Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Contacts in Active Directory

Posted on 2008-10-23
1
Medium Priority
?
271 Views
Last Modified: 2010-03-17
Our organization is evaluating Active Directory as a metabase for user authorization from multiple systems.  We have many employees that do not have computer access and thus we do not wish to create User accounts for them.  We are considering creating these users as contacts so that we may look up their employee ID, departmental and management info.  What we are wondering is how difficult is it to "promote" an employee from a contact to a user?  How hard is it to "demote" a user back to a contact?  We are aware that there are scripted solutions that involve reading an existing contact, creating a new user, copying information from one entry to another and then deleting the original, but are there other methods?  
0
Comment
Question by:NBquery
1 Comment
 
LVL 18

Accepted Solution

by:
exx1976 earned 250 total points
ID: 22787276
I would think the only method would be to create the other object type and copy the data.  I mean, they are different types of objects..  That's like saying you want to promote your cat to be a dog or vice-versa..

0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Microsoft Office 365 is a subscriptions based service which includes services like Exchange Online and Skype for business Online. These services integrate with Microsoft's online version of Active Directory called Azure Active Directory.
Transferring FSMO roles is done when an admin wants to split roles between certain Domain Controllers or the Domain Controller holding the Roles has been forcefully demoted using dcpromo / forceremoval
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Suggested Courses

885 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question