Active Directory & OpenLDAP Access Requirements
Active Directory & OpenLDAP Access Requirements
Active Directory & OpenLDAP Access Requirements
The Moveworks service account in AD/LDAP is typically granted permissions to read users/groups, manipulate user group additions, and read/modify user profile attributes (for unlocking accounts). Below, we list the needed permissions.
If configured, the Moveworks bot can:
To do this, at a high level, the bot uses a Moveworks service account in AD with the following permissions:
Note: While the Moveworks bot can read from multiple domains, native access skills such as adding users to email groups and unlocking accounts can only be access from one domain.
For the Active Directory integration, please gather the following account details for the AD Service Account:
For all users who will use the bot (typically employees and contractors), the Moveworks service account in Active Directory needs permission to list users and groups across OUs, and it needs permission to write to user profiles in order to unlock accounts.
We recommend granting Read access to all user attributes. Examples include the user’s department, user’s manager, and password last-set date, however if you need to scope down granular access the following permissions are required:
distinguishedName (CN) - Used to identify users uniquely when querying Active Directory.mail - Used to identify users across systems.department - Used to show in People lookup cardsmanager - Used to show in People lookup cards and approvalslocation - Used to show in People lookup cardsphone number - Used to show in People lookup cardsuserAccountControl - Used to filter out disabled or expired userswhenCreated - To track newly created accountsobjectCategory - Used to filter query only for relevant objectsobjectClass - Used to filter query only for relevant objectslastLogon - Used to check if the user is active or notIn addition to the attributes above, you may need to grant read or write access to other attributes based on the skills you select to deploy in the Moveworks bot:
pwdLastSet and/or msDS-UserPasswordExpiryTimeComputed attributesAccountExpires attribute.lockoutTime and **msDS-User-Account-Control-Computed**and Write access to the lockoutTime attribute.memberOf attribute.For groups management, the Moveworks service account in Active Directory needs the following permissions:
In Active Directory, these permissions are modeled as follows:
namedescriptiondisplayNamegroupTypemailaliasmanagedBymembersproxyAddressessAMAccountNameTo connect with your on-premises system, Moveworks relies on the Moveworks Agent, a container-based application that runs behind your firewall and proxies the interaction between your On-premises system, and the Moveworks Platform.
Network Requirements
The machine/VM running the Moveworks Agent should have an IP address within a whitelisted static IP address range so that it can communicate with the On-premises system.
The machine/VM must be able to communicate outbound to the following endpoint based on your environment:
US Region: agent.moveworks.com
US GovCloud Region: agent.moveworksgov.com
EU Region: agent.am-eu-central.moveworks.com
Canada Region: agent.am-ca-central.moveworks.com
Australia Region: agent.am-ap-southeast.moveworks.com
Machine Requirements
Moveworks recommends using a system with the following requirements, which are the same as “t3.medium” if hosted in AWS or a “B2” if hosted in Azure.
OS Requirements:
Staff Requirements
Configuring the Moveworks agent takes approximately one hour, and is typically done by a member of your organization’s infrastructure team (preferably with hands-on Linux experience). The setup can be handled end to end by your team or can be done over a guided set up call with your Moveworks Customer Success Engineer. Additional meetings may be required based on complexity of issues found during initial installation. e.g: network issues, firewall issues, permission issues, etc.