Success and Failure.
i. In the details pane, right-click Audit directory service access and then click Properties.
4. Enable Advanced Auditing in the target domain when you have advanced audit policy enabled:
b. Click Start, point to All Programs, point to Administrative Tools, and then click Group
Policy Management.
c. Navigate to the following node: Forest | Domains | Domain Name | Domain Controllers |
Default Domain Controllers Policy
e. In Group Policy Management Editor, in the console tree, navigate to the following node:
Computer Configuration | Policies | Windows Settings | Security Settings | Advanced
Audit Policy Configuration | Audit Policies | Account Management
f. In the details pane, right-click Audit Application Group Management, and then click
Properties.
g. Click Configure the following audit events, and then click Success and Failure.
i. Repeat the above for the following policies under Account Management
j. In Group Policy Management Editor, in the console tree, navigate to the following node:
Computer Configuration | Policies | Windows Settings | Security Settings | Advanced
Audit Policy Configuration | Audit Policies | DS Access
k. In the details pane, right-click Audit Detailed Directory Service Replication and then
click Properties.
l. Click Configure the following audit events, and then click Success.
n. Repeat the above for the following policies under Account Management
Notes: It may also be necessary to reboot the domain controller to have auditing take effect.
Even with group policy applied on the default domain controller for the domain audit, the server
audit setting on the primary domain controller (PDC) may not be enabled. Please confirm this
setting is enabled for the local security policy on the PDC server. If not enabled, use the local
security policy to enable this setting.
Account Permissions
1. Migrate sIDHistory permissions are required on the target domain. This is typically enabled for
Domain Admins and Enterprise Admins, but can be enabled for a specific group or user by
following the below steps:
b. Select the Security tab and add or update the desired group or user and enable the
“Migrate sIDHistory” permission.
2. Source credential must have administrator access to the source PDC emulator. This is typically
enabled for Domain Admins and Enterprise Admins, but can be enabled for a specific group or
user by following the below steps:
b. Locate the administrators group and ensure the source service account is a member of
the group.
Setup Environments
To begin at least two (2) Active Directory environments must be configured in Power365 Directory Sync.
At the end of this section there will be two (2) Active Directory environments fully configured.
An environment is an end-point connection that can control the scope of objects read. This guide will walk
through how to create the source and target active directory environments.
• One (1) Local Administrator Account for each Microsoft Forest and/or Domain that has
permissions to create, update or delete depending on the scope of your Directory Sync
workflows, this Administrator Account should also meet the sIDHistory synchronization
requirement as stated in Account Permissions section above.
• One (1) Windows Server to install and host the Power365 Directory Sync Agent.
1. Login to Power365
2. Navigate to Environments
7. Note the agent registration URL and registration Key for later use, click Finish.
8. Install the agent in the Windows Server that is joined to the local AD domain.
a. Launch the Power365 Directory Sync Agent installation in the target workstation or server
c. Enter the target active directory environment information by providing the following and
click next.
i. Domain Name
iii. Username
iv. Password
d. Enter the Power365 Directory Sync Registration URL and Agent Registration Key
information and click next.
Note, Refer to Power365 Online Help Center for detailed information about agent installation and
set-up requirements.
9. Once agent is installed and the environment is discovered, click on the Setting button to access
the local AD environment setting page.
10. Click on the Organization Unit tab and define the OU filter based on your project scope.
11. Click on the Filters tab and define any LDAP filter based on your project scope.
Setup Templates
Before we can build our workflow, it is best to set up your template(s). Templates contain common
mappings and settings used to sync Users, Contacts, Devices, Groups, Office 365 Groups and Microsoft
Teams. A template can then be applied to any workflow with a Stage Data step.
For the purpose of this guide, the following template will need to be configured to perform sIDHistory
synchronization. Additional templates may be created based on your project requirements.
1. Login to Power365
2. Navigate to Templates
5. In our example, we will name our template “Local to Local sIDHistory Sync”, Click Next
28. Under mappings, we can leave the settings as default or update them based on your project
requirements.
Setup Workflows
Follow these steps to create two (2) new workflow for reading, matching, staging and writing data.
1. Login to Power365
2. Navigate to Workflows
5. Select the all two (2) local Active Directory environments created previously, Click Next
7. The screen presented next will be a pre-configured set of workflow steps to facilitate the flow of
object and attributes between your directories.
8. Start at the top of the steps, 1. Read From. Click the Select button
a. This is the step where you will decide on how to match existing objects across your local
Active Directories
c. Your two (2) environments may already have some attributes that can be used to find
similar objects between the different directories, or you may need to set some to ensure
accurate matching
d. For the purpose of sIDHistory Synchronization, it is most important that existing objects
are correctly matched before attempting to create new objects with the source object’s
sIDHistory.
11. Click the Select button to configure the Match Objects criteria for your source Cloud environment
and target Cloud environment
c. Choose your first attribute pairings, we will use WindowsEmailAddress for our first match
criteria
d. Choose the sAMAccountName attribute for the source and target fields
f. Additional pairings are evaluated as “OR” conditions. After the first match is found, the
additional pairings are not assessed.
g. In our case we are adding three (3) additional attribute pairings to our criteria
i. cn – This attribute was added to ensure we can match existing objects based on
CN.
iii. Mail – This attribute was added to ensure we can match existing objects based
on Mail.
Note: Matching attributes should be reviewed and adjusted based on actual project
scope, there isn’t a set matching rule that will fit all scenarios.
h. Ensure Match Across all object types is not checked in this case.
i. There is no need in this guide to Add Another Pair, click OK to close this configuration
12. Drag a Stage Data workflow task from the left panel to the right under the Stage Data task
mentioned above. Click the Select button to configure the fourth STAGE DATA workflow task for
your target local to source local synchronization rule.
e. Select the source Organizational Units that will be in scope of the project by click on the
ADD OUS button,
f. In the new OU pop-up window, select the OU that will be in-scope, check the INCLUDE
ALL SUB OUS checkbox, click OK to close the pop-up.
g. Configure any Stage Data filter you like by double click on the OU in the OUs list, it is
highly recommended to setup filter to limit the scope to perform a test on the first sync as
part of the validation. Click Next
13. Click the Select button to configure the WRITE TO workflow task. Ensure the target environment
is selected, Click OK
15. Configure the workflow sync interval, select Manual for now and we can setup a sync schedule
once the test sync has completed. Click Next
16. Setup any workflow alert you may wish to configure, for now, Click SKIP
1. Setup a User in the source local environment and ensure it is part of the OU filter setup for the
Local Environment.
a. DisplayName: Lab1SIDTest1
2. Setup a group in the source local environment it is part of the OU filter setup for the Local
a. DisplayName: Lab1SIDGrp1
3. Capture the objectSid value for the above test objects for later use.
3. Validate Lab1SIDTest1 from source local Active Directory will be created in target. Source user’s
objectSid will be copied to the target user’s sIDHistory attribute.
4. Validate Lab1SIDGrp1 from source local Active Directory will be created in target. Source
group’s objectSid will be copied to the target group’s sIDHistory attribute.
Question: I am getting "The handle is invalid (Error code = 6)." Error when my sIDHistory workflow runs,
objects were created without sIDHistory information.
Answer: This error indicates an RPC problem where the migration tool cannot bind to an RPC endpoint
on the source primary domain controller. Possible causes include:
• The primary domain controller or primary domain controller emulator was not restarted after
TcpipClientSupport was configured.
Question: I am getting " Could not verify auditing and TcpipClientSupport on domains. Will not be able to
migrate Sid's. The specified local group does not exist." Error when my sIDHistory workflow runs.
Answer: This error typically indicates that a user or a global or universal group with the
{SourceNetBIOSDom}$$$ name already exists. ADMT typically creates the local group of that name, but
it cannot do so if a security principal already exists with the name.