Tchater maintenant avec le support
Tchattez avec un ingénieur du support

Active Roles 8.1.3 - Administration Guide

Introduction Getting started with Active Roles Configuring rule-based administrative views Configuring role-based administration Rule-based autoprovisioning and deprovisioning
Provisioning Policy Objects Deprovisioning Policy Objects How Policy Objects work Policy Object management tasks Policy configuration tasks
Property Generation and Validation User Logon Name Generation Group Membership AutoProvisioning Exchange Mailbox AutoProvisioning AutoProvisioning in SaaS products OneDrive Provisioning Home Folder AutoProvisioning Script Execution Microsoft 365 and Azure Tenant Selection E-mail Alias Generation User Account Deprovisioning Office 365 Licenses Retention Group Membership Removal Exchange Mailbox Deprovisioning Home Folder Deprovisioning User Account Relocation User Account Permanent Deletion Group Object Deprovisioning Group Object Relocation Group Object Permanent Deletion Notification Distribution Report Distribution
Deployment considerations Checking for policy compliance Deprovisioning users or groups Restoring deprovisioned users or groups Container Deletion Prevention policy Picture management rules Policy extensions
Using rule-based and role-based tools for granular administration Workflows
Key workflow features and definitions About workflow processes Workflow processing overview Workflow activities overview Configuring a workflow
Creating a workflow definition for a workflow Configuring workflow start conditions Configuring workflow parameters Adding activities to a workflow Configuring an Approval activity Configuring a Notification activity Configuring a Script activity Configuring an If-Else activity Configuring a Stop/Break activity Configuring an Add Report Section activity Configuring a Search activity Configuring CRUD activities Configuring a Save Object Properties activity Configuring a Modify Requested Changes activity Enabling or disabling an activity Enabling or disabling a workflow Using the initialization script
Approval workflow Email-based approval Automation workflow Activity extensions
Temporal Group Memberships Group Family Dynamic groups Active Roles Reporting Management History Entitlement profile Recycle Bin AD LDS data management One Identity Starling Join and configuration through Active Roles Managing One Identity Starling Connect Configuring linked mailboxes with Exchange Resource Forest Management Configuring remote mailboxes for on-premises users Migrating Active Roles configuration with the Configuration Transfer Wizard Managing Skype for Business Server with Active Roles
About Skype for Business Server User Management Active Directory topologies supported by Skype for Business Server User Management User Management policy for Skype for Business Server User Management Master Account Management policy for Skype for Business Server User Management Access Templates for Skype for Business Server Configuring the Skype for Business Server User Management feature Managing Skype for Business Server users
Exchanging provisioning information with Active Roles SPML Provider Monitoring Active Roles with Management Pack for SCOM Configuring Active Roles for AWS Managed Microsoft AD Azure AD, Microsoft 365, and Exchange Online Management
Configuring Active Roles to manage Hybrid AD objects Unified provisioning policy for Azure M365 Tenant Selection, Microsoft 365 License Selection, Microsoft 365 Roles Selection, and OneDrive provisioning Changes to Active Roles policies for cloud-only Azure objects
Managing the configuration of Active Roles
Connecting to the Administration Service Managed domains Using unmanaged domains Evaluating product usage Creating and using virtual attributes Examining client sessions Monitoring performance Customizing the Console Using Configuration Center Changing the Active Roles Admin account Enabling or disabling diagnostic logs Active Roles Log Viewer
SQL Server replication Using regular expressions Administrative Template Configuring federated authentication Communication ports Active Roles and supported Azure environments Integrating Active Roles with other products and services Active Roles Language Pack Active Roles Diagnostic Tools Active Roles Add-on Manager

Azure object management in a Non-Federated environment

A Non-federated environment is typically used for testing purposes. In a Non-federated environment, most of the Azure properties can be modified, with the exception of attributes that uniquely identify the object (such as UserPrincipalName and ObjectId).

The following table provides information about the operations and methods of operation that can be performed on Azure objects in a Non-federated environment.

Table 126: Supported Azure configurations comparison chart
Object Operation Non-Federated : Method

User

Create Using Graph API
Read Using Graph API and Exchange Online cmdlets
Update Using Graph API and Exchange Online cmdlets
Delete Using Graph API

Guest User

Create Using Graph API
Read Using Graph API
Update Using Graph API
Delete Using Graph API

Security Group

Create Using Graph API
Read Using Graph API
Update Using Graph API
Delete Using Graph API

Mail Enabled Security Group

Create Using Exchange Online cmdlets
Read Using Graph API
Update Using Graph API
Delete Using Graph API

Distribution Group

Create Using Exchange Online cmdlets
Read Using Graph API
Update Using Graph API
Delete Using Graph API

Native Microsoft 365 Group (Cloud-only)

Create

Using Graph API

Read

Using Graph API

Update

Using Graph API

Delete

Using Graph API

Contacts

Create Using Exchange Online cmdlets
Read Using Graph API
Update Using Exchange Online cmdlets
Delete Using Graph API

NOTE: Active Roles provides cloud-only support only for Native Microsoft 365 Groups management.

Azure object management in Federated and Synchronized Identity environments

Synchronization methods are applicable only in Synchronized and Federated environments and AAD Connect is used to perform the synchronization. Azure non-federated environment does not require synchronization and the direct Graph API calls are used to make the Azure or Microsoft 365 object management.

The following table provides information about the operations and methods of operation that can be performed on Azure objects in Federated and Synchronized Identity environments.

Table 127: Supported Azure configurations comparison chart
Object Operation

Commands

Tabs

Federated/Synchronized : Method
User Create

 

 

Created by Graph API
Read

 

 

Using Graph API and Exchange Online cmdlets
Update Azure properties

Identity

Synced using AAD Connect

Settings

Using Graph API

Job Info

Synced using AAD Connect

Contact Info

Synced using AAD Connect

Licenses

Using Graph API

O365 Admin Roles

Using Graph API

OneDrive

Created by OneDrive Policy using PowerShell commands

Exchange Online properties

Mail Flow Settings

Using Exchange Online cmdlets

Delegation

Using Exchange Online cmdlets

E-mail Address

Synced using AAD Connect

Mailbox Features

Using Exchange Online cmdlets

Mailbox Settings

Using Exchange Online cmdlets

Delete

 

 

Using Graph API

Guest Users

Create

Invite Guest

 

Created by Graph API

Read

 

 

Using Graph API

Update

Azure properties

Identity

Synced using AAD Connect

Settings

Using Graph API

Job Info

Synced using AAD Connect

Contact Info

Synced using AAD Connect

Licenses

Using Graph API

O365 Admin Roles

Using Graph API

Exchange Online properties

Mail Flow Settings

Using Exchange Online cmdlets

Delegation

Using Exchange Online cmdlets

E-mail Address

Synced using AAD Connect

Mailbox Features

Using Exchange Online cmdlets

Mailbox Settings

Using Exchange Online cmdlets

Delete

 

 

Using Graph API

Security Group Create

 

 

  • Created in Azure.

  • Back synchronized to Active Roles.

  • Synced using AAD Connect.

Read

 

 

Using Graph API
Update

 

 

Synced using AAD Connect
Delete

 

 

Using Graph API
Mail Enabled Security Group Create

 

 

  • Created in Azure.

  • Back synchronized to Active Roles.

  • Synced using AAD Connect.

Read

 

 

Using Graph API
Update

 

 

Synced using AAD Connect
Delete

 

 

Using Graph API
Distribution Group Create

 

 

  • Created in Azure.

  • Back synchronized to Active Roles.

  • Synced using AAD Connect.

Read

 

 

Using Graph API
Update

 

 

Synced using AAD Connect
Delete

 

 

Using Graph API

Native Microsoft 365 Group (Cloud-only)

Create

 

 

Using Graph API

Read

 

 

Using Graph API

Update

 

 

Using Graph API

Delete

 

 

Using Graph API

Contacts Create

 

 

Synced using AAD Connect
Read

 

 

Using Graph API
Update

 

 

Synced using AAD Connect
Delete

 

 

Using Graph API

NOTE:

  • Active Roles provides cloud-only support only for Native Microsoft 365 Group management.

  • "Synced using AAD Connect" in the table means that the object operation is initially performed on the on-premises object. Once the Microsoft Azure AD Connect synchronization cycle is completed, the object is updated in Azure AD or Microsoft 365.

  • For more information on how to perform back synchronization, see Active Roles configuration to synchronize existing Azure AD objects to Active Roles.

Integrating Active Roles with other products and services

You can integrate Active Roles with several One Identity, Quest and third-party products or services to complement and extend identity and access management in your organization.

Supported One Identity and Quest products

The supported One Identity and Quest products include the following:

  • Change Auditor

  • Defender

  • Enterprise Reporter

  • Identity Manager

  • Recovery Manager for Active Directory

  • Safeguard

  • Safeguard Authentication Services

  • Starling

For more information on these products, see Active Roles integration with other One Identity and Quest products.

Supported third-party services

The supported third-party services include Duo and Okta.

Active Roles integration with other One Identity and Quest products

You can integrate Active Roles with the following One Identity products to complement and extend identity and access management in your organization.

Change Auditor

Quest Change Auditor for Active Directory is a security auditing solution providing real-time notifications for critical AD, Azure AD and ADFS configuration changes. The application tracks, audits, reports and alerts on all key configuration changes (for example, modifications in users, groups, nested groups, GPOs, computers, services, registry entries, local users or the DNS), and consolidates them in a single console without the overhead of native auditing.

In addition, you can lock down critical AD objects to protect them from unauthorized or accidental modifications and deletions. Correlating activity across the on-premises and cloud directories, Change Auditor provides a single pane of glass view of your hybrid environment and makes it easy to search all events regardless of where they occurred.

For more information on integrating Active Roles with Change Auditor, see Active Roles Integration in the Change Auditor Installation Guide, or Change Auditor Knowledge Base Article 309842.

Defender

One Identity Defender is a cost-effective security solution that authenticates users who access your network resources. When deployed in your organization, only users who successfully authenticate via Defender are granted access to the secured resources.

Defender uses the user identities stored in Microsoft Active Directory (AD) to enable two-factor authentication (2FA), taking advantage of its inherent scalability and security, and eliminating the costs and time required to set up and maintain proprietary databases. The web-based administration tool and the user self-service portal of Defender ease the implementation of 2FA for both administrators and users. Defender also provides a comprehensive audit trail that enables compliance and forensics.

For more information on using Defender with Active Roles, see Integration with Active Roles in the Defender Administration Guide.

Enterprise Reporter

Quest Enterprise Reporter provides administrators, security officers, help desk staff, and other stakeholders insight into their network environment. Reporting on your network environment provides general visibility into the security and configuration of your environment, validation against your security policies to ensure objects are configured as expected, and an easy way to respond to inquiries from auditors requesting security and configuration information.

Enterprise Reporter provides a unified solution for data discovery and report generation. Using the Enterprise Reporter Configuration Manager, administrators can easily configure and deploy discoveries to collect and store data. Once the data has been collected, the Report Manager allows users to produce reports that help organizations ensure that they comply with industry regulations and standards, adhere to internal security policies, and fulfill hardware and software requirements.

For more information on using Enterprise Reporter with Active Roles, see the Enterprise Reporter Configuration Manager User Guide, or the Quest Enterprise Reporter Knowledge Base.

Identity Manager

One Identity Manager simplifies managing user identities, access permissions, and security policies. By delegating identity management and access decisions directly to the organization, Identity Manager can ease the workload of the company IT team, so they can focus on their core competences.

For more information on integrating Active Roles with Identity Manager, see Working with One Identity Manager in the Active Roles Synchronization Service Administration Guide and the Identity Manager Administration Guide for Active Roles Integration.

Recovery Manager for Active Directory

Quest Recovery Manager for Active Directory (RMAD) is an AD recovery tool that enables you to recover sections of the organization AD (for example, selected objects or object properties) without taking AD offline. RMAD minimizes potential AD downtimes that data corruption or improper directory modifications can cause by offering automatic backup options, and fast, remotely managed recovery operations.

Active Roles supports integration with RMAD through its Active Roles Add-on for RMAD extension. When installed, the Active Roles Web Interface receives a new Restore Object option, opening the Recovery Manager Portal of RMAD, and allowing you to restore modified or deleted directory objects.

For more information on RMAD, see the RMAD technical documentation. For more information on the Active Roles Add-on for RMAD extension, see the Active Roles Add-on for Recovery Manager for Active Directory Release Notes.

Safeguard

One Identity Safeguard is a privileged management software used to control, monitor, and govern privileged user accounts and activities to identify possible malicious activities, detect entitlement risks, and provide tamper proof evidence. Safeguard products also aid incident investigation, forensics work, and compliance efforts.

The One Identity Safeguard for Privileged Passwords (SPP) appliances are built specifically for use only with the SPP privileged management software, which is pre-installed and ready for use on the SPP appliance. The SPP appliance is hardened to ensure the system is secured at the hardware, operating system, and software levels as well. The hardened appliance approach protects the privileged management software from attacks while simplifying deployment and ongoing management, and also shortening the time frame to value period.

For more information on SPP, see the latest One Identity Safeguard for Privileged Passwords documentation.

Safeguard Authentication Services

One Identity Safeguard Authentication Services (SAS) extends the security and compliance of AD to Unix, Linux, and macOS platforms and enterprise applications with the following features:

  • Addressing the compliance need for cross-platform access control.

  • Addressing the operational need for centralized authentication and single sign-on.

  • Unifying identities and directories for simplified identity and access management.

For more information on integrating Active Roles with SAS, see the Authentication Services Active Roles Integration Pack Release Notes or SAS Knowledge Base Article 253135.

Starling

Active Roles supports integration with the One Identity Starling Connect service.

One Identity Starling Connect is a cloud-based service extending the provisioning capabilities of Active Roles to a growing collection of Software-as-a-Service (SaaS) applications, enabling organizations to streamline processes and secure hybrid environments. This allows you to extend your on-premises Active Roles deployment to provision additional applications, regardless of whether they are on-premises or cloud-based.

Documents connexes

The document was helpful.

Sélectionner une évaluation

I easily found the information I needed.

Sélectionner une évaluation