Chatta subito con l'assistenza
Chat con il supporto

Active Roles 7.6.2 - Administration Guide

Introduction About Active Roles Getting Started Rule-based Administrative Views Role-based Administration
Access Templates as administrative roles Access Template management tasks Examples of use Deployment considerations Windows claims-based Access Rules
Rule-based AutoProvisioning and Deprovisioning
About Policy Objects Policy Object management tasks Policy configuration tasks
Property Generation and Validation User Logon Name Generation Group Membership AutoProvisioning E-mail Alias Generation Exchange Mailbox AutoProvisioning AutoProvisioning for SaaS products OneDrive Provisioning Home Folder AutoProvisioning Script Execution Office 365 and Azure Tenant Selection User Account Deprovisioning Office 365 Licenses Retention Group Membership Removal Exchange Mailbox Deprovisioning Home Folder Deprovisioning User Account Relocation User Account Permanent Deletion Group Object Deprovisioning Group Object Relocation Group Object Permanent Deletion Notification Distribution Report Distribution
Deployment considerations Checking for policy compliance Deprovisioning users or groups Restoring deprovisioned users or groups Container Deletion Prevention policy Picture management rules Policy extensions
Workflows
Understanding workflow Workflow activities overview Configuring a workflow
Creating a workflow definition Configuring workflow start conditions Configuring workflow parameters Adding activities to a workflow Configuring an Approval activity Configuring a Notification activity Configuring a Script activity Configuring an If-Else activity Configuring a Stop/Break activity Configuring an Add Report Section activity Configuring a Search activity Configuring CRUD activities Configuring a Save Object Properties activity Configuring a Modify Requested Changes activity Enabling or disabling an activity Enabling or disabling a workflow Using the initialization script
Example: Approval workflow E-mail based approval Automation workflow Activity extensions
Temporal Group Memberships Group Family Dynamic Groups Active Roles Reporting Management History
Understanding Management History Management History configuration Viewing change history
Workflow activity report sections Policy report items Active Roles internal policy report items
Examining user activity
Entitlement Profile Recycle Bin AD LDS Data Management One Identity Starling Management Managing One Identity Starling Connect Configuring linked mailboxes with Exchange Resource Forest Management Configuring remote mailboxes for on-premises users Azure AD, Office 365, and Exchange Online management
Configuring Active Roles to manage hybrid AD objects Managing Hybrid AD Users Unified provisioning policy for Azure O365 Tenant Selection, Office 365 License Selection, and Office 365 Roles Selection, and OneDrive provisioning Office 365 roles management for hybrid environment users Managing Office 365 Contacts Managing Hybrid AD Groups Managing Office 365 Groups Managing Azure Security Groups Managing cloud-only distribution groups Managing cloud-only Azure users Managing cloud-only Azure guest users Managing cloud-only Azure contacts Changes to Active Roles policies for cloud-only Azure objects Managing room mailboxes Managing cloud-only shared mailboxes
Managing Configuration of Active Roles
Connecting to the Administration Service Adding and removing managed domains Using unmanaged domains Evaluating product usage Creating and using virtual attributes Examining client sessions Monitoring performance Customizing the console Using Configuration Center Changing the Active Roles Admin account Enabling or disabling diagnostic logs Active Roles Log Viewer
SQL Server Replication Appendix A: Using regular expressions Appendix B: Administrative Template Appendix C: Communication ports Appendix D: Active Roles and supported Azure environments Appendix E: Active Roles integration with other One Identity and Quest products Appendix F: Active Roles integration with Duo Appendix G: Active Roles integration with Okta

Inviting an Azure guest user

If an external user (such as a contractor, or other non-employee resource with limited permissions) must be added to the organization, invite them as Azure guest users to the Azure tenant of the organization using the Active Roles Web Interface.

To invite an Azure guest user

  1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> > Azure Guest Users.

    The list of Azure guest users of the selected tenant is displayed.

    Figure 174: Directory Management > Tree View > Azure > <azure-tenant-name> > Azure Guest Users — Listing the Azure guest users in the tenant

  2. In the right-side pane, click Invite Guest.

    You will invite a new guest user, and set up their account, application licenses and various admin roles, too.

  3. Identity

    Configure the settings required by your organization for setting up the identity of the guest user.

    Figure 175: Azure Guest Users > Invite Guest > Identity – Configuring basic user account settings for the Azure guest user

    1. (Optional) Enter the First Name of the Azure guest user.

      NOTE: If you do not enter a First Name, Active Roles will fill this field with the local part of the specified Email address.

    2. (Optional) Enter the Last Name of the Azure guest user.

    3. (Optional) Enter the Display Name of the Azure guest user.

      TIP: By default, the Display Name is automatically generated from the specified First Name and Last Name, but you can modify it to something else (such as a nickname).

    4. Enter the Email address where Active Roles will send out the invitation. This field is mandatory and must be unique.

    5. (Optional) Enter the Azure Tenant ID of the Azure tenant that will contain the guest user.

    6. To grant the Azure guest user access to the configured licenses and admin roles, select Allow user to sign in and access services.

      • If this setting is selected during this step, the guest user will receive access as soon as they accept the invitation.

      • If left clear, you must manually grant access later by enabling this setting in the Azure Properties page of the guest user. For more information, see Viewing and updating the properties of an Azure guest user.

        TIP: Leaving this setting clear is useful if the account of the Azure guest user is created in advance, and they require access to the assigned resources only later (for example, because their contract project starts only at a later date).

    7. (Optional) Enter a unique Personal message that the invitation email will contain.

  4. Licenses

    Select the Microsoft application resources licensed in your organization that you want to assign to the configured Azure guest user.

    Figure 176: Azure Guest Users > Invite Guest > Licenses – Assigning application licenses to the Azure guest user

  5. O365 Admin Roles

    Select the O365 role(s) that you want to grant for the Azure guest user.

    Figure 177: Azure Guest Users > Invite Guest > O365 Admin Roles – Assigning Office 365 administrator roles to the Azure guest user

    NOTE: You can assign roles to the Azure guest user in Active Roles without any limitation. However, One Identity recommends that you assign Azure guest users only the admin roles that external contractors typically receive in your organization.

  6. (Optional) Job Info

    Enter the Job Title and the assigned Department of the guest user, if needed.

    Figure 178: Azure Guest Users > Invite Guest > Job Info – Specifying organizational information for the Azure guest user

  7. To save your changes and send the invite email to the guest user, click Finish.

    NOTE: Consider the following when administering cloud-only Azure guest users:

Viewing Azure guest users

To list the configured cloud-only Azure guest users of an Azure tenant, and access their available configuration actions, expand the Azure Guest Users node of the Active Roles Web Interface.

To view the configured Azure guest users in an Azure tenant

Navigate to Directory Management > Tree > Azure > <azure-tenant-name> > Azure Guest Users.

The list of Azure guest users of the selected tenant is displayed.

Figure 179: Directory Management > Tree View > Azure > <azure-tenant-name> > Azure Guest Users — Listing the Azure guest users in the tenant

NOTE: Active Roles lists the available cloud-only Azure Users, Azure Guest Users, and Azure Contacts on the Active Roles Web Interface with the following restrictions:

  • Active Roles can initially list 999 items.

  • The items listed in the list have a sliding expiry of 8 hours, after which the objects that have not been accessed will be flushed.

  • Whenever you perform a search in the list, Active Roles will always fetch the list of objects from Azure to update the cache.

Disabling or Enabling an Azure guest user

If you want to revoke the access of an Azure guest user from the resources, applications and roles assigned to them, you can disable their account without deleting them with the Disable Account action.

Likewise, once the revoked access rights of a disabled Azure guest user can be reinstated, you can re-enable them with the Enable Account action.

To disable or enable a cloud-only Azure guest user

  1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> > Azure Guest Users.

    The list of Azure guest users of the selected tenant is displayed.

    Figure 180: Directory Management > Tree View > Azure > <azure-tenant-name> > Azure Guest Users — Listing the Azure guest users in the tenant

  2. Select the Azure guest user that you want to enable or disable from the list.

  3. Click the applicable option:

    • If the selected Azure guest user is enabled, click Disable Account.

    • If the selected Azure guest user is disabled, click Enable Account.

    NOTE: The available option changes depending on the state of the selected guest user account.

  4. To confirm disabling/enabling the selected Azure guest user, click Save.

Revoking the session of an Azure guest user

You can revoke the current session of any selected cloud-only Azure guest user of an Azure tenant. When doing so, Active Roles clears the active login tokens of the guest user on all devices they have previously logged in from, forcing them to log in again and validate their credentials.

TIP: If any device that the Azure guest user has been previously logged in from has been compromised (for example, because the guest user has lost their notebook or cellphone), then One Identity recommends revoking their current session.

To revoke the active session of an Azure guest user

  1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> > Azure Guest Users.

    The list of Azure guest users of the selected tenant is displayed.

    Figure 181: Directory Management > Tree View > Azure > <azure-tenant-name> > Azure Guest Users — Listing the Azure guest users in the tenant

  2. Select the Azure guest user whose session you want to revoke.

  3. Click Revoke Session.

  4. To confirm revoking the session of the selected Azure guest user, click Save.

Related Documents

The document was helpful.

Seleziona valutazione

I easily found the information I needed.

Seleziona valutazione