Active Directory V2

Version: 2.2
Updated: Dec 19, 2023
Utilize user, group, and system information from Active Directory.
Actions​
- Get System Attributes (Enrichment) - Gather system attributes.
- Get User Attributes (Enrichment) - Gather user attributes.
- Group Attributes (Enrichment) - Gather group attributes.
- List Users Groups (Enrichment) - Gather user's groups.
- Create User (*Containment) - Create a new user.
- Reset Password (Containment) - Reset a user's password.
- Set Password (Containment) - Set a new password.
- Set User Attributes (Containment) - Set a system's attribute.
- Set User's Attributes (Containment) - Set a user's attributes.
- Change System OU (Containment) - Change a system's organizational unit (OU).
- Enable User (Containment) - Enable a user account.
- Disable User (Containment) - Disable a user's account.
- Remove Users From Groups (Containment) - Remove users from AD group.
- Get Groups Members (Containment) - Retrieve users from AD group.
- Add Users To Groups (Containment) - Add a user to a group.
Notes​
Compatibility notice:
- LDAP over TLS only work on 636, 3269 (secure) ports but STARTTLS; only work with 389, 3268 (non-secure ports).
- LDAP over TLS required to have a CA Certificate of the active directory as Base64 encoded format.
External Libraries​
Active Directory V2 configuration​
Prerequisites​
- An Automation Bridge installation.
- A Microsoft Windows Server with Active Directory Domain Services (AD DS) configured.
Setting up Microsoft Windows Server (optional)​
If an existing Windows Server is not available, follow these steps to set up a new one in AWS:
- Create a Microsoft Windows Server 2019 Instance on AWS.
- Launch a new AWS EC2 instance.
- Choose Microsoft Windows Server 2019 Base as the AMI.
- Configure instance settings (for example, instance type, storage, security groups).
- Assign a key pair for secure access.
- Deploy the instance and wait for it to be fully initialized.
- Configure the Windows Server.
- Connect to the instance using Remote Desktop Protocol (RDP).
- Once logged in, open Server Manager.
- Install Active Directory Domain Services (AD DS).
- In Server Manager, select Add roles and features.
- Choose Role-based or feature-based installation.
- Select the Active Directory Domain Services (AD DS) role.
- Proceed with the installation and wait for it to complete.
- In Server Manager, select Add roles and features.
- Promote the server to a domain controller.
- After installation, navigate to Server Manager > AD DS.
- Click on Promote this server to a domain controller.
- Choose Add a new forest and provide a root domain name (for example,
csoar.com
). - Configure Domain Controller Options.
- Set a Directory Services Restore Mode (DSRM) password.
- Complete the installation and restart the server.
- Verify Active Directory setup.
- After rebooting, log back in and open Active Directory Users and Computers.
- Verify that the domain is properly configured.
Configure Active Directory V2 in Automation Service and Cloud SOAR​
Before you can use the integration, you must configure it so that the vendor can communicate with Sumo Logic. For general guidance, see Configure Authentication for Integrations.
Required resources from an existing Active Directory installation​
To configure the Automation Service or Cloud SOAR to connect to an existing Active Directory installation, enter details about the Active Directory instance in the new resource configuration dialog:
- Access integrations in the Automation Service or Cloud SOAR.
- After the list of the integrations appears, search for the Active Directory V2 integration and click on the row.
- The integration details will appear. Click on the + button to add a new resource.
- Populate all the required fields (*), including:
- Host. The hostname or IP address of the AD server.
- Login Port. The port used for LDAP authentication (the default is
389
for LDAP and636
for LDAPS). - Login DN (Distinguished Name). Enter the distinguished name format (for example,
CN=Administrator,CN=Users,DC=csoar,DC=com
). See the following sections for information about how to get the login DN. - Password. The corresponding password for the provided username.
- Click SAVE.
How to get login DN with a local account​
Method 1: Using PowerShell (Get-ADUser)​
- Open PowerShell as an administrator.
- Run the following command:
Get-ADUser -Identity Administrator | Select-Object DistinguishedName
- Example output:
DistinguishedName
-----------------
CN=Administrator,CN=Users,DC=csoar,DC=com
The DistinguishedName
field contains the full LDAP path.
Method 2: Using Active Directory Users and Computers (GUI)​
- Open Active Directory Users and Computers (ADUC) (dsa.msc).
- Enable "Advanced Features" by selecting View > Advanced Features.
- Navigate to the user account (for example, Administrator).
- Right-click the user and select Properties.
- Go to the Attribute Editor tab.
- Find the
distinguishedName
attribute. The value will be like:CN=Administrator,CN=Users,DC=csoar,DC=com
. This is your Login DN.
How to get login DN with a service account​
Once the service account is created in the Organization Unit:
- Open PowerShell as an administrator.
- Run the following command:
Get-ADUser -Identity <service-account-name>
- To view all the service accounts inside AD:
Get-ADUser -Filter * | Select-Object Name, SamAccountName, DistinguishedName
- Example output:
- Below is the example path:
- Add the
distinguishedName
as the Login DN and correct the password of the service account.
Below is the full form of each term:
Change Log​
- March 25, 2021 - First upload
- March 11, 2022 - Logo
- June 21, 2023 (v2.1) - Updated the integration with Environmental Variables
- December 19, 2023 (v2.2)
- Updated action: User Attributes
- Now, with the User Attributes Action, users can be filtered based on their distinguishedName (DN)
- Updated action: User Attributes