<html>
<head>
<meta content="text/html; charset=utf-8" http-equiv="Content-Type">
</head>
<body bgcolor="#FFFFFF" text="#000000">
Hi Jason,<br>
<br>
commenting/removing <credentials> .. </credentials> in
all required objectType definitions (if you have more than one
default account intent) in your AD resource is a quick and efficient
way. I'm using this safety as well.<br>
<br>
Don't forget to remove the hack after successful recon.<br>
<br>
There are also possibilities to filter <credentials> using a
<channel>. But usually I stick to just removing/commenting out
the <credentials> sections in the resource.<br>
<br>
Regarding the recon itself I recommend to run it first with "dry
run" flag to see if your correlation rule(s) is working as expected
and check the results in Configure - Shadow details for your
resource.<br>
<br>
Regards,<br>
Ivan<br>
<br>
<div class="moz-cite-prefix">On 06/15/2015 03:28 PM, Jason Everling
wrote:<br>
</div>
<blockquote
cite="mid:CAFkZXY6HiKsNkRM13VBNvhOnfrfBtgKydoJ+ksCaSUbVg48QwA@mail.gmail.com"
type="cite">
<div dir="ltr">I will be setting midPoint into Production this
coming weekend. I almost did it this past weekend but I was
fearful that all user passwords would get changed during the
first reconcile.
<div><br>
</div>
<div>How can I run a reconcile after adding the AD resource
making sure passwords are not modified?</div>
<div><br>
</div>
<div>Just comment out the credentials section in the resource?</div>
<div><br>
</div>
<div>Thanks,</div>
<div>JASON</div>
</div>
<br>
<font size="2"><br>
<br>
CONFIDENTIALITY NOTICE:<br>
This e-mail together with any attachments is proprietary and
confidential; intended for only the recipient(s) named above and
may contain information that is privileged. You should not
retain, copy or use this e-mail or any attachments for any
purpose, or disclose all or any part of the contents to any
person. Any views or opinions expressed in this e-mail are those
of the author and do not represent those of the Baptist School
of Health Professions. If you have received this e-mail in
error, or are not the named recipient(s), you are hereby
notified that any review, dissemination, distribution or copying
of this communication is prohibited by the sender and to do so
might constitute a violation of the Electronic Communications
Privacy Act, 18 U.S.C. section 2510-2521. Please immediately
notify the sender and delete this e-mail and any attachments
from your computer. </font><br>
<br>
<fieldset class="mimeAttachmentHeader"></fieldset>
<br>
<pre wrap="">_______________________________________________
midPoint mailing list
<a class="moz-txt-link-abbreviated" href="mailto:midPoint@lists.evolveum.com">midPoint@lists.evolveum.com</a>
<a class="moz-txt-link-freetext" href="http://lists.evolveum.com/mailman/listinfo/midpoint">http://lists.evolveum.com/mailman/listinfo/midpoint</a>
</pre>
</blockquote>
<br>
<pre class="moz-signature" cols="72">--
Ing. Ivan Noris
Senior Identity Management Engineer & IDM Architect
evolveum.com evolveum.com/blog/
___________________________________________________
"Semper Id(e)M Vix."
</pre>
</body>
</html>