PrivaceraCloud Documentation

Datasource
:
LDAP/AD

This topic describes how to connect Lightweight Directory Access Protocol/Active Directory (LDAP/AD) to PrivaceraCloud for authentication, group and user management, and policy administration.

Add system
  1. Go to Settings > Datasource .

  2. Click ADD SYSTEM.

  3. Enter the system Name and Description. These are user assigned values.

    • Name: A meaningful and unique name.

    • Description (optional): A useful description of this data resource.

  4. Click Save.

Connect application
  1. On your system dialog, click the three dots menu and click Add Application.

  2. In the Application List, click LDAP/AD.

  3. Enter Application Name, Application Description, and Application Code.

    Using the IMPORT PROPERTIES button, you can browse and import application properties.

  4. Complete the remaining fields to connect to your LDAP or AD server.

  5. If you wish to use SSL, then select the LDAP SSL checkbox.

  6. In the LDAP SSL Certificate box, click the upload button and upload SSL certificate.

    Note

    Make sure the value for:

    • LDAP Authentication Mechanism is simple or anonymous.

    • LDAP BIND ANONYMOUSLY is false.

  7. If your LDAP/AD requires additional properties, include them in the Add Custom Properties checkbox.

    Note

    LDAP Connector search returns 1000 line items per page by default. For UserSync via LDAP with a large number of users/groups, it is advised to enable paging.

    For more information on how to enable paging for UserSync via LDAP, see step 2 in LDAP, AD, or AAD Connection.

  8. Click the TEST CONNECTION button to check if the connection is successful, and then click Save.

For more information on how to customize user details on synchronization, see Customize User Details on Sync

SAML
Activate Single Sign-On (SSO)

PrivaceraCloud can be configured for SSO with an external Identity Provider (IdP). Connecting to an IdP via SAML activates use of Single Sign-On.

These are the general steps for enabling SSO:

  1. Connect an IdP to PrivaceraCloud.

  2. On the PrivaceraCloud UI, enable SSO login. For more information, see Enable only SSO login.

Effects of enabling SSO

When SSO is enabled, users can log in to PrivaceraCloud using only their SSO credentials. When enabled, you can redirect to your organization's authentication system, such as Okta or Azure.

Note

When SSO login is enabled, an account administrator can also login via SSO.

Connect IdP (Okta and Azure AD)

These steps are to connect an IdP to your PrivaceraCloud account.

Prerequisites

Establish an Okta or Azure AD account and obtain key information before configuring Privacera SAML.

For more information about Okta setup, see Okta Identity Provider Setup to obtain required SAML and metadata information.

For more information about Azure AD setup, See Azure AD setup to obtain required SAML and metadata information.

Once that information is available return to this section to complete the setup.

Steps to connect IdP

You can connect your application using existing system or add new one.

  1. On your system dialog, click the three dots menu and click Add Application.

  2. In the Application List, click SAML.

  3. Select a datasource system and open + Add Application.

  4. Select SAML.

  5. Enter Application Name, Application Description, and Application Code

  6. Enter the Application Properties details.

    The following table shows the mapping of the fields in PrivaceraCloud with the fields of the SAML app in the Okta account:

    Table 26. PrivaceraCloud and Okta fields

    PrivaceraCloud Fields

    SAML App Fields in Okta

    Values

    Description

    Entity Id

    Audience URI (SP Entity ID)

    privacera_portal

    The value of the Entity id is the same as that which is used to configure Okta or Azure.

    Identity Provider Url

    Embed Link

    URL

    Use Embed link from General > App Embed Link section in the Okta account.

    Identify Provider Metadata

    Identity Provider Metadata

    XML file

    Upload the XML metadata that you generated and saved in the Okta configuration. For more information, see IdP provider metadata

    UserName Attribute

    UserID

    UserID

    Use only the field name from Okta i.e., UserID

    Email Attribute

    Email

    Email

    Use only the field name from Okta i.e., Email

    FirstName Attribute

    FirstName

    FirstName

    Use only the field name from Okta i.e., FirstName (Optional)

    LastName Attribute

    LastName

    LastName

    Use only the field name from Okta i.e., LastName (Optional)



    The following table shows the mapping of the fields in PrivaceraCloud with the fields of the SAML app in the Azure AD account:

    Table 27. PrivaceraCloud and Azure AD fileds

    PrivaceraCloud Fields

    SAML App Fields in Azure AD

    Values

    Description

    Entity Id

    Entity ID

    privacera-portal

    The value of the entity id is the same as that which is used to configure Okta or Azure.

    Identity Provider Url

    Azure AD Identifier

    URL

    Use the copied Azure AD Identifier URL from Azure AD portal.

    Identify Provider Metadata

    Federation Metadata XML

    XML file

    Upload XML which you have downloaded from the Azure portal.

    UserName Attribute

    name

    user.userprincipalname

    It must be same as the Azure AD user used in the Attributes and Claims section.

    FirstName Attribute

    givenname

    user.givenname

    It must be same as the Azure AD givenname used in the Attributes and Claims section.

    LastName Attribute

    surname

    user.surname

    It must be same as the Azure AD user surname used in the Attributes and Claims section.

    Email Attribute

    emailaddress or name

    user.email

    It must be same as the Azure AD user email address used in the Attributes and Claims section. If the name and email address in your Azure account are the same, you can use the name instead of the email address.



  7. Click Save.

Enable only SSO login

In this topic, you will learn how to enable SSO login using the toggle button in the PrivaceraCloud portal. When enabled, users will no longer be able to sign in with their credentials.

Prerequisites
  • You need to have connected your IdP via SAML to your PrivaceraCloud account.

  • As an account administrator, you need to login to PrivaceraCloud using your SSO credentials.

Steps to enable SSO login
  1. As an account administrator, login to PrivaceraCloud using your SSO username and password.

  2. Navigate to Settings > Account.> AUTHENTICATION SETTINGS.

  3. The system displays informative messages if the prerequisites to enable SSO have not been met:

    If all prerequisites have been met, no messages are displayed.

  4. Click the Enable only SSO login (Disable login with Email and Password) toggle button.

SSO URL without login screen

By using the SSO URL given below, you can directly login into PrivaceraCloud through SSO.

Substitute the value of the <account_ID>.

https://privaceracloud.com/sso?acountId=<account_ID>
UserSync in PrivaceraCloud
UserSync: Data Access Users

This topic describes how to use UserSync in PrivaceraCloud to connect to an external resource (such as LDAP, AD, AAD, SCIM, OKTA, and SCIM Server) for the purpose of connecting, pulling, or serving as data access users.

Connect application

You can connect your application using an existing system or add a new one.

  1. On your system dialog, click the three dots menu and then Add Application.

  2. In the Application List, click USERSYNC.

  3. In the Service Type list, select the connection protocol/service you wish to connect:

    • LDAP

    • AD

    • AAD

    • SCIM (System for Cross Identity Management - Client)

    • Okta

    • SCIM-Server (System for Cross Identity Management - Server Endpoint)

  4. Enter the Connector Name , then click NEXT.

LDAP, AD or AAD connection
  1. In the BASIC tab, enter the values. See below table:

    Property

    Example

    Service URL

    "ldap://dir.privacera.us:389"

    Bind DN

    "CN=Bind User,OU=privacera,DC=ad,DC=privacera,DC=us"

    Bind Password

    as needed

    Search Base

    "DC=ad,DC=privacera,DC=us"

  2. In the ADVANCED tab, the value in the Authentication Type field must be simple.

    To enable paging for UserSync via LDAP:

    1. Select the Incremental Search check box.

    2. In the Add Custom Properties text box, set the following properties:

      usersync.connector.results.paged.enabled=true
      usersync.connector.results.paged.size=<Results_Per_Page>
    3. Click Next.

  3. The configuration wizard will advance you through the configuration pages. Complete and step through each of the pages.

    Note

    Configure Filters

    Azure Active Directory- There are the following optional fields for filtering:

    • Include Users By Domain: Add domain names to include, default value is empty

    • Exclude Users By Domain: Add domain names to exclude, default value is empty

    Okta- There are the following optional fields for filtering, select either "Equals" or "Starts with". For each of these filters that are defined, all users not included are ignored. Wildcard (*) allowed.

    • Include Users With Email

    • Include Users With First Name

    • Include Users With Last Name

  4. Complete all BASIC values, then review and update ADVANCED values as required.

  5. Click FINISH.

SCIM, OKTA and SCIM ServerPrerequisites
  • OKTA: Pull data access users and groups from Okta. PrivaceraCloud will use Okta protocols in client-mode to connect to an Okta enabled SCIM-Server. It will synchronize with the targeted server to obtain data access users and groups.

  • SCIM: Pull data access users and groups from the generic SCIM 2.0 compliant server.

  • SCIM-SERVER: Configure to allow data access users and groups to be provided (pushed) to your PrivaceraCloud account from a SCIM 2.0 client, including push integration with an Okta Identity Provider. See SCIM Server User-Provisioning for detailed setup instructions.

Steps
  1. In the BASIC tab, enter Endpoint URL and Bearer Token.

  2. Click Next.

    The configuration wizard will advance you through the configuration pages. Complete and step through each of the pages.

  3. Complete all BASIC values, then review and update ADVANCED values as required.

  4. Click FINISH.

Customize user details on sync

You can use advanced settings to perform a variety of transformations on user-related data from your Identity Provider (IdP).

  • On the Base User Attributes page, go to the ADVANCED tab.

    Then on the Customize Base LDAP Source Attribute Keys dropdown:

    • Apply to Attribute(s): Specify the names of LDAP attributes to which these customizations apply.

    • Extract from email: Extract the username portion of an email address value from the username attribute field. The username then becomes the value to the left of the @-sign of the email address.

      Caution

      Duplicate usernames map to a single username.

      Usernames in email addresses (the left-hand side of the @-sign) that are identical even if they are different domains (the right-hand side of the @-sign) are considered the same user on import.

      For example these email addresses with different domains result in the same user on PrivaceraCloud :

      • BillSmith@gmail.com

      • BillSmith@yourcompany.com

    • No Conversion: If you select any of the following conversions, this radio button is unselected.

    • Convert attribute values to lowercase. Allowable values: true or false.

    • Convert attribute values to uppercase. Allowable values: true or false.

    • Prefix to Prepend. Allowable values: String to prepend.

    • Postfix to Append. Allowable values: String to append.

    • Regex Replace Expression. Allowable values: Substitute any string represented by a regular expression with another string. Requires Linux-editor-style s command, with optional g for global replacement. Examples:

      • Regexp s/ch/AAA/g: ch (a simple string) is globally replaced with AAA.

      • Regexp s/[123]//: The first occurrence of the number 1 or 2 or 3 is removed.

      • Regexp s/a[bc]/z/: The first occurence of the letter a optionally followed by either b or c is replaced by z.

Azure Active Directory fields for UserSync

These are descriptions of fields for configuringPrivaceraCloud UserSync for Azure Active Directory.

Field name

Description

Tab in application set-up

Name

Identifying name of this connector.

Group Only

Sync only users that are members of groups. Allowable values: true or false

Attribute Only

Sync only the attributes of users already synced from other services. Allowable values: true or false

Incremental

Enable incremental search. Syncing only changes since last search. Allowable values: true or false

Service Principals as Users

Enable sync of service principals as a User. Allowable values: true or false Default: false

Manage Lists

Include Users

List of users to include from sync results. If this list is defined, all users not on this list are ignored.

Exclude Users

List of users to ignore from sync results.

Include Groups

List of groups to include from sync results. If this list is defined, all groups not on this list are ignored.

Exclude Groups

List of groups to exclude from sync results.

Connection

Account ID

Account ID

Client ID

Client ID

Client Secret

Client secret

Attributes

User Name

Attribute of a user’s name. Default: userPrincipalName.

First Name

Attribute of a user’s first name. Default: givenName.

Last Name

Attribute of a user’s last name. Default: surname.

User Email

Attribute of a user’s email. Default: userPrincipalName.

Group Name

Attribute of a group’s name. Default: displayName

Service Principal Name

Attribute of service principal name. Default: displayName

Username Attribute Modification

Extract From Email

Extract the user’s username from an email address.Example: username@domain.com extracts username.

Default: false

Advanced

Prefix

Prefix to prepend to the user’s username.

No default.

Advanced

Postfix

Postfix to append to the user’s username.

No default.

Advanced

To Lowercase

Convert the user’s username to lowercase.

Default: false

Advanced

To Uppercase

Convert the user’s username to uppercase.

Default: false

Advanced

Regex

Attribute to replace user’s username to matching regex

No default.

Advanced

Group Name Attribute Modification

Extract From Email

Extract the group’s name from an email address. Example: groupname@domain.com extracts groupname.

Default: false

Advanced

Prefix

Prefix to prepend to the group's name.

No default.

Advanced

Postfix

Postfix to append to the group's name.

No default.

Advanced

To Lowercase

Convert the group's name to lowercase.

Default: false

Advanced

To Uppercase

Convert the group’s name to uppercase.

Default: false

Advanced

Regex

Replace group’s name to matching regex.

No default.

Advanced

Last update: May 16, 2022

LDAP/AD fields for UserSync

These are descriptions of fields for configuring PrivaceraCloud UserSync for LDAP and Active Directory.

Field name

Description

Tab in application set-up

Name

Identifying name of this connector.

Group Only

Sync only users that are members of groups. Allowable values: true or false

Attribute Only

Sync only the attributes of users already synced from other services. Allowable values: true or false

Incremental

Enable incremental search. Syncing only changes since last search. Allowable values: true or false

Paged Results

Enable paged results control for LDAP Searches. Allowable values: true or false Default: true

Paged Results Control Critical

Set paged results control criticality to CRITICAL. Allowable values: true or false Default: true

Manage Lists

Include Users

List of users to include from sync results. If this list is defined, all users not on this list are ignored.

Exclude Users

List of users to ignore from sync results.

Include Groups

List of groups to include from sync results. If this list is defined, all groups not on this list are ignored.

Exclude Groups

List of groups to exclude from sync results.

Connection

Service URL

Service URL

Bind DN

Bind DN of service.

Bind Password

Bind password .

Authentication Type

Authentication type. Default: simple

Advanced

Follow Referral

Follow LDAP Referral. Default: true

Allowable values: true or false

Advanced

Search Base

Search base for query.

User Search

User Search Base

Search base for querying users.

User Search Scope

User search scope. Default: 2.

User Search Filter

User search filter.

User Object Class

User object class. Default: user

Advanced

Group Search

Group Search Base

Search base for querying groups.

Group Search Scope

Group search scope. Default: 2.

Group Search Filter

Group search filter.

Group Object Class

Group object class. Default: group

Advanced

Nested Group Levels

Number of levels to evaluate nested groups.

Advanced

Attributes

Username

Attribute of a user’s username. Default: sAMAccountName.

First Name

Attribute of a user’s first name. Default: givenName.

Last Name

Attribute of a user’s last name. Default: sn.

Email

Attribute of a user’s email. Default: email.

Group Name

Attribute of a group’s name. Default: sAMAccountName.

Group Members

Attribute listing a group’s members. Default: member.

Username Attribute Modification

Extract From Email

Extract the user’s username from an email address. Example: username@domain.com extracts username.

Default: false

Advanced

Prefix

Prefix to prepend to the user’s username.

No default.

Advanced

Postfix

Postfix to append to the user’s username.

No default.

Advanced

To Lowercase

Convert the user’s username to lowercase.

Default: false

Advanced

To Uppercase

Convert the user’s username to uppercase.

Default: false

Advanced

Regex

Attribute to replace user’s username to matching regex

No default.

Advanced

Group Name Attribute Modification

Extract From Email

Extract the group’s name from an email address. Example: groupname@domain.com extracts groupname.

Default: false

Advanced

Prefix

Prefix to prepend to the group's name.

No default.

Advanced

Postfix

Postfix to append to the group's name.

No default.

Advanced

To Lowercase

Convert the group's name to lowercase.

Default: false

Advanced

To Uppercase

Convert the group’s name to uppercase.

Default: false

Advanced

Regex

Replace group’s name to matching regex.

No default.

Advanced

Last update: May 16, 2022

Okta fields for UserSync

These are descriptions of fields for configuring PrivaceraCloud UserSync for Okta.

Field name

Description

Tab in application set-up

Name

Identifying name of this connector.

Group Only

Sync only users that are members of groups. Allowable values: true or false

Attribute Only

Sync only the attributes of users already synced from other services. Allowable values: true or false

Incremental

Enable incremental search. Syncing only changes since last search. Allowable values: true or false

Manage Lists

Include Users

List of users to include from sync results. If this list is defined, all users not on this list are ignored.

Exclude Users

List of users to ignore from sync results.

Include Users

List of users to manage with status as equal to STAGED, PROVISIONED,ACTIVE,RECOVERY,PASSWORD_EXPIRED,LOCKED_OUT,DEPROVISIONED . If this list is defined, all users not on this list are ignored. Example: eq;ACTIVE,STAGED

Include Users

List of users to manage with user login name. Wildcard (*) is allowed. Format filterOperator;login,login2,login3

#sw for start with

. If this list is defined, all users not on this list are ignored. Example: sw;mon,san

Include Users

List of users to manage with user first name. Wildcard (*) is allowed. Format filterOperator;firstName,firstName2,firstName3

#sw for start with

. If this list is defined, all users not on this list are ignored. Example: sw;mon,san

Include Users

List of users to manage with user last name. Wildcard (*) is allowed. Format filterOperator;lastName,lastName2,lastName3

#sw for start with

. If this list is defined, all users not on this list are ignored. Example: sw;mon,san

Include Users

List of users to manage with user email. Wildcard (*) is allowed. Format filterOperator;email,email2,email3

#sw for start with

If this list is defined, all users not on this list are ignored. Sample value: sw;mon,san

Include Groups

List of groups to manage from sync results. If this list is defined, all groups not on this list are ignored.

Exclude Groups

List of groups to exclude from sync results.

Include Groups

List of groups to manage with group type. Format filterOperator;groupType,groupType2,groupType3

If this list is defined, all groups not on this list are ignored.

Sample: e q;APP_GROUP,BUILT_IN, Okta _GROUP

Include Groups

List of groups to manage with group names. Format filterOperator;groupName,groupName2,groupName3

If this list is defined, all groups not on this list are ignored.

Example: e q;group1,testGroup,testGroup2

Include Groups

List of groups to manage with group samAccountName. Format filterOperator;samAccountName,samAccountName2,samAccountName3

If this list is defined, all groups not on this list are ignored.

Example: e q;sam1,sam2,sam3

Include Groups

List of groups to manage with group source id. Format filterOperator;sourceId,sourceId2,sourceId3

If this list is defined, all groups not on this list are ignored.

Example: eq;0oa2v0el0gP90aqjJ0g7

,0oa2v0el0gP90aqjJ0g8

,0oa2v0el0gP90aqjJ0g0

Connection

Endpoint URL

Okta endpoint URL

Bearer Token

API token for auth to Okta API

Attributes

User Name

Attribute of a user’s name Default: login

Advanced

First Name

Attribute of a user’s first name Default: firstName

Advanced

Family Name

Attribute of a users’s family name. Default: lastName

Advanced

User Email

Attribute of a user’s email Default: email.

Advanced

User Groups

Attribute of user’s group list. Default: groups

Advanced

Group Name

Attribute of a group’s name Default: name

Advanced

Username Attribute Modification

Extract From Email

Extract the user’s username from an email address. Example: username@domain.com extracts username.

Default: false

Advanced

Prefix

Prefix to prepend to the user’s username.

No default.

Advanced

Postfix

Postfix to append to the user’s username.

No default.

Advanced

To Lowercase

Convert the user’s username to lowercase.

Default: false

Advanced

To Uppercase

Convert the user’s username to uppercase.

Default: false

Advanced

Regex

Attribute to replace user’s username to matching regex. Default : Blank

Advanced

Group Name Attribute Modification

Extract From Email

Extract the group’s name from an email address.Example: groupname@domain.com extracts groupname.

Default: false

Advanced

Prefix

Prefix to prepend to the group's name.

Default : Blank

Advanced

Postfix

Postfix to append to the group's name.

No default.

Advanced

To Lowercase

Convert the group's name to lowercase.

Default: false

Advanced

To Uppercase

Convert the group’s name to uppercase.

Default: false

Advanced

Regex

Replace group’s name to matching regex.

No default.

Advanced

Last update: May 16, 2022

SCIM fields for UserSync

These are descriptions of fields for configuring PrivaceraCloud UserSync for SCIM.

Field name

Description

Tab in application set-up

Name

Identifying name of this connector.

Group Only

Sync only users that are members of groups. Allowable values: true or false

Advanced

Attribute Only

Sync only the attributes of users already synced from other services. Allowable values: true or false

Manage Lists

Include Users

List of users to manage from sync results. If this list is defined, all users not on this list are ignored.

Include Users

List of users to ignore from sync results.

Include Groups

List of groups to include from sync results. If this list is defined, all groups not on this list are ignored.

Include Groups

List of groups to ignore from sync results.

Connection

Endpoint URL

SCIM endpoint URL

Bearer Token

Bearer token for auth to SCIM API

Attributes

User Name

Attribute of a user’s name Default: userName

Advanced

First Name

Attribute of a user’s first name Default: name.givenName

Advanced

Family Name

Attribute of a user’s family name. Default: name.familyName

Advanced

User Email

Attribute of a user’s email Default: emails[primary-true].value

Advanced

User Groups

Attribute of user’s group list. Default: groups

Advanced

Group Name

Attribute of a group’s name. Default: displayName

Advanced

Group Members

Attribute of a group’s member list. Default: members

Advanced

Username Attribute Modification

Extract From Email

Extract the user’s username from an email address. Example: username@domain.com extracts username.

Default: false

Advanced

Prefix

Prefix to prepend to the user’s username.

No default.

Advanced

Postfix

Postfix to append to the user’s username.

No default.

Advanced

To Lowercase

Convert the user’s username to lowercase.

Default: false

Advanced

To Uppercase

Convert the user’s username to uppercase.

Default: false

Advanced

Regex

Attribute to replace user’s username to matching regex

No default.

Advanced

Group Name Attribute Modification

Extract From Email

Extract the group’s name from an email address. Example: groupname@domain.com extracts groupname.

Default: false

Advanced

Prefix

Prefix to prepend to the group's name.

No default.

Advanced

Postfix

Postfix to append to the group's name.

No default.

Advanced

To Lowercase

Convert the group's name to lowercase.

Default: false

Advanced

To Uppercase

Convert the group’s name to uppercase.

Default: false

Advanced

Regex

Replace group’s name to matching regex.

No default.

Advanced

Last update: May 16, 2022

SCIM Server fields for UserSync

These are descriptions of fields for configuring PrivaceraCloud UserSync for a SCIM server.

Field name

Description

Tab in application set-up

Name

Identifying name of this connector.

Attribute Only

Sync only the attributes of users already synced from other services. Allowable values: true or false

Manage Lists

Include Users

List of users to include from sync results. If this list is defined, all users not on this list are ignored.

Exclude Users

List of users to exclude from sync results.

Include Groups

List of groups to include from sync results. If this list is defined, all groups not on this list are ignored.

Exclude Groups

List of groups to exclude from sync results.

Connection

Endpoint URL

SCIM endpoint URL

Base URL for SCIM endpoints (readOnly)

/API/pus/public/scim/v2/{connectorName}

Bearer Token

Bearer token for auth to SCIM API.

When set, SCIM requests with this token are allowed access.

Username

Basic auth username.

When set, SCIM requests with this username are allowed access. Password is required.

Password

Basic Auth Password.

When set, SCIM requests with this password are allowed access. Username is required.

Attributes

User Name

Attribute of a user’s name Default: userName

Advanced

First Name

Attribute of a user’s first name Default: name.givenName

Advanced

Family Name

Attribute of a user’s family name. Default: name.familyName

Advanced

User Email

Attribute of a user’s email. Default: emails[primary-true].value

Advanced

User Groups

Attribute of user’s group list. Default: groups

Advanced

Group Name

Attribute of a group’s name. Default: displayName

Advanced

Group Members

Attribute of a group’s member list. Default: members

Advanced

Username Attribute Modification

Extract From Email

Extract the user’s username from an email address. Example:. username@domain.com extracts username.

Default: false

Advanced

Prefix

Prefix to prepend to the user’s username.

No default.

Advanced

Postfix

Postfix to append to the user’s username.

No default.

Advanced

To Lowercase

Convert the user’s username to lowercase.

Default: false

Advanced

To Uppercase

Convert the user’s username to uppercase.

Default: false

Advanced

Regex

Attribute to replace user’s username to matching regex

No default.

Advanced

Group Name Attribute Modification

Extract From Email

Extract the group’s name from an email address. Example: groupname@domain.com extracts groupname.

Default: false

Advanced

Prefix

Prefix to prepend to the group's name.

No default.

Advanced

Postfix

Postfix to append to the group's name.

No default.

Advanced

To Lowercase

Convert the group's name to lowercase.

Default: false

Advanced

To Uppercase

Convert the group’s name to uppercase.

Default: false

Advanced

Regex

Replace group’s name to matching regex.

No default.

Advanced

Last update: May 16, 2022