Resolve SIDs into User and Group Names
To generate the Access Control Lists (ACLs) that are necessary to support mapped security, the connector might need to resolve SIDs into user and group names.
- If your users and groups are managed in an on-premise Active Directory, the connector can resolve SIDs through LDAP. Configure the connection to Active Directory by setting the
LdapServer
,LdapPort
,LdapUsername
, andLdapPassword
configuration parameters in your fetch task. -
If you are using SharePoint Online with users and groups from Microsoft Azure Active Directory, the connector can resolve SIDs through the Microsoft Graph API. To use the Microsoft Graph API you must create an OAuth application to represent the connector, and run the OAuth configuration tool to obtain the OAuth tokens that the connector needs to authenticate with the API.
TIP: Micro Focus recommends that you configure OAuth as described in Set up an OAuth Service Application.