立即与支持人员聊天
与支持团队交流

Active Roles 8.1.5 - Administration Guide

Introduction Getting started with Active Roles Configuring rule-based administrative views Configuring role-based administration Rule-based autoprovisioning and deprovisioning
Provisioning Policy Objects Deprovisioning Policy Objects How Policy Objects work Policy Object management tasks Policy configuration tasks
Property Generation and Validation User Logon Name Generation Group Membership AutoProvisioning Exchange Mailbox AutoProvisioning AutoProvisioning in SaaS products OneDrive Provisioning Home Folder AutoProvisioning Script Execution Microsoft 365 and Azure Tenant Selection E-mail Alias Generation User Account Deprovisioning Office 365 Licenses Retention Group Membership Removal Exchange Mailbox Deprovisioning Home Folder Deprovisioning User Account Relocation User Account Permanent Deletion Group Object Deprovisioning Group Object Relocation Group Object Permanent Deletion Notification Distribution Report Distribution
Deployment considerations Checking for policy compliance Deprovisioning users or groups Restoring deprovisioned users or groups Container Deletion Prevention policy Picture management rules Policy extensions
Using rule-based and role-based tools for granular administration Workflows
Key workflow features and definitions About workflow processes Workflow processing overview Workflow activities overview Configuring a workflow
Creating a workflow definition for a workflow Configuring workflow start conditions Configuring workflow parameters Adding activities to a workflow Configuring an Approval activity Configuring a Notification activity Configuring a Script activity Configuring an If-Else activity Configuring a Stop/Break activity Configuring an Add Report Section activity Configuring a Search activity Configuring CRUD activities Configuring a Save Object Properties activity Configuring a Modify Requested Changes activity Enabling or disabling an activity Enabling or disabling a workflow Using the initialization script
Approval workflow Email-based approval Automation workflow Activity extensions
Temporal Group Memberships Group Family Dynamic groups Active Roles Reporting Management History Entitlement profile Recycle Bin AD LDS data management One Identity Starling Join and configuration through Active Roles Managing One Identity Starling Connect Configuring linked mailboxes with Exchange Resource Forest Management Configuring remote mailboxes for on-premises users Migrating Active Roles configuration with the Configuration Transfer Wizard Managing Skype for Business Server with Active Roles
About Skype for Business Server User Management Active Directory topologies supported by Skype for Business Server User Management User Management policy for Skype for Business Server User Management Master Account Management policy for Skype for Business Server User Management Access Templates for Skype for Business Server Configuring the Skype for Business Server User Management feature Managing Skype for Business Server users
Exchanging provisioning information with Active Roles SPML Provider Monitoring Active Roles with Management Pack for SCOM Configuring Active Roles for AWS Managed Microsoft AD Azure AD, Microsoft 365, and Exchange Online Management
Configuring Active Roles to manage Hybrid AD objects Unified provisioning policy for Azure M365 Tenant Selection, Microsoft 365 License Selection, Microsoft 365 Roles Selection, and OneDrive provisioning Changes to Active Roles policies for cloud-only Azure objects
Managing the configuration of Active Roles
Connecting to the Administration Service Managed domains Using unmanaged domains Evaluating product usage Creating and using virtual attributes Examining client sessions Monitoring performance Customizing the Console Using Configuration Center Changing the Active Roles Admin account Enabling or disabling diagnostic logs Active Roles Log Viewer
SQL Server replication Using regular expressions Administrative Template Configuring federated authentication Communication ports Active Roles and supported Azure environments Integrating Active Roles with other products and services Active Roles Language Pack Active Roles Diagnostic Tools Active Roles Add-on Manager

Applying Policy Objects

Implementing a policy to enforce business rules is a two-phase process where configuring the policy within a Policy Object is only the first step. When you create a new policy, you select a policy type from the available options and then define the options that make up the policy. The second step is to use the Active Roles Console to enforce the policy on the desired areas of the directory.

Active Roles allows policies to be enforced on any directory object, that is an administrative view (Managed Unit), a directory folder (container), or an individual (leaf) object. Policies are enforced by applying (linking) a Policy Object that holds the policies.

When you apply a Policy Object to a Managed Unit or directory folder, the policies control the objects in that Unit or folder as well as the Unit or folder itself. When you apply a Policy Object to a leaf object, such as a user or group, the policies only control that object. For example, applying a Policy Object to a group does not affect the members of the group.

The objects that are subject to a given Policy Object, that is, the objects under control of the policies defined in that Policy Object, are collectively referred to as policy scope. For example, if you apply a Policy Object to a Managed Unit, the policy scope is composed of the objects within the Managed Unit.

Thus, the policy scope normally includes all objects that reside in a container or Managed Unit to which the Policy Object is applied. However, sometimes you may need to exclude individual objects or sub-containers from the policy scope, thereby preventing certain objects from being affected by policies.

Active Roles gives you the option to selectively exclude objects or entire containers from the policy scope. You can block policy inheritance on individual objects or containers, refining the policy scope. For more information on how to block policy inheritance, see Managing policy scope.

To apply a Policy Object

  1. In the Console tree, under Configuration > Policies > Administration, locate and select the folder that contains the Policy Object you want to apply.

  2. In the details pane, right-click the Policy Object, then click Policy Scope.

  3. In the Active Roles Policy Scope dialog, click Add.

  4. Use the Select Objects dialog to locate and select the container, Managed Unit, or a leaf object on which you want to specify policy settings by using the Policy Object.

  5. Click OK to close the Active Roles Policy Scope dialog.

To specify policy settings on an object by using a Policy Object

  1. Open the Active Roles Policy dialog for the object in one of the following ways:

    • Right-click the object, and click Enforce Policy.

    • Right-click the object, and click Properties. Then, on the Administration tab in the Properties dialog, click Policy.

  2. In the Active Roles Policy dialog, click Add.

  3. Use the Select Policy Objects dialog to locate and select the Policy Object to apply.

  4. To select a Policy Object, click the check box next to the name of the Policy Object. You can select multiple Policy Objects.

  5. Click OK to close the Active Roles Policy dialog.

TIP: To apply a Policy Object, you can also use the Active Roles Policy Scope or Active Roles Policy tab in the advanced details pane. To do so, right-click a blank area on the tab, and then click Add. To display the advanced details pane, check Advanced Details Pane on the View menu. For more information, see Advanced pane in the Active Roles Feature Guide.

To view or modify inheritance options for a Policy Object on a container or Managed Unit

  1. Open the Active Roles Policy Scope dialog for the Policy Object: Right-click the Policy Object, then click Policy Scope.

  2. In the Active Roles Policy Scope dialog, select the container or Managed Unit to which the Policy Object is applied and on which you want to examine inheritance options, then click View/Edit.

  3. On the General tab, view or modify the selection of these options, which specifies the scope where the Policy Object determines policy settings:

    • This directory object: The scope includes the container or Managed Unit you have selected (this option does not cause the scope to include any child objects or members of the container or Managed Unit).

    • Child objects of this directory object: The scope includes all the child objects (or members, as applied to a Managed Unit) in the entire hierarchy under the container or Managed Unit you have selected.

    • Immediate child objects only: The scope includes only the child objects (or members, as applied to a Managed Unit) of which the container or Managed Unit that you have selected is the direct ancestor.

Adding Managed Units or containers to policy scope

You can add administrative views (Managed Units) and directory folders (containers) to the policy scope of a given Policy Object in one of following ways:

  • Right-click the Policy Object and click Policy Scope. Then, in the Active Roles Policy Scope window, click Add.

  • Ensure that Advanced Details Pane is checked on the View menu. Then, select the Policy Object. On the Active Roles Policy Scope tab in the details pane, right-click a blank area and click Add.

In both cases, clicking Add displays the Select Objects window where you can select containers and Managed Units. To build a list of containers from which to select, click Browse and select Active Directory or a container in the hierarchy under Active Directory.

Figure 29: Policy Objects

To build a list of Managed Units, click Browse and select Managed Units or a container in the hierarchy under Managed Units.

Figure 30: Managed Units

In the Select Objects window, select containers or Managed Units from the list and click Add to build the resultant list of items. When finished, click OK.

Adding Policy Objects to policy list for directory object

For a given directory object (container, user, group, and so on), a list of Policy Objects that affect the directory object is referred to as policy list. If the directory object is in the policy scope of a given Policy Object, the Policy Object is included in the policy list for that directory object.

The steps to add a Policy Object to the policy list for a directory object depend on whether it is a container or leaf object:

  • Right-click a Managed Unit or container and click Enforce Policy. Then, in the Active Roles Policy window, click Add.

  • Right-click a leaf object (user, group, or the like), click Properties, go to the Administration tab, and click Policy. Then, in the Active Roles Policy window, click Add.

If you use the advanced details pane (Advanced Details Pane is checked on the View menu), you can do this as follows, regardless of the type of the directory object:

  • Select the directory object, go to the Active Roles Policy tab in the details pane, right-click a blank area on the tab, and then click Add.

In all these cases, clicking Add displays the Select Policy Objects window where you can select Policy Objects to add. Select the Policy Objects, then click OK.

Figure 31: Policy Objects

Managing policy scope

When applying a Policy Object to a directory object, Active Roles creates a Policy Object link. Thus, policies are put in force by linking Policy Objects to directory objects: Managed Units, directory folders (containers), or individual (leaf) objects.

Each Policy Object link includes the following information:

  • The Policy Object that defines the policies.

  • The Directory object that is the target of the link.

  • An Include or Exclude flag that specifies whether the directory object is included or excluded from the policy scope.

You can display a list of Policy Object links starting from one of the following points:

  • Policy Object: Right-click a Policy Object and click Policy Scope.

    This displays the links in which the Policy Object occurs.

  • Directory object: First, open a window that lists the Policy Objects that affect this directory object:

    • For a container object or Managed Unit, right-click the object or Unit and click Enforce Policy.

    • For a leaf object, right-click the object, click Properties, go to the Administration tab, and click Policy.

    Next, in the window that opens, click Advanced.

    This displays the links in which the directory object occurs as the target object.

Another way to see a list of Policy Object links is the use of the Advanced Details Pane. Ensure that Advanced Details Pane is checked on the View menu, and then do one of the following:

  • Select a Policy Object.

    The Active Roles Policy Scope tab lists the links in which the Policy Object occurs.

  • Select a directory object (Managed Unit, container, or leaf object), right-click a blank area on the Active Roles Policy tab, and click Advanced View.

    This displays the links in which the directory object occurs as the target object.

When you display a list of Policy Object links for a directory object, the list appears in a separate window. Each entry in the list includes the following information:

  • Policy Object: Name of the Policy Object.

  • Directory Object: Canonical name of the object to which the Policy Object is linked, that is, the target object of the link.

  • Include/Exclude: Flag that determines the behavior of the link:

    • Include Explicitly means the link puts the target object within the policy scope, that is, the policies defined in the Policy Object control the target object.

    • Exclude Explicitly means the link puts the target object out of the policy scope, that is, the policies defined in the Policy Object do not control the target object.

The Exclude flag takes precedence over the Include flag. If there are two links with the same Policy Object, one of which is flagged Include while another one is flagged Exclude, the object is effectively excluded from the policy scope of the Policy Object.

The list of Policy Object links displays the links of these categories:

  • Direct links: Policy Object is applied (linked) directly to the object you have selected.

  • Inherited links: Policy Object is applied (linked) to a container in the hierarchy of containers above the object you have selected, or to a Managed Unit to which the selected object belongs.

The links inherited from parent objects can be filtered out of the list. To do this, clear the Show inherited check box.

To manage links, you can use the buttons beneath the list:

  • Add: Displays the dialog where you can select Policy Objects, creating the links to the Policy Objects you select.

  • Remove: Deletes the selected entries from the list of links. Available for direct links only.

  • View/Edit: Displays the dialog to view or modify link properties, such as whether the link affects the child objects of the link target object. Available for only those links that are flagged Include.

  • Exclude: Shows up for links flagged Include. Available on direct links only. Changes the flag to Exclude.

  • Include: Shows up for links flagged Exclude. Available on direct links only. Changes the flag to Include.

TIP: The Remove button is only available on direct links. When you need to delete links, it is advisable to manage them using the Policy Scope command on the Policy Object.

To simplify the management of policy effect on directory objects, the Active Roles Console allows you to manage policy scope without directly managing links to Policy Objects. For a directory object, you can view and modify its policy list, that is a list of Policy Objects that control (affect) the directory object, instead of having to sort through direct and inherited links.

Given a directory object, you can display its policy list as follows:

  • For a container or a Managed Unit, right-click it and click Enforce Policy.

  • For a leaf object (user, group, or suchlike), right-click it, click Properties, go to the Administration tab, and click Policy.

Each entry in the policy list includes the following information:

  • Policy Object: The name of the Policy Object. The Policy Object controls this directory object due to a direct link or inherited links.

  • Block Inheritance: Indicates whether policy effect is blocked on this directory object. If the Blocked check box is selected, the Policy Object link flagged Exclude is created for this directory object.

You can manage the policy list using the buttons beneath the list:

  • Add: Displays the dialog where you can select Policy Objects, putting the directory object under the control of the Policy Objects you select.

  • Remove: If you select a Policy Object from the policy list and click Remove, the direct link of the Policy Object to this object is deleted.

    If the Policy Object is in the list due to an inherited link, the Remove button is unavailable. Moreover, if there are both the direct link and an inherited link to the Policy Object, clicking Remove deletes the direct link. However, it does not remove the Policy Object from the policy list. In this case, the Policy Object remains in the list because the policies are still applied due to inheritance.

    If you need to remove the directory object from the policy scope of a given Policy Object, select the Blocked check box in the Block Inheritance column. This adds the Policy Object link flagged Exclude for the directory object.

  • View/Edit: Displays the Properties dialog for the Policy Object you select from the list. You can use the Properties dialog to manage policies in the Policy Object and gain access to the list of all links where this Policy Object occurs.

  • Advanced: Opens the window with the list of Policy Object links for this directory object, discussed earlier in this section.

You can also access the policy list from the advanced details pane. The list is displayed on the Active Roles Policy tab when you select a directory object.

On the Active Roles Policy tab, you can perform the same management tasks as in the Active Roles Policy window: Right-click a list entry or a blank area and use commands on the shortcut menu. The commands act in the same way as the buttons in the Active Roles Policy window.

Given a Policy Object, you can also manage its policy scope by using a list of directory objects to which the Policy Object is applied (linked). The list can be displayed in a separate window or on a tab in the Advanced Details Pane:

  • To display the list in a window, right-click the Policy Object and click Policy Scope.

  • To display the list on a tab, ensure that Advanced Details Pane is checked on the View menu and select the Policy Object.

The list displays all links of the Policy Object. Each entry in the list includes the following information:

  • Name: Canonical name of the directory object to which the Policy Object is linked, that is, the target object of the link.

  • Include/Exclude: Flag that determines the behavior of the link:

    • Include Explicitly means the link puts the target object within the policy scope, that is, the policies defined in the Policy Object control the target object.

    • Exclude Explicitly means the link puts the target object out of the policy scope, that is, the policies defined in the Policy Object do not control the target object.

    The Exclude flag takes precedence over the Include flag. If there are two links with the same target object, one of which is flagged Include while another one is flagged Exclude, the target object is effectively excluded from the policy scope of the Policy Object.

To manage the list in the Active Roles Policy Scope window, you can use the buttons beneath the list: Add, Remove, View/Edit, Include, or Exclude. The buttons perform basically the same functions as those described earlier in this section. To manage the list in the Active Roles Policy Scope tab, you can use the command on the shortcut menu: Right-click a link or a blank area to access the menu. The menu includes the following commands:

  • Add: Appears when you right-click a blank area. Performs the same action as the Add button. Opens the Select Objects dialog where you can select containers or Managed Units to which you want to link the Policy Object (see Applying Policy Objects).

  • Delete: Appears when you right-click a link. Performs the same action as the Remove button. Deletes the link you select from the list.

  • Exclude: Appears when you right-click a link flagged Include. Performs the same action as the Exclude button. Changes the flag on the link you select.

  • Include: Appears when you right-click a link flagged Exclude. Performs the same action as the Include button. Changes the flag on the link you select.

  • Refresh: Updates the list with the current information.

相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级