This section provides information about the supported operations and methods for performing the operations for Azure objects in various Azure environments using Active Roles Web interface, such as Federated, Synchronized Identity, and Non-Federated environments.
In Active Roles Web interface, the required Azure environment configuration can be selected during the Azure tenant creation. The specified configuration can be modified later if needed by changing the Azure properties of the tenant.
Active Roles identifies the environment based on the Azure Tenant type and applies the changes to the Web interface.
Non-federated environment is used generally for testing purposes. In non-federated environment, most of the Azure properties can be modified, other than attributes such as UserPrincipalName and ObjectId which identify the object uniquely.
The following table provides information about the operations and methods of operation that can be performed on Azure Objects in a non-federated environment.
Table 119: Supported Azure configurations comparison chart
User |
Create |
Using GRAPH API |
Read |
Using GRAPH API and Exchange Online Command-lets |
Update |
Using GRAPH API and Exchange Online Command-lets |
Delete |
Using GRAPH API |
Guest User |
Create |
Using GRAPH API |
Read |
Using GRAPH API |
Update |
Using GRAPH API |
Delete |
Using GRAPH API |
Security Group |
Create |
Using GRAPH API |
Read |
Using GRAPH API |
Update |
Using GRAPH API |
Delete |
Using GRAPH API |
Mail Enabled Security
Group |
Create |
Using Exchange Online Command-lets |
Read |
Using GRAPH API |
Update |
Using GRAPH API |
Delete |
Using GRAPH API |
Distribution Group |
Create |
Using Exchange Online Command-lets |
Read |
Using GRAPH API |
Update |
Using GRAPH API |
Delete |
Using GRAPH API |
Native Office 365 Group
(Cloud-only*)
|
Create |
Using GRAPH API |
Read |
Using GRAPH API |
Update |
Using GRAPH API |
Delete |
Using GRAPH API |
Contacts |
Create |
Using Exchange Online Command-lets |
Read |
Using GRAPH API |
Update |
Using Exchange Online Command-lets |
Delete |
Using GRAPH API |
|
NOTE: *Active Roles provides cloud-only support only for Office 365 Groups management. |
Synchronization methods are applicable only in Synchronized and Federated environments and AAD Connect is used to perform the synchronization. Azure non-federated environment does not require synchronization and the direct GRAPH API calls are used to make the Azure or Office 365 object management.
The following table provides information about the operations and methods of operation that can be performed on Azure Objects in Federated and Synchronized Identity environments.
Table 120: Supported Azure configurations comparison chart
User |
Create |
|
|
Created by GRAPH API |
Read |
|
|
Using GRAPH API and Exchange Online Command-lets |
Update |
Azure properties |
Identity |
Synced using AAD Connect |
Settings |
Using GRAPH API |
Job Info |
Synced using AAD Connect |
Contact Info |
Synced using AAD Connect |
Licenses |
Using GRAPH API |
O365 Admin Roles |
Using GRAPH API |
OneDrive |
Created by OneDrive Policy using PowerShell commands |
Exchange Online properties |
Mail Flow Settings |
Using Exchange Online cmdlets |
Delegation |
Using Exchange Online cmdlets |
E-mail Address |
Synced using AAD Connect |
Mailbox Features |
Using Exchange Online cmdlets |
Mailbox Settings |
Using Exchange Online cmdlets |
Delete |
|
|
Using GRAPH API |
Guest Users |
Create |
Invite Guest |
|
Created by GRAPH API |
Read |
|
|
Using GRAPH API |
Update |
Azure properties |
Identity |
Synced using AAD Connect |
Settings |
Using GRAPH API |
Job Info |
Synced using AAD Connect |
Contact Info |
Synced using AAD Connect |
Licenses |
Using GRAPH API |
O365 Admin Roles |
Using GRAPH API |
Exchange Online properties |
Mail Flow Settings |
Using Exchange Online cmdlets |
Delegation |
Using Exchange Online cmdlets |
E-mail Address |
Synced using AAD Connect |
Mailbox Features |
Using Exchange Online cmdlets |
Mailbox Settings |
Using Exchange Online cmdlets |
Delete |
|
|
Using GRAPH API |
Security Group |
Create |
|
|
Created in Azure, Back Synced to Active Roles, Synced using AAD Connect |
Read |
|
|
Using GRAPH API |
Update |
|
|
Synced using AAD Connect |
Delete |
|
|
Using GRAPH API |
Mail Enabled Security Group |
Create |
|
|
Created in Azure, Back Synced to Active Roles, Synced using AAD Connect |
Read |
|
|
Using GRAPH API |
Update |
|
|
Synced using AAD Connect |
Delete |
|
|
Using GRAPH API |
Distribution Group |
Create |
|
|
Created in Azure, Back Synced to Active Roles, Synced using AAD Connect |
Read |
|
|
Using GRAPH API |
Update |
|
|
Synced using AAD Connect |
Delete |
|
|
Using GRAPH API |
Native Office 365 Group (Cloud-only*) |
Create |
|
|
Using GRAPH API |
Read |
|
|
Using GRAPH API |
Update |
|
|
Using GRAPH API |
Delete |
|
|
Using GRAPH API |
Contacts |
Create |
|
|
Synced using AAD Connect |
Read |
|
|
Using GRAPH API |
Update |
|
|
Synced using AAD Connect |
Delete |
|
|
Using GRAPH API |
|
NOTE:
|
You can integrate Active Roles with the following One Identity products to complement and extend identity and access management in your organization.
Change Auditor
Quest Change Auditor for Active Directory is a security auditing solution providing real-time notifications for critical AD, Azure AD and ADFS configuration changes. The application tracks, audits, reports and alerts on all key configuration changes (for example, modifications in users, groups, nested groups, GPOs, computers, services, registry entries, local users or the DNS), and consolidates them in a single console without the overhead of native auditing.
In addition, you can lock down critical AD objects to protect them from unauthorized or accidental modifications and deletions. Correlating activity across the on-premises and cloud directories, Change Auditor provides a single pane of glass view of your hybrid environment and makes it easy to search all events regardless of where they occurred.
For more information on integrating Active Roles with Change Auditor, see Active Roles Integration in the Change Auditor Installation Guide, or Change Auditor Knowledge Base Article 309842.
Cloud Access Manager
One Identity Cloud Access Manager (CAM) delivers real productivity gains by minimizing the effort required to control access to the on-premises applications and cloud service accounts of your organization. When using CAM, users (such as employees or customers) require only a single username and password combination to gain secure access to their resources through a customizable application portal. However, if stronger authentication is preferred, you can also configure CAM to require one-time passwords (OTP) during login.
For more information on using CAM with Active Roles, see Integrated Windows Authentication in the Cloud Access Manager Configuration Guide.
Defender
One Identity Defender is a cost-effective security solution that authenticates users who access your network resources. When deployed in your organization, only users who successfully authenticate via Defender are granted access to the secured resources.
Defender uses the user identities stored in Microsoft Active Directory (AD) to enable two-factor authentication (2FA), taking advantage of its inherent scalability and security, and eliminating the costs and time required to set up and maintain proprietary databases. The web-based administration tool and the user self-service portal of Defender ease the implementation of 2FA for both administrators and users. Defender also provides a comprehensive audit trail that enables compliance and forensics.
For more information on using Defender with Active Roles, see Integration with Active Roles in the Defender Administration Guide.
Enterprise Reporter
Quest Enterprise Reporter provides administrators, security officers, help desk staff, and other stakeholders insight into their network environment. Reporting on your network environment provides general visibility into the security and configuration of your environment, validation against your security policies to ensure objects are configured as expected, and an easy way to respond to inquiries from auditors requesting security and configuration information.
Enterprise Reporter provides a unified solution for data discovery and report generation. Using the Enterprise Reporter Configuration Manager, administrators can easily configure and deploy discoveries to collect and store data. Once the data has been collected, the Report Manager allows users to produce reports that help organizations ensure that they comply with industry regulations and standards, adhere to internal security policies, and fulfill hardware and software requirements.
For more information on using Enterprise Reporter with Active Roles, see the Enterprise Reporter Configuration Manager User Guide, or the Quest Enterprise Reporter Knowledge Base.
Recovery Manager for Active Directory
Quest Recovery Manager for Active Directory (RMAD) is an AD recovery tool that enables you to recover sections of the organization AD (for example, selected objects or object properties) without taking AD offline. RMAD minimizes potential AD downtimes that data corruption or improper directory modifications can cause by offering automatic backup options, and fast, remotely managed recovery operations.
Active Roles supports integration with RMAD through its Active Roles Add-on for RMAD extension. When installed, the Active Roles Web Interface receives a new Restore Object option, opening the Recovery Manager Portal of RMAD, and allowing you to restore modified or deleted directory objects.
For more information on RMAD, see the RMAD technical documentation. For more information on the Active Roles Add-on for RMAD extension, see the Active Roles Add-on for Recovery Manager for Active Directory Release Notes.
Safeguard
One Identity Safeguard is a privileged management software used to control, monitor, and govern privileged user accounts and activities to identify possible malicious activities, detect entitlement risks, and provide tamper proof evidence. Safeguard products also aid incident investigation, forensics work, and compliance efforts.
The One Identity Safeguard for Privileged Passwords (SPP) appliances are built specifically for use only with the SPP privileged management software, which is pre-installed and ready for use on the SPP appliance. The SPP appliance is hardened to ensure the system is secured at the hardware, operating system, and software levels as well. The hardened appliance approach protects the privileged management software from attacks while simplifying deployment and ongoing management, and also shortening the time frame to value period.
For more information on SPP, see the latest One Identity Safeguard for Privileged Passwords documentation.
Safeguard Authentication Services
One Identity Safeguard Authentication Services (SAS) extends the security and compliance of AD to Unix, Linux, and macOS platforms and enterprise applications with the following features:
-
Addressing the compliance need for cross-platform access control.
-
Addressing the operational need for centralized authentication and single sign-on.
-
Unifying identities and directories for simplified identity and access management.
For more information on integrating Active Roles with SAS, see the Authentication Services Active Roles Integration Pack Release Notes or SAS Knowledge Base Article 253135.
Starling
Active Roles supports integration with the One Identity Starling Connect service.
One Identity Starling Connect is a cloud-based service extending the provisioning capabilities of Active Roles to a growing collection of Software-as-a-Service (SaaS) applications, enabling organizations to streamline processes and secure hybrid environments. This allows you to extend your on-premises Active Roles deployment to provision additional applications, regardless of whether they are on-premises or cloud-based.
For more information on integrating Active Roles with Starling Connect, see Starling
TPAM
The Privileged Appliance and Modules (TPAM) appliance is a robust collection of integrated modular technologies designed specifically to meet the complex and growing compliance and security requirements associated with privileged identity management and privileged access control. TPAM consists of two main modules:
-
Privileged Password Manager ensures that when administrators require elevated access, that access is granted according to the established organization policy, with all appropriate approvals, with all actions fully audited and tracked, and in a way that the password used is immediately changed upon its return.
-
Privileged Session Manager provides tools for session and proxy control, and for auditing, recording and replaying the activities of high-risk users, for example administrators or remote vendors. It provides a single point of control from which you can authorize connections, limit access to specific resources, view active connections, record all activities, or raise alerts and terminate connections if they exceed the pre-set time limits.
With its available modules, One Identity TPAM automates, controls and secures the entire process of granting administrators the credentials necessary to perform their duties.
For more information on the TPAM Appliance, see the One Identity TPAM technical documentation, or the TPAM Knowledge Base.