6.11 Matching - Publisher Mirrored

This rule finds matches in the Identity Vault for objects in the connected system based on their name and location. Implement the rule on the Publisher Matching policy in the driver.

There are two steps involved in using the predefined rules: creating a policy in the Matching policy set, and importing the predefined rule. If you already have a Matching policy that you want to add this rule to, skip to Importing the Predefined Rule.

6.11.1 Creating a Policy

  1. Open the Identity Manager Driver Overview for the driver you want to manage.

  2. Click the Matching Policy object on the Publisher channel.

  3. Click Insert.

  4. Name the policy, make sure to implement the policy with the Policy Builder, then click OK.

    The Rule Builder is launched.

  5. Continue with Section 6.11.2, Importing the Predefined Rule.

6.11.2 Importing the Predefined Rule

  1. In the Rule Builder, click Insert.

  2. Select Matching - Publisher Mirrored.

    Matching - publisher mirrored
  3. To edit the rule, click Matching - Publisher Mirrored in the Rule Builder.

  4. Delete [Enter base of source hierarchy] from the Value field.

  5. Browse to the container in the source hierarchy where you want the matching to start, then click OK.

  6. Click OK.

  7. Delete [Enter base of destination hierarchy] from the Enter string field.

  8. Click on the Edit Arguments icon to launch the Argument Builder.

  9. Select Text in the Noun list, then click Add.

  10. In the Editor, click the browse button, then browse to and select the container in the destination hierarchy where you want the source structure to be matched, then click OK.

  11. Click OK.

6.11.3 How the Rule Works

When an Add event occurs on an object in the connected system that is located within the specified source subtree, the rule constructs a DN that represents the same object name and location within the Identity Vault relative to the specified destination subtree. If the destination objects exists and is of the desired object class then it is considered a match. You must supply the DNs of the source (connected system) and destination (Identity Vault) subtrees.