Chat now with support
Chat mit Support

Identity Manager 9.3 - Administration Guide for Connecting to Microsoft Entra ID

Managing Microsoft Entra ID environments Synchronizing a Microsoft Entra ID environment
Setting up initial synchronization with a Microsoft Entra ID tenant Adjusting the synchronization configuration for Microsoft Entra ID environments Running synchronization Tasks following synchronization Troubleshooting Ignoring data error in synchronization Pausing handling of target system specific processes (Offline mode)
Managing Microsoft Entra ID user accounts and identities Managing memberships in Microsoft Entra ID groups Managing Microsoft Entra ID administrator roles assignments Managing Microsoft Entra ID subscription and Microsoft Entra ID service plan assignments
Displaying enabled and disabled Microsoft Entra ID service plans forMicrosoft Entra ID user accounts and Microsoft Entra ID groups Assigning Microsoft Entra ID subscriptions to Microsoft Entra ID user accounts Assigning disabled Microsoft Entra ID service plans to Microsoft Entra ID user accounts Inheriting Microsoft Entra ID subscriptions based on categories Inheritance of disabled Microsoft Entra ID service plans based on categories
Login credentials for Microsoft Entra ID user accounts Microsoft Entra ID role management
Microsoft Entra ID role management tenants Enabling new Microsoft Entra ID role management features Microsoft Entra ID role main data Main data of Microsoft Entra ID role settings Displaying Microsoft Entra ID role settings main data Assigning temporary access passes to Microsoft Entra ID user accounts Displaying Microsoft Entra ID scoped role assignments Displaying scoped role eligibilities for Microsoft Entra ID roles Overview of Microsoft Entra ID scoped role assignments Main data of Microsoft Entra ID scoped role assignments Managing Microsoft Entra ID scoped role assignments Adding Microsoft Entra ID scoped role assignments Editing Microsoft Entra ID scoped role assignments Deleting Microsoft Entra ID scoped role assignments Assigning Microsoft Entra ID scoped role assignments Assigning Microsoft Entra ID scoped role assignments to Microsoft Entra ID user accounts Assigning Microsoft Entra ID scoped role assignments to Microsoft Entra ID groups Assigning Microsoft Entra ID scoped role assignments to Microsoft Entra ID service principals Assigning Microsoft Entra ID system roles to scopes through role assignments Assigning Microsoft Entra ID business roles to scopes though role assignments Assigning Microsoft Entra ID organizations to scopes through role assignments Overview of Microsoft Entra ID scoped role eligibilities Main data of Microsoft Entra ID scoped role eligibilities Managing Microsoft Entra ID scoped role eligibilities Adding Microsoft Entra ID scoped role eligibilities Editing Microsoft Entra ID scoped role eligibilities Deleting Microsoft Entra ID scoped role eligibilities Assigning Microsoft Entra ID scoped role eligibilities Assigning Microsoft Entra ID scoped role eligibilities to Microsoft Entra ID user accounts Assigning Microsoft Entra ID scoped role eligibilities to Microsoft Entra ID groups Assigning Microsoft Entra ID scoped role eligibilities to Microsoft Entra ID service principals Assigning Microsoft Entra ID system roles to scopes through role eligibilities Assigning Microsoft Entra ID business roles to scopes though role eligibilities Assigning Microsoft Entra ID organizations to scopes through role eligibilities
Mapping Microsoft Entra ID objects in One Identity Manager
Microsoft Entra ID core directories Microsoft Entra ID user accounts Microsoft Entra ID user identities Microsoft Entra ID groups Microsoft Entra ID administrator roles Microsoft Entra ID administrative units Microsoft Entra ID subscriptions and Microsoft Entra ID service principals Disabled Microsoft Entra ID service plans Microsoft Entra ID app registrations and Microsoft Entra ID service principals Reports about Microsoft Entra ID objects Managing Microsoft Entra ID security attributes
Handling of Microsoft Entra ID objects in the Web Portal Recommendations for federations Basic data for managing a Microsoft Entra ID environment Troubleshooting Configuration parameters for managing a Microsoft Entra ID environment Default project template for Microsoft Entra ID Editing Microsoft Entra ID system objects Microsoft Entra ID connector settings

Displaying Microsoft Entra ID app registration main data

The information about the Microsoft Entra ID app registration is loaded into One Identity Manager during synchronization. You cannot edit Microsoft Entra ID app registration main data.

To display a Microsoft Entra ID app registration's main data

  1. In the Manager, select the Microsoft Entra ID > App registrations category.

  2. Select the Microsoft Entra ID app registration in the result list.

  3. Select Change main data.

Table 45: Main data of a Microsoft Entra ID app registration

Property

Description

Display name

Display name of the application.

Client

Microsoft Entra ID tenant of the app registration.

Token issuance policies

Name of the policy for issuing tokens.

Token lifetime policy

Name of the policy for token lifetimes.

Owner (Application Role)

Application roles whose members can configure the app registration.

Registration date

Date and time when the application was registered.

Logo URL

Link to the application's logo.

Marketing URL

Link to the application's marketing page.

Privacy statement URL

Link to the application's privacy statement.

Service URL

Link to the application's support page.

Terms of service URL

Link to the application's terms of service.

Publisher domain

Name of the application's verified publisher domain.

Group membership claim

Group membership claim expected by the application. Group types that are included in the access, ID, and SAML tokens.

Supported user accounts

Specifies which Microsoft user accounts for the current application are supported. Permitted values are:

  • Accounts in this organizational directory only

  • Accounts in any organizational directory

  • Accounts in any organizational directory and personal Microsoft accounts

  • Only personal Microsoft accounts

Tags

User-defined string to use for categorizing and identifying the application.

Fallback public client

Specifies whether the fallback application type is a public client, such as an application installed and running on a mobile device. The default value is false meaning the fallback application type is a confidential client such as a web application. If the option is disabled, it means that the fallback application type is a confidential client, such as a web application (default).

Related topics

Displaying information about Microsoft Entra ID service principals

When an application is registered in a Microsoft Entra ID tenant in Microsoft Azure Management Portal, it creates an associated Microsoft Entra ID service principal.

The information about the Microsoft Entra ID service principal is loaded into One Identity Manager during synchronization. You cannot create new Microsoft Entra ID service principals in One Identity Manager.

If a Microsoft Entra ID application is used in a Microsoft Entra ID tenant that is registered in another Microsoft Entra ID tenant, only the Microsoft Entra ID service principal and not the Microsoft Entra ID app registration is loaded into One Identity Manager.

To display information about a Microsoft Entra ID service principal

  1. In the Manager, select the Microsoft Entra ID > Service principals category.

  2. In the result list, select the Microsoft Entra ID service principal.

  3. Select one of the following tasks:

    • Microsoft Entra ID service principal overview: This shows you an overview of the Microsoft Entra ID service principal and its dependencies.

    • Change main data: This displays the Microsoft Entra ID service principal's main data.

    • Assign owners: This displays the Microsoft Entra ID service principals owners. You can assign owners to a service principal or remove them.

    • Assign authorizations: This displays user accounts, groups, and service principals with their assigned app roles. You can create more authorizations or removed them.

Related topics

Assigning owners to Microsoft Entra ID service principals

Use this task to assign owners to a Microsoft Entra ID service principal or to remove them from a service principal.

To assign owners to a Microsoft Entra ID service principal

  1. In the Manager, select the Microsoft Entra ID > Service principals category.

  2. In the result list, select the Microsoft Entra ID service principal.

  3. Select the Assign owner task.

  4. In the Table drop-down, select one of the following entries.

    • Microsoft Entra ID user accounts (AADUser)

    • Microsoft Entra ID service principals (AADServicePrincipal)

  5. In the Add assignments pane, assign owners.

    TIP: In the Remove assignments pane, you can remove assigned owners.

    To remove an assignment

    • Select the owner and double-click .

  6. Save the changes.

Editing authorizations for Microsoft Entra ID service principals

There are so-called app roles defined for app registrations. Microsoft Entra ID users, Microsoft Entra ID groups, or Microsoft Entra ID service principals can use app roles to provide permissions or functions for the application.

App roles and their assignments are loaded into One Identity Manager by synchronization. However, you cannot create new app roles in One Identity Manager. In One Identity Manager, you can add or remove authorizations for the service principals and their app registrations respectively.

To assign authorizations to a Microsoft Entra ID service principal

  1. In the Manager, select the Microsoft Entra ID > Service principals category.

  2. In the result list, select the Microsoft Entra ID service principal.

  3. Select the Assign authorizations task.

  4. In the Assignments pane, click Add and enter the following data.

    • Authorized for: Specify the user account, group, or service principal for the authorization.

      1. Click next to the field.

      2. Under Table, select one of the following tables:

        • To authorize a user account, select AADUser.

        • To authorize a group, select AADGroup.

        • To authorize a service principal, select AADServicePrincipal.

      3. Under Authorized for, select the user account, group, or service principal.

      4. Click OK.

    • App role: Select the app role for the authorization.

      NOTE: If there is no app role defined for a service principal, leave this item empty to authorize the user account, group, or service principal.

  5. Save the changes.

To remove authorizations from a Microsoft Entra ID service principal

  1. In the Manager, select the Microsoft Entra ID > Service principals category.

  2. In the result list, select the Microsoft Entra ID service principal.

  3. Select the Assign authorizations task.

  4. In the Assignments pane, select the authorization you want to remove.

  5. Click Remove.

  6. Save the changes.

Verwandte Dokumente

The document was helpful.

Bewertung auswählen

I easily found the information I needed.

Bewertung auswählen