Tchater maintenant avec le support
Tchattez avec un ingénieur du support

Identity Manager 8.1.4 - Administration Guide for Connecting to Azure Active Directory

Managing Azure Active Directory environments Setting up synchronization with an Azure Active Directory tenant Basic data for managing an Azure Active Directory environment Azure Active Directory core directories Azure Active Directory user accounts Azure Active Directory groups Azure Active Directory administrator roles Azure Active Directory subscriptions and service plans
Azure Active Directory subscriptions Disabled Azure Active Directory service plans
Reports about Azure Active Directory objects Configuration parameters for managing an Azure Active Directory environment Default project template for Azure Active Directory

Assigning Azure Active Directory subscriptions directly to Azure Active Directory user accounts

You can assign subscriptions directly or indirectly to a user account. In the case of indirect assignment, employees, and subscriptions are assigned to hierarchical roles, such as departments, cost centers, locations, or business roles. If the employee has a user account in Azure Active Directory, role subscriptions are inherited by this user account.

To react quickly to special requests, you can assign subscriptions directly to a user account.

To assign subscriptions directly to user accounts

  1. Select the Azure Active Directory | User accounts category.
  2. Select the user account in the result list.
  3. Select the Assign subscriptions task.
  4. In the Add assignments pane, add subscriptions.

    TIP: In Remove assignments, you can remove the subscription assignments.

    To remove an assignment

    • Select the subscription and double-click .
  1. Save the changes.
Related topics

Assigning disabled Azure Active Directory service plans directly to Azure Active Directory user accounts

You can assign disabled service plans directly or indirectly to a user account. In the case of indirect assignment, employees and disabled service plans are assigned to hierarchical roles, such as, departments, cost centers, locations, or business roles. If the employee has a user account in Azure Active Directory, disabled service plans belonging to roles are inherited by this user account.

To react quickly to special requests, you can assign disabled service plans directly to a user account.

To assign disabled service plans directly to a user account

  1. Select the Azure Active Directory | User accounts category.
  2. Select the user account in the result list.
  3. Select the Assign disabled service plans task.
  4. In the Add assignments pane, assign disabled service plans.

    TIP: In the Remove assignments pane, you can remove assigned service plans.

    To remove an assignment

    • Select the service plan and double-click .

  5. Save the changes.
Related topics

Assigning extended properties to Azure Active Directory user accounts

Extended properties are meta objects, such as operating codes, cost codes, or cost accounting areas that cannot be mapped directly in One Identity Manager.

To specify extended properties for a user account

  1. In the Manager, select the Azure Active Directory | User accounts category.

  2. Select the user account in the result list.
  3. Select the Assign extended properties task.
  4. In the Add assignments pane, assign extended properties.

    TIP: In the Remove assignments pane, you can remove assigned extended properties.

    To remove an assignment

    • Select the extended property and double-click .
  5. Save the changes.

For detailed information about using extended properties, see the One Identity Manager Identity Management Base Module Administration Guide.

Automatic assignment of employees to Azure Active Directory user accounts

When you add a user account, an existing employee can be assigned automatically or added if necessary. In the process, the employee master data is created on the basis of existing user account master data. This mechanism can be triggered after a new user account is created either manually or through synchronization. Define criteria for finding employees to apply to automatic employee assignment. If a user account is linked to an employee through the current mode, the user account is given, through an internal process, the default manage level of the account definition entered in the user account's target system. You can customize user account properties depending on how the behavior of the manage level is defined.

If you run this procedure during working hours, automatic assignment of employees to user accounts takes place from that moment onwards. If you disable the procedure again later, the changes only affect user accounts added or updated after this point in time. Existing employee assignments to user accounts remain intact.

NOTE: It is not recommended to assign employees using automatic employee assignment in the case of administrative user accounts. Use Change master data to assign employees to administrative user accounts for the respective user account.

Run the following tasks to assign employees automatically:

  • If you want employees to be assigned during the synchronization of user accounts, in the Designer, set the TargetSystem | AzureAD | PersonAutoFullsync configuration parameter and select the required mode.
  • If you want employees to be assigned outside synchronization in the Designer, set the TargetSystem | AzureAD | PersonAutoDefault configuration parameter and select the required mode.
  • In the TargetSystem | AzureAD | PersonExcludeList configuration parameter, define the user accounts for which no automatic assignment to employees is to take place.

    Example:

    ADMINISTRATOR

  • Use the TargetSystem | AzureAD | PersonAutoDisabledAccounts configuration parameter to specify whether employees can be automatically assigned to disabled user accounts. User accounts do not obtain an account definition.
  • Assign an account definition to the tenant. Ensure that the manage level to be used is entered as the default manage level.
  • Define the search criteria for employee assignment in the tenant.

NOTE:

The following applies for synchronization:

  • Automatic employee assignment takes effect if user accounts are added or updated.

The following applies outside synchronization:

  • Automatic employee assignment takes effect if user accounts are added.

NOTE:

Following a synchronization, employees are automatically created for the user accounts in the default installation. If an account definition for the tenant is not yet known at the time of synchronization, user accounts are linked with employees. However, account definitions are not assigned. The user accounts are therefore in a Linked state.

To manage the user accounts using account definitions, assign an account definition and a manage level to these user accounts.

To select user accounts through account definitions

  1. Create an account definition.
  2. Assign an account definition to the tenant.
  3. Assign a user account in the Linked state to the account definition. The account definition's default manage level is applied to the user account.
    1. In the Manager, select the Azure Active Directory | User accounts | Linked but not configured | <Tenant> category.
    2. Select the Assign account definition to linked accounts task.
    3. In the Account definition menu, select the account definition.

    4. Select the user accounts that contain the account definition.

    5. Save the changes.

For more detailed information about assigning employees automatically, see the One Identity Manager Target System Base Module Administration Guide.

Related topics
Documents connexes

The document was helpful.

Sélectionner une évaluation

I easily found the information I needed.

Sélectionner une évaluation