Solved

Contacts in Active Directory

Posted on 2008-10-23
1
264 Views
Last Modified: 2010-03-17
Our organization is evaluating Active Directory as a metabase for user authorization from multiple systems.  We have many employees that do not have computer access and thus we do not wish to create User accounts for them.  We are considering creating these users as contacts so that we may look up their employee ID, departmental and management info.  What we are wondering is how difficult is it to "promote" an employee from a contact to a user?  How hard is it to "demote" a user back to a contact?  We are aware that there are scripted solutions that involve reading an existing contact, creating a new user, copying information from one entry to another and then deleting the original, but are there other methods?  
0
Comment
Question by:NBquery
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 18

Accepted Solution

by:
exx1976 earned 125 total points
ID: 22787276
I would think the only method would be to create the other object type and copy the data.  I mean, they are different types of objects..  That's like saying you want to promote your cat to be a dog or vice-versa..

0

Featured Post

Has Powershell sent you back into the Stone Age?

If managing Active Directory using Windows Powershell® is making you feel like you stepped back in time, you are not alone.  For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Last week, our Skyport webinar on “How to secure your Active Directory” (https://www.experts-exchange.com/videos/5810/Webinar-Is-Your-Active-Directory-as-Secure-as-You-Think.html?cid=Gene_Skyport) provided 218 attendees with a step-by-step guide for…
This article demonstrates probably the easiest way to configure domain-wide tier isolation within Active Directory. If you do not know tier isolation read https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/s…
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

751 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question