Add Custom AD Account Attributes in the LDAP connection settings. Standard imported attributes from AD cannot be added as custom attributes. For example, if you want to add the standard accountExpires
attribute
as a custom attribute, KUMA will return an error when saving the connection settings. The following account attributes can be requested from Active Directory:
accountExpires
badPasswordTime
cn
co
company
department
description
displayName
distinguishedName
division
employeeID
givenName
l
lastLogon
lastLogonTimestamp
Mail
mailNickname
managedObjects
manager
memberOf
(this attribute can be used for search during correlation)mobile
name
objectCategory
objectGUID
(this attribute always requested from Active Directory even if a user doesn't specify it)objectSID
physicalDeliveryOfficeName
pwdLastSet
sAMAccountName
sAMAccountType
sn
streetAddress
telephoneNumber
title
userAccountControl
UserPrincipalName
whenChanged
whenCreated
After you add custom attributes in the LDAP connection settings, the LDAP attribute to receive drop-down list in the collector automatically includes the new attributes. Custom attributes are identified by a question mark next to the attribute name. If you added the same attribute for multiple domains, the attribute is listed only once in the drop-down list. You can view the domains by moving your cursor over the question mark. Domain names are displayed as links. If you click a link, the domain is automatically added to LDAP accounts mapping if it was not previously added.
If you deleted a custom attribute in the LDAP connection settings, manually delete the row containing the attribute from the mapping table in the collector. Account attribute information in KUMA is updated each time you import accounts.