[2 days left] What’s wrong with your cloud strategy? Learn why multicloud solutions matter with Nimble Storage.Register Now

x
?
Solved

How can I Manage BES 5.0 Cals with AD Groups

Posted on 2010-09-03
1
Medium Priority
?
575 Views
Last Modified: 2012-08-14
Removing users from BES has become a manual process that is sometimes overllooked.  Is there a way to have BES 5.0 reconcile CALS (user accounts) with a group in AD?  So when a user is terminated, and removed from the AD group "Blackberry Users", BES would also free up the CAL.

Thanks,

Chris
0
Comment
Question by:Xeif3r
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 19

Accepted Solution

by:
-jonny- earned 2000 total points
ID: 33611975
You can do so via scripting, but not via a GUI/Web console.
The blackberry resource kit (BRK) has a tool called besuseradminclient.exe, that allows you to perform tasks such as add/remove user, change password etc from a command line.

So your best option would be to script the blackberry portion that gets triggered when a user is removed from AD.
0

Featured Post

Prepare for your VMware VCP6-DCV exam.

Josh Coen and Jason Langer have prepared the latest edition of VCP study guide. Both authors have been working in the IT field for more than a decade, and both hold VMware certifications. This 163-page guide covers all 10 of the exam blueprint sections.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Group policies can be applied selectively to specific devices with the help of groups. Utilising this, it is possible to phase-in group policies, over a period of time, by randomly adding non-members user or computers at a set interval, to a group f…
After seeing many questions for JRNL_WRAP_ERROR for replication failure, I thought it would be useful to write this article.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

649 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question