Next Topic

Previous Topic

Book Contents

Directory Services (v1.0.0.0) - 6 June 2011

Directory Services

Directory Services (KDS) manages the following types of activities.

  • Installs agents on newly discovered Active Directory domain machines.
  • Creates VSA user logons based on newly discovered domain users.
  • Creates Portal Access logons based on newly discovered domain users.
  • Creates VSA staff member records based on newly discoverd domain contact records.
  • Resets domain user passwords.
  • Enables and disables domain users.
  • Creates a Kaseya security model based on the domain security model.

Domain Discovery and Synchronization

KDS uses a probe agent on a domain computer to communicate with an Active Directory domain. Once connected, the probe "harvests" domain data back to the Kaseya Server and synchronizes the domain with a designated organization in the VSA. Changes in the domain are synchronized with KDS on a scheduled basis and do not require a VSA agent on the AD domain controller. KDS uses the industry standard LDAP protocol to safely and securely communicate with Active Directory domains.

Synchronization of Security Models

One of the benefits of synchronizing the VSA with the domain is that the domain hierarchy of folders and items—domains, organizational units/containers, computers, groups, users, and contacts—is automatically "harvested" to create and maintain a similar security model in the VSA—organizations, machine groups, machines, users, scopes, roles, and staff. Service providers are freed from having to enter the same data a second time in the VSA. For example, user data, such as email, phone and other contact information need only be updated in the domain to update corresponding fields in the VSA.

Active Directory is mapped to Kaseya as follows:

  • Domain > Org or Sub-Org
  • Organizational Unit (OU) and Container > and Machine Group, Department, and Scope
  • Group > Role and Scope
  • Users > Users with linked Staff record
  • Contact > Staff
  • Computer > Agent Account

Manages Multiple Domains

KDS provides consolidated access throughout the VSA to KDS managed domain computers, users and contacts, regardless of whether these domains have a "trust" relationship between them. For example, KDS can provide a consolidated view of the domains of both a primary company and a subsidiary company.

Agent Deployment

Once domain computers are discovered, KDS supports:

  • Automatic deployment of agents on newly discovered machines
  • Manual deployment of agents on selected machines
  • Optional deployment of an agent on the system hosting the Active Directory domain.

Auto Creation of Users

KDS can create VSA users based on domain users. This means IT administrators can provide their users the same credential for the VSA and manage authentication and authorization from a single location, using the Active Directory domain.

Auto Creation of Portal Access Users

KDS sets policies that enable users to use their domain credentials to logon remotely to their machines using Portal Access. Remote access using Portal Access can be inside or outside of the company's firewall. For example, a Portal Access user might want to access their office computer from home. KDS can also manually assign and remove Portal Access to domain machines.

Auto Creation of Staff Members

A domain contact contains contact information similar to information defined for a user, but a contact has no domain logon privileges. KDS enables you to set policies that create VSA staff member records for newly discovered contacts in a domain. Creating a staff record using a KDS policy also creates a hierarchy of departments that reflects the OU/container hierarchy in the domain.

Mapping Inclusions and Exclusions

Mapping can optionally include:

  • Computers & contacts by organizational unit (OU)/container
  • VSA users by domain security group
  • VSA Portal Access users by security group

To avoid unnecessary mappings in the VSA, all objects are excluded by default.

KDS Probe

To interface with an Active Directory domain, you must have at least one Kaseya agent deployed to a computer that belongs to the domain. You then deploy a KDS probe to the domain computer. The KDS probe interfaces with Active Directory via standard LDAP calls. When deploying the KDS probe, you must provide valid domain credentials. These are used to make the LDAP calls.

Reset Password and Enable/Disable Account

Resets an domain password or enables/disables a domain user from the KDS module.

Service Desk / Ticketing

Designating a Portal Access user for a machine using KDS also auto-populates the user profile information stored in the VSA for that machine. This same user profile information auto-populates submitter information when Portal Access is used to create a Service Desk ticket or Ticketing ticket.