What access should be granted to the service account used by RSA Identity Governance & Lifecycle to fully support Active Directory collection and Access Fulfilment Express (AFX) fulfillment?
Originally Published: 2018-05-05
Article Number
Applies To
RSA Version/Condition: All
Issue
Find all of the the Collector and Connector datasheets (aka Application Guides) on RSA Link.
Resolution
"Domain Account Name Admin account name to use for the collection and provisioning activities
Login Distinguished Name Administrator login- id with write permission on required tree scope
Bind DN Distinguished Name of the user on AD permitted to search
the directory within the defined search base. E.g.
Domain\Administrator
To configure RSA Identity Governance and Lifecycle ADC to collect data from Domain2 using the Domain1 administrator: "
Hence, the account needs to be an administrator's account which by default has all privileges to fully support Active Directory collection and AFX fulfillment to Active Directory.
Related Articles
Request a Cloud Access Service Account 28Number of Views SA : Using specific admin account did not get all the configuration within a service 5Number of Views Help Scout - SAML My Page SSO Configuration - RSA Ready Implementation Guide 10Number of Views User ID does not have the correct service account role error when trying to authenticate using an RSA Authentication Manag… 83Number of Views Active Directory AFX 'Disable/Enable an Account' connector capabilities do not update added parameters in RSA Identity Gov… 232Number of Views
Trending Articles
Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.9 Release Notes (January 2026) How to factory reset an RSA Authentication Manager 8.x hardware appliance without a factory reset button from the Operatio… Deploying RSA Authenticator 6.2.2 for Windows Using DISM Artifacts to gather in RSA Identity Governance & Lifecycle
Don't see what you're looking for?