Chatta subito con l'assistenza
Chat con il supporto

Identity Manager 9.3 - Administration Guide for Connecting to Microsoft Entra ID

Managing Microsoft Entra ID environments Synchronizing a Microsoft Entra ID environment
Setting up initial synchronization with a Microsoft Entra ID tenant Adjusting the synchronization configuration for Microsoft Entra ID environments Running synchronization Tasks following synchronization Troubleshooting Ignoring data error in synchronization Pausing handling of target system specific processes (Offline mode)
Managing Microsoft Entra ID user accounts and identities Managing memberships in Microsoft Entra ID groups Managing Microsoft Entra ID administrator roles assignments Managing Microsoft Entra ID subscription and Microsoft Entra ID service plan assignments
Displaying enabled and disabled Microsoft Entra ID service plans forMicrosoft Entra ID user accounts and Microsoft Entra ID groups Assigning Microsoft Entra ID subscriptions to Microsoft Entra ID user accounts Assigning disabled Microsoft Entra ID service plans to Microsoft Entra ID user accounts Inheriting Microsoft Entra ID subscriptions based on categories Inheritance of disabled Microsoft Entra ID service plans based on categories
Login credentials for Microsoft Entra ID user accounts Microsoft Entra ID role management
Microsoft Entra ID role management tenants Enabling new Microsoft Entra ID role management features Microsoft Entra ID role main data Main data of Microsoft Entra ID role settings Displaying Microsoft Entra ID role settings main data Assigning temporary access passes to Microsoft Entra ID user accounts Displaying Microsoft Entra ID scoped role assignments Displaying scoped role eligibilities for Microsoft Entra ID roles Overview of Microsoft Entra ID scoped role assignments Main data of Microsoft Entra ID scoped role assignments Managing Microsoft Entra ID scoped role assignments Adding Microsoft Entra ID scoped role assignments Editing Microsoft Entra ID scoped role assignments Deleting Microsoft Entra ID scoped role assignments Assigning Microsoft Entra ID scoped role assignments Assigning Microsoft Entra ID scoped role assignments to Microsoft Entra ID user accounts Assigning Microsoft Entra ID scoped role assignments to Microsoft Entra ID groups Assigning Microsoft Entra ID scoped role assignments to Microsoft Entra ID service principals Assigning Microsoft Entra ID system roles to scopes through role assignments Assigning Microsoft Entra ID business roles to scopes though role assignments Assigning Microsoft Entra ID organizations to scopes through role assignments Overview of Microsoft Entra ID scoped role eligibilities Main data of Microsoft Entra ID scoped role eligibilities Managing Microsoft Entra ID scoped role eligibilities Adding Microsoft Entra ID scoped role eligibilities Editing Microsoft Entra ID scoped role eligibilities Deleting Microsoft Entra ID scoped role eligibilities Assigning Microsoft Entra ID scoped role eligibilities Assigning Microsoft Entra ID scoped role eligibilities to Microsoft Entra ID user accounts Assigning Microsoft Entra ID scoped role eligibilities to Microsoft Entra ID groups Assigning Microsoft Entra ID scoped role eligibilities to Microsoft Entra ID service principals Assigning Microsoft Entra ID system roles to scopes through role eligibilities Assigning Microsoft Entra ID business roles to scopes though role eligibilities Assigning Microsoft Entra ID organizations to scopes through role eligibilities
Mapping Microsoft Entra ID objects in One Identity Manager
Microsoft Entra ID core directories Microsoft Entra ID user accounts Microsoft Entra ID user identities Microsoft Entra ID groups Microsoft Entra ID administrator roles Microsoft Entra ID administrative units Microsoft Entra ID subscriptions and Microsoft Entra ID service principals Disabled Microsoft Entra ID service plans Microsoft Entra ID app registrations and Microsoft Entra ID service principals Reports about Microsoft Entra ID objects Managing Microsoft Entra ID security attributes
Handling of Microsoft Entra ID objects in the Web Portal Recommendations for federations Basic data for managing a Microsoft Entra ID environment Troubleshooting Configuration parameters for managing a Microsoft Entra ID environment Default project template for Microsoft Entra ID Editing Microsoft Entra ID system objects Microsoft Entra ID connector settings

Defining categories for the inheritance of entitlements

In One Identity Manager, user accounts can selectively inherit groups, administrator roles, subscriptions, and disabled service plans. To do this, the groups (administrator roles, subscriptions, and disabled service plans) and the user accounts are divided into categories. The categories can be freely selected and are specified using a mapping rule. Each category is given a specific position within the template. The mapping rule contains different tables. Use the user account table to specify categories for target system dependent user accounts. In the other tables, enter your categories for the groups, administrator roles, subscriptions, and disabled service plans. Each table contains the category positions position 1 to position 63.

To define a category

  1. In the Manager, select the Microsoft Entra ID tenant in the Microsoft Entra ID > Tenants category.

  2. Select the Change main data task.

  3. Switch to the Mapping rule category tab.

  4. Extend the relevant roots of a table.

  5. To enable the category, double-click .

  6. Enter a category name of your choice for user accounts and groups (administrator roles, subscriptions, disabled service plans) in the login language that you use.

  7. Save the changes.
Related topics

Editing the synchronization project for a Microsoft Entra ID tenant

Synchronization projects in which a Microsoft Entra ID tenant is already used as a base object can also be opened in the Manager. You can, for example, check the configuration or view the synchronization log in this mode. The Synchronization Editor is not started with its full functionality. You cannot run certain functions, such as, running synchronization or simulation, starting the target system browser and others.

NOTE: The Manager is locked for editing throughout. To edit objects in the Manager, close the Synchronization Editor.

To open an existing synchronization project in the Synchronization Editor

  1. In the Manager, select the Microsoft Entra ID > Tenants category.

  2. In the result list, select the Microsoft Entra ID tenant.

  3. Select the Change main data task.

  4. Select the Edit synchronization project task.

Related topics

Microsoft Entra ID domains

A base domain is linked to the core directory in the cloud. You can also add other user-defined domains in Microsoft Entra ID, which you can then allocate to Microsoft cloud services. One Identity Manager only loads verified domain data into the database. It is not possible to edit data in One Identity Manager.

To obtain an overview of a domain

  1. In the Manager, select the Microsoft Entra ID > Verified domains category.

  2. Select the domain in the result list.

  3. Select the Microsoft Entra ID domain overview task.

Table 30: Domain main data

Property

Description

Domain name

Full domain name.

Tenant

Microsoft Entra ID tenant entered for this domain.

Type

Type of domain.

Primary domain

Specifies whether this is the primary domain, for example, for creating new Microsoft Entra ID user accounts.

Initial domain

Specifies whether this is the initial domain. The initial domain is created when a tenant is registered in Microsoft Entra ID.

Available services

List of the services available in this domain.

Related topics

Microsoft Entra ID policies for activity-based timeouts

You can use Microsoft Entra ID activity-based timeout policies to specify the idle time of web sessions for applications. For more information, see the Microsoft Entra ID documentation from Microsoft.

Microsoft Entra ID activity-based timeout policies are loaded into One Identity Manager during synchronization and cannot be changed.

To display information about a Microsoft Entra ID policy

  1. In the Manager, select the Microsoft Entra ID > Tenants > <your tenant> > Policies > Activity-based timeout policies category.

  2. In the result list, select the Microsoft Entra ID policy.

  3. Select one of the following tasks:

    • Activity-based timeout policy overview: This shows you an overview of the Microsoft Entra ID policy and its dependencies.

    • Change main data: Shows the Microsoft Entra ID policy's main data. You cannot edit the main data.

      • Display name: The Microsoft Entra ID policy's display name.

      • Description: Description of the Microsoft Entra ID policy.

      • Definition: Definition of the Microsoft Entra ID in JSON format.

      • Tenant: Microsoft Entra ID tenant that owns the policy.

      • Default policy: Specifies whether this is the Microsoft Entra ID tenant's default policy.

Related Documents

The document was helpful.

Seleziona valutazione

I easily found the information I needed.

Seleziona valutazione