Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Contacts in Active Directory

Posted on 2008-10-23
1
Medium Priority
?
269 Views
Last Modified: 2010-03-17
Our organization is evaluating Active Directory as a metabase for user authorization from multiple systems.  We have many employees that do not have computer access and thus we do not wish to create User accounts for them.  We are considering creating these users as contacts so that we may look up their employee ID, departmental and management info.  What we are wondering is how difficult is it to "promote" an employee from a contact to a user?  How hard is it to "demote" a user back to a contact?  We are aware that there are scripted solutions that involve reading an existing contact, creating a new user, copying information from one entry to another and then deleting the original, but are there other methods?  
0
Comment
Question by:NBquery
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 18

Accepted Solution

by:
exx1976 earned 250 total points
ID: 22787276
I would think the only method would be to create the other object type and copy the data.  I mean, they are different types of objects..  That's like saying you want to promote your cat to be a dog or vice-versa..

0

Featured Post

VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Group policies can be applied selectively to specific devices with the help of groups. Utilising this, it is possible to phase-in group policies, over a period of time, by randomly adding non-members user or computers at a set interval, to a group f…
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…
This video shows how to use Hyena, from SystemTools Software, to update 100 user accounts from an external text file. View in 1080p for best video quality.

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question