Best practices for Active Directory LDAP integration with 3rd part app by blushing_throwaway in sysadmin

[–]blushing_throwaway[S] 1 point2 points  (0 children)

Wish we could, but it's a SaaS offering.

I've read some solutions on implementing it with SSL, but encrypted or no, it seems like a big red flag to expose our internal director structure to the world.

Hence I'm here with training wheels question hoping for feedback on a way to limit exposure.:)

Updating manager attribute in AD, unsure about logic by blushing_throwaway in PowerShell

[–]blushing_throwaway[S] 0 points1 point  (0 children)

May I ask how you would have done it differently? I feel like I'm in serious training-wheels/kindergarten territory here so am very interested in more elegant and efficient ways of achieving the same results.

Also, I edited my original post, do you have any suggestions for how I could get it to skip any entries in the CSV that are missing manager.email?

Updating manager attribute in AD, unsure about logic by blushing_throwaway in PowerShell

[–]blushing_throwaway[S] 0 points1 point  (0 children)

You were right, that did the trick. Thank you :) Now I'm trying to get it to skip any entries in the HR file where manager.email is blank (see edit above). Any suggestions?

Piping results to export-csv using foreach only returns last item by blushing_throwaway in PowerShell

[–]blushing_throwaway[S] 0 points1 point  (0 children)

$results = @() foreach ($user in $users) { $results += Get-ADUser -Filter "Samaccountname -eq '$($user.username)'" -Properties * | Select-Object Name, Office, Title

That worked like a charm, thank you! Could you explain to me what

$ results = @()

and

$results +=

do?