This topic describes how to create, modify, move, and delete an account in the IDaaS console.

Create an account (new recruit)

You can create an account for a new recruit in the IDaaS console.

Procedure

  1. Log on to the IDaaS console as an IT administrator. For more information, see Logon in Administrator Guide.
  2. In the left-side navigation pane, choose Users > Organizations and Groups.
  3. In the OUs window on the left, find the organization to which the account to be created belongs and click its name.
    Note You can also right-click the target organization in the left window and choose Add > Account from the shortcut menu. After this operation, go directly to step 5.
  4. In the parent node organization information window on the right, click the Account tab. Click Create Account.
    Note You can also choose Position Change > Enroll in the top navigation bar of the right window.
  5. In the Create Account dialog box that appears, click the Account Attributes tab and configure the following parameters.
    Parameter Description
    Parent OU The parent node of the account.
    Display Name The display name or alias of the account. It must be 2 to 18 characters in length.
    Account Name The logon name of the account. The name can contain uppercase letters, lowercase letters, digits, hyphens (-), underscores (_), and periods (.). It must be 4 to 18 characters in length.
    Password The password of the account. The password must contain uppercase letters, lowercase letters, digits, and special characters. It must be six or more characters in length.
    Email The email address associated with the account.
    Note The email address or phone number is required.
    Phone Number The mobile phone number associated with the account.
    Note The email address or phone number is required.
    External ID The external ID of the account. The external ID is the unique ID of an account in IDaaS. If you do not specify this parameter, it is automatically generated by IDaaS.
    Expires On The expiration date of the account. If you do not specify this parameter, the default expiration date is used.
    Remarks The remarks for the account.
  6. If you have defined extended attributes in the data dictionary, click the Extended Attributes tab to add attributes.
  7. Click the Parent Groups tab to select parent groups for the account.
  8. After configuring the parameters, click Submit.
  9. In the Incremental Provisioning dialog box that appears, perform LDAP Provisioning, Application Authorization, and SCIM Provisioning.

The new account is displayed on the Account tab of the parent organization on the right.

Modify an account

You can modify the attributes of an existing account at any time, such as the display name, associated email address or phone number, expiration data, external ID, and parent group.

Procedure

  1. Log on to the IDaaS console as an IT administrator. For more information, see Logon in Administrator Guide.
  2. In the left-side navigation pane, choose Users > Organizations and Groups.
  3. In the OUs window on the left, find the organization to which the account to be modified belongs and click its name.
  4. In the parent node organization information window on the right, click the Account tab.
  5. Find the target account from the account list and click Modify in the Actions column.
    Note You can search for an account with the account name or display name.
  6. In the Account Attributes dialog box that appears, modify the account attributes as specified in steps 5, 6, and 7 in the Create an account section.
  7. After configuring the parameters, click Submit.
  8. After modifying the account attributes, you can provision the latest account information to the applications that the current organization has been authorized to access.
    1. Go to the parent node organization information window.
    2. Click the Account tab. Find the target account and click Provision Account in the Actions column.
    3. In the Provision Account dialog box that appears, select the applications to receive the provisioned account from the authorized third-party systems.
    4. Click Provision.
    5. Check the provisioning record.

Move an account

You can move an account from an organization to another.

Procedure

  1. Log on to the IDaaS console as an IT administrator. For more information, see Logon in Administrator Guide.
  2. In the left-side navigation pane, choose Users > Organizations and Groups.
  3. In the OUs window on the left, find the organization to which the account to be moved belongs and click its name.
    Note You can also choose Position Change > Move in the top navigation bar of the right window. Search for the target account and click Move in the Actions column. After this operation, go directly to step 5.
  4. In the parent node organization information window on the right, click the Account tab. Find the target account and click Move in the Actions column.
  5. In the Account Move dialog box that appears, select the destination organization to which the account to be moved belongs in the Move To list.
  6. Confirm the authorization application information after the move operation and click Move.

Mark an account as resigned

You can mark the account for a resigned employee as resigned.

Procedure

  1. Log on to the IDaaS console as an IT administrator. For more information, see Logon in Administrator Guide.
  2. In the left-side navigation pane, choose Users > Organizations and Groups.
  3. In the OUs window on the left, find the root node for the target organization and click its name.
    Note You can also choose Position Change > Mark as Resigned in the top navigation bar of the right window. Search for the target account and click Mark as Resigned in the Actions column. After this operation, go directly to step 6.
  4. Click the Account tab. Search for the target account.
  5. Click Mark as Resigned in the Actions column.
  6. In the System Prompt message that appears, click OK.
  7. In the Incremental Provisioning dialog box that appears, perform LDAP Provisioning, Application Authorization, and SCIM Provisioning.