Archer User Account Management

Important: This offering is available for Archer on-premise clients only.
For Archer SaaS clients, System for Cross-Domain Identity Management (SCIM) is available. SCIM is an open standard protocol designed to simplify the management of user identities and resources across different systems and domains. With Archer’s SCIM integration you can automate the process of user provisioning from your IDP systems, enabling seamless syncing of user information to Archer. 

The Archer User Account Management Tool & Utility allows organizations to create or update users from multiple data sources automating the synchronization of user accounts between the Archer Platform and the user management data source.  Instead of the Archer Platform reaching out for the user account changes, the Archer User Account Management Tool & Utility runs as a service on the client-server and pushes the user account changes to the Archer Platform.

The Archer User Account Management Tool & Utility supports the following user management data sources:

  • LDAP. Like the Archer native LDAP sync, users are created utilizing LDAP as a data source for user and group objects.  Filter options are available to ensure that only the intended source users are brought into the product.

  • Azure. This is essentially LDAP SaaS provided by Microsoft.  Proper credentials are required. 

  • SQL. The tool can connect to the designated SQL database and pull values for user creation.  The value ‘as’ indicators need to match the appropriate values for mapping the user.

Archer Exchange: With the Archer Exchange, the Archer team and our trusted partners have created a broad selection of supplemental, value-added offerings to help you get your unique risk management program on the right path, right from the start. You can leverage the Archer Exchange offerings to expand the use of Archer solutions into new business processes and address specific industry, geographic, regulatory, or technical requirements. The Archer Exchange features a fast and agile development cycle, enabling quick delivery of new and updated offerings for trending issues and connections to innovative technologies.

Release notes

Document Version

Published Date

Notes

2025.12 March 2026

Bug Fix: Fixed an issue where group memberships could not be processed for external (guest) Azure users due to the #EXT# format in the User principal name

 

  1.  

Overview

As organizations grow, employees with varying roles and responsibilities increasingly utilize enterprise solutions to perform their jobs. To maintain a secure environment for their users, administrators are required to provision user accounts for all the various solutions.  With Archer, users require credentials and permissions to access the data they need to do their job. For Archer Administrators, this can become a cumbersome task provisioning Archer user account and granting the appropriate permissions and allowing users access to create and provision Archer accounts would be horrendous to manage and most likely go against corporate policies.

Archer administrators are tasked with the challenge of efficiently managing user accounts, ensuring appropriate permissions, and adhering to corporate policies. The following are the use cases for this tool:

  • Automate Deactivation of Non-Active Users: Users who are not active in Active Directory or are no longer with the organization can be scheduled for deactivation in Archer, thereby cleaning up unnecessary user profiles and freeing up allocated licenses

  • Automate Group Synchronization with Archer:  Admins can regularly sync groups by automatically synchronizing user profiles from Active Directory with their assigned groups.  For example, if a group is removed or a new group is added to a user profile, the tool will update these changes accordingly in Archer.

  • Automate User Creation in Archer:  Create user profiles in Archer based on a configured schedule from Active Directory, allowing for advance creation of profiles when a new user joins the organization.

To meet this challenge, the Archer User Account Management Tool & Utility, formerly referred to as Remote User Management (RUM), offers a robust solution for Archer on-premises clients. This tool simplifies the process by automating the synchronization of user accounts across multiple data sources such as LDAP, Azure, and SQL. It operates seamlessly as a service on your client-server infrastructure, facilitating the automated propagation of user account changes to your Archer instance.

Features and benefits

With the Archer User Account Management Tool & Utility, you can do the following activities.

  • Specify user management data source and target Archer instance

  • Create, update, or delete user accounts in the Archer Platform for on-premise environments

  • Run on-demand or schedule frequency for updating the target Archer instance

  • Log Archer user account management changes

The Archer User Account Management Tool & Utility has the following benefits.

  • Synchronization of user accounts between user management data source and the Archer platform through automation or on-demand

  • Provide a means for non-Admins (with appropriate permissions) to provision Archer accounts

Prerequisites (system requirements)

Components

Recommended software

Archer requirements

This offering has been validated on Archer Platform release 2025.12

Supported Archer environments

  • This offering only supports Archer on-premise environments.

  • Archer SaaS environments can use Archer SCIM for user account management.

Deployment requirements

On-Premise implementations can deploy the application on the server that is hosting the Archer platform. 

Network requirements

Archer User Account Management Tool & Utility should have network access to the Archer instance.

Network service account

A network service account which can connect to the source. 

 

Archer API account

A user in the Target and/or Source Archer instance(s) with sufficient permissions to read/make updates to Access Control. 

Note that there is no specific “API” user type.  Merely assign a user with the correct permissions and name it appropriately.  For example: UAM_API_User.

Azure

Supports Graph API 1.0.  Validate your requirements for Azure API:

https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-graph-api

https://docs.microsoft.com/en-us/graph/us//e-the-api

General requirements

Very Small Single-Host Environment On-Premises Installations

Architecture diagram

Installing Archer User Account Management Tool & Utility

The main components are:

  • ArcherUserAccountManagementConsole.exe.config – Configuration and setup.

  • ArcherUserAccountManagementConsole.exe – This is the actual executable.

  1. Open the installer by double clicking on the .msi installer.

  2. Click Next.

  3. Click on I Agree and click on Nextin the license agreement page.

  4. Select the destination where it should be installed and choose the installation for as per the need and click Next. The service account will also need write permissions to this folder. It must be installed where it references its files on a mapped drive. For example: C:\UAM, vs. a UNC path, e.g., \\server\UAM.

  5. Click Next.

  6. Once the installation is complete Close the wizard.

Upgrading Archer User Account Management Tool & Utility

Back up these files prior to upgrading:

  • NLog.config

  • ArcherUserAccountManagementConfig.exe.config

  1. Open Control Panel by pressing Win+R. Write Control Panel. Click OK.

  2. Open Uninstall a program

  3. Select Archer User Account Management. Clickon Uninstall. Click on Yes.

  4. Once the uninstall process is completed run the latest .msi and follow the steps to install the msi.

Configuring the Archer User Account Management Tool & Utility

This section provides instructions for configuring the Archer User Account Management Tool & Utility within the Archer Platform.

It is assumed that the reader has both working knowledge of all products involved, and the ability to perform the tasks outlined in this section. Administrators must have access to the documentation for all products in order to install the required components.

Important: The integration described in this guide is being provided as a reference implementation for evaluation and testing purposes. It may or may not meet the needs and use cases for your organization.  If additional customizations or enhancements are needed, it is recommended that customers contact Archer Professional Services for assistance.

Implementation

Command line options

The implementation will be managed via the command line.

Command

Description

-encrypt

Encrypts the requested string so that it can be used in the product's config file in areas that require an encrypted string

The command is used as: ArcherUserAccountManagementConsole.exe -encrypt

-runonce

Runs the sync process once and then halts the process.  This same option is the default run behavior when running the console without any command parameters.

Without any other parameters, -runonce will use the default .config file, ArcherUserAccountManagementConsole.exe.config.

-runonce may be used with -configSource to specific which .config file to use.  For example:

ArcherUserAccountManagementConsole.exe -runonce -configSourcetest.config

-help

Displays help regarding the command options available to the tool's console EXE.

 

-testsource

Validates that the Source Archer environment is accessible.  By itself, -testsource uses the source specified under SourceArcherBaseUrl in the default .config file, ArcherUserAccountManagementConsole.exe.config. 

When used with the -configSource option, the source in that specific file will be validated.  For example: ArcherUserAccountManagementConsole.exe -configSourcetest.config -testsource

-testtarget

Validates that the Target environment is accessible.  By itself, -testtarget uses the source specified under TargetArcherBaseUrl in the default .config file, ArcherUserAccountManagementConsole.exe.config. 

When used with the -configSource option, the target in that specific file will be validated. For example: ArcherUserAccountManagementConsole.exe -configSourcetest.config - testtarget

-configSource

This option allows the ability to specify a specific .config file.  The default .config file, ArcherUserAccountManagementConsole.exe.config, will be used if no other is specified. Enclose the target .config file in quotes when using long filenames containing spaces.

The command is used as: ArcherUserAccountManagementConsole.exe -configSourcetest.config

It can be used with:

-runonce

-testtarget

-testsource

Configuration values:  ArcherUserAccountManagementConsole.exe.config

Assume all values in all fields are required unless noted otherwise.

Encryption for passwords and SQLConnectionString is available.

Attribute mapping options and examples are detailed in Archer User Account Management Tool Attribute Mapping Referencefile. It can be found in the documentation folder of the Archer User Account Management zip file.

Whenever config file is updated/changed Cache file in target folder should be deleted.

Troubleshooting

Causes

Solution

General items to check:

  1. Ensure that all the folders specified in the .config file exist in the target folder.

  2. Ensure it is referencing itself on a mapped drive – C:\ - vs a UNC - \\server\UAM.

  3. Ensure the values in the configuration file match your Archer environment.

  4. The Archer instance name is case sensitive.

  5. If you are changing the Archer URL in the config file, ensure that you have deleted the previously used cache file.

  6. Ensure that dedicated, active Archer user account credentials are used in the configuration file.

  7. It is suggested to use different target cache folders if the target is the same instance for multiple config files.

What if it says that the token is incorrect?

  1. Validate that the API user password is correct, the user has and appropriate role and that the “Force Password Change” is not selected.

  2. Use the Encrypt option in the Tools menu to encrypt the password.  This is the password which needs to be put into these fields.  Encryption is not required.

  • SourceArcherPassword

  • TargetArcherPassword

  • LDAPPassword

  • SQLConnectionString

  • SourceWebProxy/TargetWebProxy – If the proxy requires a password in the header.

  1. Use different Source and Target API users.  The login sessions will collide if the source/target happen to be the same instance, for some reason.  This will not be the case if when using different instances, but it is good practice, nonetheless.

BaseLoad and CacheMode operations

 

Filters for configuring LDAP

Use a tool, such as Microsoft Active Directory Explorer for example, to assist in determining the filters required for configuring LDAP. (Archer does not support Active Directory Explorer.)

Certification environment

Date tested: February 2026

Product Name

Version Information

Operating System

Archer

2025.12

Virtual Appliance