Chat now with support
Chat mit Support

Identity Manager 8.2.1 - Administration Guide for Connecting to Exchange Online

About this guide Managing Exchange Online environments Synchronizing an Exchange Online environment
Setting up Exchange Online synchronization Customizing the synchronization configuration Running synchronization Tasks following synchronization Troubleshooting Ignoring data error in synchronization
Basic data for managing an Exchange Online environment Exchange Online organization configuration Exchange Online mailboxes Exchange Online mail users Exchange Online mail contacts Exchange Online mail-enabled distribution groups
Creating Exchange Online mail-enabled distribution groups Editing main data for Exchange Online mail-enabled distribution groups Main data for Exchange Online mail-enabled distribution groups Receive restrictions for Exchange Online mail-enabled distribution groups Customizing send permissions for Exchange Online mail-enabled distribution groups Specifying moderators for Exchange Online mail-enabled distribution groups Specifying Exchange Online mail-enabled distribution groups Assigning Exchange Online mail-enabled distribution groups to Exchange Online recipients Exchange Online mail-enabled distribution group inheritance based on categories Adding Exchange Online dynamic distribution groups to Exchange Online mail-enabled distribution groups Adding an Exchange Online dynamic distribution group to Exchange Online mail-enabled distribution groups Adding Exchange Online mail-enabled public folder to Exchange Online mail-enabled distribution groups Assigning extended properties to Exchange Online mail-enabled distribution groups Deleting Exchange Online mail-enabled distribution groups
Exchange Online Office 365 groups Exchange Online dynamic distribution groups Exchange Online mail-enabled public folders Reports about Exchange Online objects Configuration parameters for managing an Exchange Online environment Default project template for Exchange Online Editing Exchange Online system objects Exchange Online connector settings

Assigning account definitions to Azure Active Directory tenants

The following prerequisites must be fulfilled if you implement automatic assignment of user accounts and employees resulting in administered user accounts (Linked configured state):

  • The account definition is assigned to the target system.

  • The account definition has the default manage level.

User accounts are only linked to the employee (Linked state) if no account definition is given. This is the case on initial synchronization, for example.

To assign the account definition to a target system

  1. In the Manager, select the Azure Active Directory tenant in the Azure Active Directory > Tenants category.

  2. Select the Change main data task.

  3. From the Account definition (initial) menu, select the account definition for user accounts.

  4. From the Mail contact definition (initial) menu, select the account definition for mail contacts.

  5. From the Mail user definition (initial) menu, select the account definition for mail users.

  6. Save the changes.

Related topics

Deleting account definitions

You can delete account definitions if they are not assigned to target systems, employees, hierarchical roles or any other account definitions.

To delete an account definition

  1. Remove automatic assignments of the account definition from all employees.

    1. In the Manager, select the Azure Active Directory > Basic configuration data > Account definitions > Account definitions category.

    2. Select an account definition in the result list.

    3. Select the Change main data task.

    4. Select the Disable automatic assignment to employees task.

    5. Confirm the security prompt with Yes.

    6. Save the changes.

  2. Remove direct assignments of the account definition to employees.

    1. In the Manager, select the Azure Active Directory > Basic configuration data > Account definitions > Account definitions category.

    2. Select an account definition in the result list.

    3. Select the Assign to employees task.

    4. In the Remove assignments pane, remove employees.

    5. Save the changes.

  3. Remove the account definition's assignments to departments, cost centers, and locations.

    1. In the Manager, select the Azure Active Directory > Basic configuration data > Account definitions > Account definitions category.

    2. Select an account definition in the result list.

    3. Select the Assign organizations task.

    4. In the Remove assignments pane, remove the relevant departments, cost centers, and locations.

    5. Save the changes.

  4. Remove the account definition's assignments to business roles.

    1. In the Manager, select the Azure Active Directory > Basic configuration data > Account definitions > Account definitions category.

    2. Select an account definition in the result list.

    3. Select the Assign business roles task.

    4. In the Remove assignments pane, remove the business roles.

    5. Save the changes.

  5. If the account definition was requested through the IT Shop, it must be canceled and removed from all IT Shop shelves.

    For more detailed information about unsubscribing requests, see the One Identity Manager Web Designer Web Portal User Guide.

    To remove an account definition from all IT Shop shelves (role-based login)

    1. In the Manager, select the Entitlements > Account definitions category.

    2. Select an account definition in the result list.

    3. Select the Remove from all shelves (IT Shop) task.

    4. Confirm the security prompt with Yes.
    5. Click OK.

      The account definition is removed from all shelves by the One Identity Manager Service. At the same time, any requests and assignment requests with this account definition are canceled.

    To remove an account definition from all IT Shop shelves (non role-based login)

    1. In the Manager, select the Azure Active Directory > Basic configuration data > Account definitions > Account definitions category.

    2. Select an account definition in the result list.

    3. Select the Remove from all shelves (IT Shop) task.

    4. Confirm the security prompt with Yes.
    5. Click OK.

      The account definition is removed from all shelves by the One Identity Manager Service. At the same time, any requests and assignment requests with this account definition are canceled.

  6. Remove the required account definition assignment. As long as the account definition is required for another account definition, it cannot be deleted. Check all the account definitions.

    1. In the Manager, select the Azure Active Directory > Basic configuration data > Account definitions > Account definitions category.

    2. Select an account definition in the result list.

    3. Select the Change main data task.

    4. From the Required account definition menu, remove the account definition.

    5. Save the changes.

  7. Remove the account definition's assignments to target systems.

    1. In the Manager, select the Azure Active Directory tenant in the Azure Active Directory > Tenants category.

    2. Select the Change main data task.
    3. On the General tab, remove the assigned account definitions.

    4. Save the changes.

  8. Delete the account definition.

    1. In the Manager, select the Azure Active Directory > Basic configuration data > Account definitions > Account definitions category.

    2. Select an account definition in the result list.

    3. Click to delete an account definition.

Target system managers for Exchange Online

A default application role exists for the target system manager in One Identity Manager. Assign the employees who have permission to edit all Exchange Online objects in One Identity Manager to this application role.

Define additional application roles if you want to limit the permissions for target system managers to individual tenants with Exchange Online. The application roles must be added under the default application role.

For detailed information about implementing and editing application roles, see the One Identity Manager Authorization and Authentication Guide.

Implementing application roles for target system managers
  1. The One Identity Manager administrator allocates employees to be target system administrators.

  2. These target system administrators add employees to the default application role for target system managers.

    Target system managers with the default application role are authorized to edit all the Exchange Online objects in One Identity Manager.

  3. Target system managers can authorize other employees within their area of responsibility as target system managers and if necessary, create additional child application roles and assign these to individual clients.

Table 9: Default application roles for target system managers
User Tasks

Target system managers

 

Target system managers must be assigned to the Target systems | Exchange Online application role or a child application role.

Users with this application role:

  • Assume administrative tasks for the target system.

  • Create, change, or delete target system objects.

  • Edit password policies for the target system.

  • Prepare groups to add to the IT Shop.

  • Can add employees who have another identity than the Primary identity.

  • Configure synchronization in the Synchronization Editor and define the mapping for comparing target systems and One Identity Manager.

  • Edit the synchronization's target system types and outstanding objects.

  • Authorize other employees within their area of responsibility as target system managers and create child application roles if required.

To initially specify employees to be target system administrators

  1. Log in to the Manager as a One Identity Manager administrator (Base role | Administrators application role)

  2. Select the One Identity Manager Administration > Target systems > Administrators category.

  3. Select the Assign employees task.

  4. Assign the employee you want and save the changes.

To add the first employees to the default application as target system managers

  1. Log in to the Manager as a target system administrator (Target systems | Administrators application role).

  2. Select the One Identity Manager Administration > Target systems > Exchange Online category.

  3. Select the Assign employees task.

  4. Assign the employees you want and save the changes.

To authorize other employees as target system managers when you are a target system manager

  1. Log in to the Manager as a target system manager.

  2. Select the application role in the Azure Active Directory > Basic configuration data > Target system managers category.

  3. Select the Assign employees task.

  4. Assign the employees you want and save the changes.

To specify target system managers for individual clients

  1. Log in to the Manager as a target system manager.

  2. Select the Azure Active Directory > Tenants category.

  3. Select the client in the result list.

  4. Select the Change main data task.

  5. On the General tab, select the application role in the Target system manager (Exchange Online) menu.

    - OR -

    Next to the Target system manager (Exchange Online) menu, click to create a new application role.

    1. Enter the application role name and assign the Target systems | Exchange Online parent application role.

    2. Click OK to add the new application role.

  6. Save the changes.
  7. Assign employees to this application role who are permitted to edit the client in One Identity Manager.

Related topics

Job server for Exchange Online-specific process handling

Servers must be informed of your server functionality in order to handle Exchange Online-specific processes in One Identity Manager. For example, the synchronization server.

You have several options for defining a server's functionality:

  • In the Designer, create an entry for the Job server in the Base Data > Installation > Job server category. For more information about this, see the One Identity Manager Configuration Guide.

  • In the Manager, select an entry for the Job server in the Azure Active Directory > Basic configuration data > Server category and edit the Job server main data.

    Use this task if the Job server has already been declared in One Identity Manager and you want to configure special functions for the Job server.

To edit a Job server and its functions

  1. In the Manager, select the Azure Active Directory > Basic configuration data > Server category.

  2. Select the Job server entry in the result list.

  3. Select the Change main data task.

  4. Edit the Job server's main data.

  5. Select the Assign server functions task and specify server functionality.

  6. Save the changes.
Detailed information about this topic
Verwandte Dokumente

The document was helpful.

Bewertung auswählen

I easily found the information I needed.

Bewertung auswählen