Adobe Admin Console connector
This is a SaaS common connector. |
The Adobe admin console connector allows you to manage users and groups, as well as manage user group memberships between the Adobe admin console and IDM. You need an administrator account.
Before you start
-
Create an Adobe Admin Console developer account.
-
Create a new project. Add User Management API, choose the type of authentication OAuth server-to-server
-
From the credentials tab, get the client_id, client_secret, orgId, and scope.
Install the Adobe Admin Console connector
If you are looking for the Advanced Identity Cloud application for this connector, refer to: |
You can download any connector from Backstage, but some are included in the default deployment for Advanced Identity Cloud, IDM, or RCS. When using an included connector, you can skip installing it and move directly to configuration.
Connector | IDM | RCS |
---|---|---|
No |
No |
Download the connector .jar file from Backstage.
-
If you are running the connector locally, place it in the
/path/to/openidm/connectors
directory, for example:mv ~/Downloads/adobe-connector-1.5.20.26.jar /path/to/openidm/connectors/
-
If you are using a remote connector server (RCS), place it in the
/path/to/openicf/connectors
directory on the RCS.
Configure the Adobe Admin Console connector
Create a connector configuration using the IDM admin UI:
-
From the navigation bar, click Configure > Connectors.
-
On the Connectors page, click New Connector.
-
On the New Connector page, type a Connector Name.
-
From the Connector Type drop-down list, select Adobe Admin Console Connector - 1.5.20.26.
-
Complete the Base Connector Details.
For a list of all configuration properties, refer to Adobe Admin Console Connector Configuration -
Click Save.
When your connector is configured correctly, the connector displays as Active in the admin UI.
Refer to this procedure to create a connector configuration over REST.
Base Connector Details
-
Adobe User Management API Endpoint
: https://usermanagement.adobe.io/v2 -
Use Basic Auth For OAuth Token Neg
:true
|false
-
Max connections
: Max size of the http connection pool used. Defaults to10
. -
Connection Timeout (seconds)
: Defines a timeout for the underlying http connection in seconds. Defaults to30
.
Authentication
-
Token Endpoint
: https://ims-na1.adobelogin.com/ims/token/v3 -
Client ID
: Your Client ID. -
Client Secret
: Your Client Secret. -
Grant type
: client_credentials -
Scope
: openid, AdobeID, user_management_sdk -
orgId
: Your Organization Id
In the Scope field, the scopes must be separated by a comma. |
Object Types
If necessary, add or edit your object types to have these three objects with their properties:
__ACCOUNT__
PROPERTY NAME | TYPE | NATIVE TYPE | REQUIRED |
---|---|---|---|
|
String |
String |
NO |
|
String |
String |
YES |
|
String |
String |
NO |
|
String |
String |
NO |
|
String |
String |
NO |
|
String |
String |
NO |
|
String |
String |
YES |
|
boolean |
boolean |
NO |
|
boolean |
boolean |
NO |
|
String |
String |
NO |
|
Array |
String |
NO |
__GROUP__
PROPERTY NAME | TYPE | NATIVE TYPE | REQUIRED |
---|---|---|---|
|
String |
String |
NO |
|
String |
String |
YES |
|
String |
String |
NO |
|
String |
String |
NO |
|
String |
String |
NO |
|
Integer |
Integer |
NO |
|
String |
String |
NO |
|
String |
String |
NO |
If configuring the connector over REST or through the filesystem, specify the connection details to the Adobe resource provider in the configurationProperties
for the connector. If you are using OAuth for your connection, the minimum required properties are scope
, orgId
, grantType
, serviceUri
, tokenEndpoint
, clientId
, and clientSecret
.
On startup, IDM encrypts the value of the clientSecret
.
Sample Configuration
{
"configurationProperties" : {
"tokenExpiration" : null,
"accessToken" : null,
"serviceUri" : "https://usermanagement.adobe.io/v2",
"login" : null,
"password" : null,
"authenticationMethod" : "OAUTH",
"tokenEndpoint" : "https://ims-na1.adobelogin.com/ims/token/v3",
"clientId" : "xxxxxxxxxxxxxxxxxx",
"clientSecret" : "xxxxxxxxxxxxxxxxxx",
"refreshToken" : null,
"authToken" : null,
"acceptSelfSignedCertificates" : false,
"disableHostNameVerifier" : false,
"disableHttpCompression" : false,
"clientCertAlias" : null,
"clientCertPassword" : null,
"maximumConnections" : "10",
"httpProxyHost" : null,
"httpProxyPort" : null,
"httpProxyUsername" : null,
"httpProxyPassword" : null,
"connectionTimeout" : "30",
"grantType" : "client_credentials",
"scope" : "openid, AdobeID, user_management_sdk",
"authorizationTokenPrefix" : "Bearer",
"useBasicAuthForOauthTokenNeg" : true,
"groupReadRateLimit" : "0.09/sec",
"userReadRateLimit" : "0.41/sec",
"writeRateLimit" : "0.16/sec"
}
}
If throttling problems continue, this guide may be helpful: Improve reconciliation query performance. |
Mapping
From Adobe users to IDM Users
Attributes Grid: Where the columns represent the attribute name mapped from source to target and the necessary data transformation to synchronize successfully.
SOURCE | TARGET | TRANSFORMATION SCRIPT |
---|---|---|
|
|
N/A |
|
|
N/A |
|
|
N/A |
|
|
N/A |
|
|
N/A |
|
|
N/A |
|
|
N/A |
|
|
N/A |
|
|
N/A |
|
|
N/A |
|
|
N/A |
From IDM Users to Adobe Users
Attributes Grid: Where the columns represent the attribute name mapped from source to target and the necessary data transformation to synchronize successfully.
SOURCE | TARGET | TRANSFORMATION SCRIPT |
---|---|---|
|
|
N/A |
|
|
N/A |
|
|
N/A |
|
|
N/A |
|
|
N/A |
|
|
N/A |
|
|
N/A |
From Adobe groups to IDM Groups
Attributes Grid: Where the columns represent the attribute name mapped from source to target and the necessary data transformation to synchronize successfully.
SOURCE | TARGET | TRANSFORMATION SCRIPT |
---|---|---|
|
|
N/A |
|
|
N/A |
|
|
N/A |
|
|
N/A |
|
|
N/A |
|
|
N/A |
|
|
N/A |
|
|
N/A |
From IDM Groups to Adobe groups
Attributes Grid: Where the columns represent the attribute name mapped from source to target and the necessary data transformation to synchronize successfully.
SOURCE | TARGET | TRANSFORMATION SCRIPT |
---|---|---|
|
|
N/A |
|
|
N/A |
Test the Adobe Admin Console connector
Test that the connector was configured correctly:
curl \ --header "X-OpenIDM-Username: openidm-admin" \ --header "X-OpenIDM-Password: openidm-admin" \ --header 'Accept-API-Version: resource=1.0' \ --request POST \ 'http://localhost:8080/system/adobe?_action=test' { "name": "", "enabled": true, "config": "config/provisioner.openicf/", "connectorRef": { "bundleVersion": "1.5.20.26", "bundleName": "org.forgerock.openicf.connectors.adobe-connector", "connectorName": "org.forgerock.openicf.connectors.adobe.AdobeConnector" }, "displayName": "Adobe Admin Console Connector", "objectTypes": [ "__GROUP__", "__ACCOUNT__", "__ALL__", ], "ok": true }
User
Create user
To create a user, it is necessary to provide at least the email
and type
fields. The possible values for the type
field are adobeID, federatedID, and enterpriseID (case insensitive).
To add groups or product profiles to a user, you must use the __GROUPS__
field. To do this, you need to provide the corresponding IDs.
The country field of a set cannot be updated. If not sent, it defaults to the country of the domain name. When creating a user, the username field is initially set to be the same as the email address; however, this username field can be modified later through user profile updates:
curl \ --header "X-OpenIDM-Username: openidm-admin" \ --header "X-OpenIDM-Password: openidm-admin" \ --header 'Content-Type: application/json' \ --request POST \ --data '{ "email" : "john.doe@domain1.com", "type" : "adobeID", "firstName" : "John", "lastName" : "Doe", "lastName" : "US", "__GROUPS__" : [ "groupId", "groupId", ] }' \ 'http://localhost:8080/system/adobe/__ACCOUNT__?_action=create' { "_id" : "john.doe@domain1.com", "id" : "userID", "email" : "john.doe@domain1.com", "username" : "john.doe@domain1.com", "orgSpecific": true, "businessAccount": true, "firstName" : "John", "lastname" : "Doe", "type" : "adobeID", "__NAME__" : "john.doe@domain1.com", "status" : "active", "country" : "US", "__GROUPS__" : [ "groupId" "groupId" ] }
Get Users
Retrieve a list of users from Adobe Admin Console. To paginate the results, the parameter pageSize must have a value greater than 1. The size of each page is 2,000 except, for the first page, which can contain fewer results due to technical users not being retrieved. By default, all users are retrieved.
curl \ --header "X-OpenIDM-Username: openidm-admin" \ --header "X-OpenIDM-Password: openidm-admin" \ --header 'Content-Type: application/json' \ --request GET \ 'http://localhost:8080/openidm/system/adobe/__ACCOUNT__?_queryFilter=true' { "result": [ { "_id": "email@domain1.com", "__GROUPS__": [ "groupId" ], "id": "userID", "country": "US", "email": "email@domain1.com", "orgSpecific": true, "username": "email@domain1.com", "businessAccount": true, "firstname": "John", "__NAME__": "john.doe@domain1.com", "type": "adobeID", "status": "active", "lastname": "Doe" }, /… ], "resultCount": 999, "pagedResultsCookie": null, "totalPagedResultsPolicy": "NONE", "totalPagedResults": -1, "remainingPagedResults": -1 }
Get user
Retrieve a user from Adobe Admin Console. The user email must be provided in the URI path.
curl \
--header "X-OpenIDM-Username: openidm-admin" \
--header "X-OpenIDM-Password: openidm-admin" \
--header 'Content-Type: application/json' \
--request GET \
'http://localhost:8080/openidm/system/adobe/__ACCOUNT__/USER_EMAIL'
{
"_id" : "email@domain1.com",
"email" : "email@domain1.com",
"firstname" : "John",
"lastname" : "Doe",
"username" : "email@domain1.com",
"type" : "adobeID",
"status" : "active",
"orgSpecific" : true,
"businessAccount" : true,
"__GROUPS__" : [
"groupId1",
"groupId2",
]
}
Get users type
Retrieves Adobe users only by displaying type
and _id
field.
By default, retrieves all users:
curl \ --header "X-OpenIDM-Username: openidm-admin" \ --header "X-OpenIDM-Password: openidm-admin" \ --header 'Content-Type: application/json' \ --request GET \ 'http://localhost:8080/openidm/system/adobe/__ACCOUNT__?_queryFilter=true&_fields=type' { "result": [ { "_id" : "email1@domain.com", "type": "adobeID" { "_id" : "email2@domain.net", "type": "federatedID" }, { "_id" : "email3@domain.org", "type": "enterpriseID" } ], "resultCount": 999, "pagedResultsCookie": null, "totalPagedResultsPolicy": "NONE", "totalPagedResults": -1, "remainingPagedResults": -1 }
Update user
Only enterprise or federated users can be updated.
The fields that can be updated are firstname
, lastname
, username
, and __GROUPS__
.
The user email must be provided in the URI path:
curl \
--header "X-OpenIDM-Username: openidm-admin" \
--header "X-OpenIDM-Password: openidm-admin" \
--header 'Content-Type: application/json' \
--request PUT \
--data '{
"firstname" : "Jonny",
"lastname" : "Doo",
"username" : "jonnydoo",
"__GROUPS__" : [
"groupId1",
"groupId2",
]
}' \
'http://localhost:8080/system/adobe/__ACCOUNT__/USER_EMAIL'
{
"_id": "john.doe@domain1.com",
"id": "userID",
"firstname": "Jonny",
"username": "jonnydoo",
"lastname": "Doo",
"email": "john.doe@domain1.com",
"orgSpecific": true,
"status": "active",
"businessAccount": true,
"country": "US",
"type": "federatedID",
"__NAME__": "userjd",
"__GROUPS__": [
"groupId1",
"groupId2"
]
}
Delete user
Delete a user from the Adobe organization. The user email must be provided in the URI path:
curl \
--header "X-OpenIDM-Username: openidm-admin" \
--header "X-OpenIDM-Password: openidm-admin" \
--header 'Content-Type: application/json' \
--request DELETE \
'http://localhost:8080/openidm/system/adobe/__ACCOUNT__/USER_EMAIL'
{
"_id": "john.doe@domain1.com",
"id": "946F1E3A65DDEA2A0A495CEB@196c1e336579f87e495faa.e",
"firstname": "John",
"username": "userjd",
"lastname": "Doe",
"email": "john.doe@domain1.com",
"orgSpecific": true,
"status": "active",
"businessAccount": true,
"country": "US",
"type": "federatedID",
"__NAME__": "userjd",
"__GROUPS__": [
"groupId"
]
}
GROUPS
Create group
To create a group, it is necessary to at least provide groupName
field. The description
field is optional and is not returned; it is only visible from the Adobe web interface console:
curl \ --header "X-OpenIDM-Username: openidm-admin" \ --header "X-OpenIDM-Password: openidm-admin" \ --header 'Content-Type: application/json' \ --request POST \ --data '{ "groupName" : "group name", "description" : "group description" }' \ 'http://localhost:8080/openidm/system/adobe/__GROUP__?_action=create' { "_id" : "groupId", "__NAME__" : "groupId", }
Get groups
Retrieve a list of groups. To paginate the results the pageSize parameter value must be greater than 1, the size of each page is 400. By default, retrieves all users:
curl \ --header "X-OpenIDM-Username: openidm-admin" \ --header "X-OpenIDM-Password: openidm-admin" \ --header 'Content-Type: application/json' \ --request GET \ 'http://localhost:8080/openidm/system/adobe/__GROUP__?_queryFilter=true' { "result": [ { "_id" : "groupId1" }, { "_id" : "groupId2" }, { "_id" : "groupId3", }, ... ], "resultCount": 999, "pagedResultsCookie": null, "totalPagedResultsPolicy": "NONE", "totalPagedResults": -1, "remainingPagedResults": -1 }
Get group
Retrieve a group, only the _id
field can be displayed. The group id must be provided in the URI path:
curl \
--header "X-OpenIDM-Username: openidm-admin" \
--header "X-OpenIDM-Password: openidm-admin" \
--header 'Content-Type: application/json' \
--request GET \
'http://localhost:8080/openidm/system/adobe/__GROUP__/GROUP_ID'
{
"_id" : "groupId",
"__NAME__" : "groupId"
}
Update a group
The field that can be updated for a group is description
. The group description is only visible from the web interface console. The group id must be provided in the URI path:
curl \
--header "X-OpenIDM-Username: openidm-admin" \
--header "X-OpenIDM-Password: openidm-admin" \
--header 'Content-Type: application/json' \
--request PUT \
--header 'If-Match: *' \
--data '{
"description" : "New Description"
}' \
'http://localhost:8080/openidm/system/adobe/__GROUP__/GROUP_ID'
{
"_id" : "groupId",
"__NAME__" : "groupId",
}
Delete a group
The group id must be provided in the URI path:
curl \
--header "X-OpenIDM-Username: openidm-admin" \
--header "X-OpenIDM-Password: openidm-admin" \
--header 'Content-Type: application/json' \
--request DELETE \
'http://localhost:8080/openidm/system/adobe/__GROUP__/GROUP_ID'
{
"_id" : "groupId",
"__NAME__" : "groupId"
}
OpenICF Interfaces Implemented by the Adobe Admin Console Connector
The Adobe Admin Console Connector implements the following OpenICF interfaces. For additional details, see ICF interfaces:
- Create
-
Creates an object and its
uid
. - Delete
-
Deletes an object, referenced by its
uid
. - Schema
-
Describes the object types, operations, and options that the connector supports.
- Script on Connector
-
Enables an application to run a script in the context of the connector.
Any script that runs on the connector has the following characteristics:
-
The script runs in the same execution environment as the connector and has access to all the classes to which the connector has access.
-
The script has access to a
connector
variable that is equivalent to an initialized instance of the connector. At a minimum, the script can access the connector configuration. -
The script has access to any script arguments passed in by the application.
-
- Search
-
Searches the target resource for all objects that match the specified object class and filter.
- Test
-
Tests the connector configuration.
Testing a configuration checks all elements of the environment that are referred to by the configuration are available. For example, the connector might make a physical connection to a host that is specified in the configuration to verify that it exists and that the credentials that are specified in the configuration are valid.
This operation might need to connect to a resource, and, as such, might take some time. Do not invoke this operation too often, such as before every provisioning operation. The test operation is not intended to check that the connector is alive (that is, that its physical connection to the resource has not timed out).
You can invoke the test operation before a connector configuration has been validated.
- Update
-
Updates (modifies or replaces) objects on a target resource.
Adobe Admin Console Connector Configuration
The Adobe Admin Console Connector has the following configurable properties:
Basic Configuration Properties
Property | Type | Default | Encrypted(1) | Required(2) |
---|---|---|---|---|
|
|
|
|
Yes |
The service endpoint URI. |
||||
|
|
|
|
Yes |
Your organizations unique ID, for example 12345@AdobeOrg. |
||||
|
|
|
|
Yes |
The service login name. |
||||
|
|
|
|
Yes |
Defines throttling for read operations either per seconds ("30/sec") or per minute ("100/min"). |
||||
|
|
|
Yes |
No |
The service user password. |
||||
|
|
|
|
Yes |
Defines throttling for read operations either per seconds ("30/sec") or per minute ("100/min"). |
||||
|
|
|
|
Yes |
Defines which method is to be used to authenticate on the remote server. Options are BASIC (username/password), OAUTH (Client id/secret) or TOKEN (static token). |
||||
|
|
|
|
No |
When using OAUTH as authentication method, this property defines the endpoint where a new access token should be queried for (https://myserver.com/oauth2/token). |
||||
|
|
|
|
Yes |
Defines throttling for write operations (create/update/delete) either per second ("30/sec") or per minute ("100/min"). |
||||
|
|
|
|
Yes |
The client identifier for OAuth2. |
||||
|
|
|
Yes |
No |
Secure client secret for OAuth2. |
||||
|
|
|
Yes |
No |
Static authentication token. |
||||
|
|
|
|
Yes |
To be used for debug/test purposes. To be avoided in production. |
||||
|
|
|
|
Yes |
To be used for debug/test purposes. To be avoided in production. |
||||
|
|
|
|
Yes |
Content compression is enabled by default. Set this property to true to disable it. |
||||
|
|
|
|
Yes |
If TLS Mutual Auth is needed, set this to the certificate alias from the keystore. |
||||
|
|
|
Yes |
Yes |
If TLS Mutual Auth is needed and the client certificate (private key) password is different from the keystore password, set this to the client private key password. |
||||
|
|
|
|
Yes |
Defines the max size of the HTTP connection pool used. |
||||
|
|
|
|
Yes |
Defines the Hostname if an HTTP proxy is used between the connector and the service. |
||||
|
|
|
|
Yes |
Defines the Port if an HTTP proxy is used between the connector and the service. |
||||
|
|
|
|
Yes |
Defines Proxy Username if an HTTP proxy is used between the connector and the service. |
||||
|
|
|
Yes |
Yes |
Defines Proxy Password if an HTTP proxy is used between the connector and the service. |
||||
|
|
|
|
No |
Defines a timeout for the underlying HTTP connection in seconds. |
||||
|
|
|
|
No |
Used by the refresh_token grant type. |
||||
|
|
|
|
No |
The OAuth2 grant type to use (client_credentials or refresh_token). |
||||
|
|
|
|
No |
The OAuth2 scope to use. |
||||
|
|
|
|
No |
The prefix to be used in the Authorization HTTP header for Token authentication. |
||||
|
|
|
|
Yes |
The Authentication method for refresh token (Basic Authentication or Sending the ClientId and Client Secret in the Header). |
(1) Whether the property value is considered confidential, and is therefore encrypted in IDM.
(2) A list of operations in this column indicates that the property is required for those operations.