Learn about best practices for configuring domains for
the Cloud Identity Engine.
On-Premises Active Directory Domains
A
single Cloud Identity agent can communicate with multiple domains.
The service account you use to query the Active Directory must have
permission to query all domains you configure on the agent. We recommend
configuring multiple domain controllers for each domain so that
if a domain controller is unavailable, the agent can try the next
available domain controller.
To ensure agent redundancy for
a domain, configure multiple agents for that domain. The server
hosting the agent should be physically located near the domain controllers
from which the agent will collect attributes. If the domain controllers
are in different locations, we recommend that you configure multiple agents
and install each agent on a host server that is physically located
near the domain controllers from which the agent will collect attributes.
To
obtain cross-domain memberships for groups with members from other domains
in the forest, configure those domains on the Cloud Identity agent(s).
In this scenario, you must configure the agent to connect to the
domain controllers using the LDAP or LDAPS port (by default, 389
and 636 respectively).
When you configure the Active Directory
in the Cloud Identity agent, do not configure the agent to use the
Global Catalog port (3268 for LDAP or 3269 for LDAPS).