Deprovision an existing Active Roles user for SaaS products
Active Roles provides the ability to deprovision SaaS product users. When an Active Roles user is deprovisioned, if the user is mapped to Starling Connect, then the user is deprovisioned from the selected connected system. This means the Active Role SaaS product user is prevented from logging on to the network and connecting to any of the connected systems through the registered connectors.
The Deprovision command on a user updates the account as prescribed by the deprovisioning policies.
Active Roles comes with a default policy to automate some commonly-used deprovisioning tasks, and allows the administrator to configure and apply additional policies.
To deprovision a user for a SaaS product
- On the Active Roles Web interface Navigation bar, click Directory Management.
- On the Views tab in the Browse pane, click Active Directory.
The list of Active Directory domains is displayed.
-
Click the specific domain, Container or the Organizational Unit, and then select the check box corresponding to the specific user, which you want to deprovision for SaaS products
- Select the user, and in the Command pane, click Deprovision.
A message is displayed prompting you to confirm the account deprovision.
- Click Yes, to continue
Wait while Active Roles updates the user.
After the task is completed, a message is displayed that the account is deprovisioned successfully from Active Roles.
If the user is mapped to Starling Connect, then the user is deprovisioned from the connected systems.
To undo deprovision of a user for a SaaS product
- On the Active Roles Web interface Navigation bar, click Directory Management.
- On the Views tab in the Browse pane, click Active Directory.
The list of Active Directory domains is displayed.
-
Click the specific domain, Container or the Organizational Unit, and then select the check box corresponding to the specific user, which you want to undo deprovision for SaaS products.
- In in the Command pane, click UndoDeprovisioning.
The Password Options dialog box is displayed.
- Select the option to Leave the Password unchanged or Reset the password, and click OK.
Notifications for Starling operations
The Notification pane displays the notification specific to Starling operations. The notifications are classified into Starling Connect and Updates.
|
IMPORTANT:
- You must enable Port 7465 (HTTP) TCP Inbound/Outbound and Port 7466 (HTTPS) TCP Inbound/Outbound for the notifications to work. For more information, see Access to domain controllers.
- The Web Interface machine must be able to resolve Service machine name for Notifications to work.
|
To view the Starling Connect notification
- On the Active Roles Web interface, click the notification icon.
Starling Connect and Updates tabs are displayed.
- Click the Starling Connect tab to view the notifications specific to SaaS operations.
|
NOTE: The latest five notifications are sent only to the initiator of the operation. |
To view the Updates
- On the Active Roles Web interface, click the notification icon.
Starling Connect and Updates tabs are displayed.
- Click the Updates tab to view the important updates about Starling.
- For more information on the notification, click Read More.
|
NOTE: The notifications are sent to all the users who have joined Starling on the Administration website. |
To view notifications on the Notifications page
- On the Active Roles Web interface, click the notification icon.
Starling Connect and Updates tabs are displayed.
-
Click the Starling Connect tab to view the notifications specific to SaaS operations.
The latest five notifications are displayed with the configuration status and a brief description.
-
Click View all notifications to view the details about the notification.
The Notification page is displayed.
-
Click Filter drop-down menu to filter the notifications based on time, connector name , status, and keywords.
- Select the required notifications and click Export to CSV from the Action drop-down menu. Click Go. You can also delete a notification by selecting a particular checkbox.
- Point the mouse to the notification in the Message column to view a detailed description. Expand the connector information available next to the connector check box to view the detailed description. The description pane gives the link to Change History of that particular object for more details. You can also copy the message in case of a failure.
Configuring notification settings
You can configure notifications settings from the Home screen | Settings page and Home screen | Customization | Global Settings.
To configure notification settings on the Settings page
- On the Active Roles Web interface, click the Settings.
The Settings page is displayed.
- On the Settings page, enter the time in minutes for which the notification is to be visible in Time (in minutes) for which the notification is visible field.
|
NOTE: By default, the time is set to 0 and the notifications do not expire. You can update the time to the required limit in minutes. |
- Enter the number of notifications to be stored in Maximum number of notifications to be stored in Active Roles field.
|
NOTE: The maximum number of notifications that can be stored is 1000. |
To configure notification settings on the Customization page
- On the Active Roles Web interface, click the Customization.
The Customization page is displayed.
- On the Customization page, click Global Settings.
- In the Settings applied for every user of the Web Interface by default section, enter the time in minutes for which the notification is to be visible in Time (in minutes) for which the notification is visible field.
|
NOTE: By default, the time is set to 0. You can update the time to the required limit in minutes. |
- Enter the number of notifications to be stored in Maximum number of notifications to be stored in Active Roles field.
|
NOTE: The maximum number of notifications that can be stored is 1000. |
|
IMPORTANT: For notifications to work as expected, you must perform the following, if you are using ActiveRoles website over HTTPS:
|
SCIM attribute mapping with Active Directory
Active Roles provides support to connect to Starling Connect to manage the user provisioning and deprovisioning activities for the registered connectors. This is achieved through the internal attribute mapping mechanism. The AD attributes are mapped to SCIM attributes to perform each operation.
SCIM attribute mapping with Active Directory for Users
SCIM |
Active Directory |
displayName |
displayName |
givenName |
givenName |
familyName |
sn |
middleName |
middleName |
title |
title |
password |
edsaPassword |
streetAddress |
streetAddress |
locality |
city |
postalCode |
postalCode |
region |
state |
country |
c |
active |
edsaAccountIsDisabled |
userName |
edsvauserName |
honorificPrefix |
initials |
formattedName |
cn |
emails |
proxyAddresses,mail |
preferredLanguage |
preferredLanguage |
description |
description |
emailEncoding |
edsvaemailEncoding |
alias |
edsvaalias |
division |
division |
company |
company |
department |
department |
homePage |
wWWHomePage |
lastLogon |
lastLogon |
accountExpires |
accountExpires |
timezone |
edsvatimezone |
entitlements |
edsvaentitlements |
employeeNumber |
employeeNumber |
cn |
cn |
userPermissionsMarketingUser |
edsvauserPermissionsMarketingUser |
userPermissionsOfflineUser |
edsvauserPermissionsOfflineUser |
userPermissionsAvantgoUser |
edsvauserPermissionsAvantgoUser |
userPermissionsCallCenterAutoLogin |
edsvauserPermissionsCallCenterAutoLogin |
userPermissionsMobileUser |
edsvauserPermissionsMobileUser |
userPermissionsSFContentUser |
edsvauserPermissionsSFContentUser |
userPermissionsKnowledgeUser |
edsvauserPermissionsKnowledgeUser |
userPermissionsInteractionUser |
edsvauserPermissionsInteractionUser |
userPermissionsSupportUser |
edsvauserPermissionsSupportUser |
userPermissionsLiveAgentUser |
edsvauserPermissionsLiveAgentUser |
locale |
localeID |
phoneNumbers |
telephoneNumber,mobile,homePhone |
manager |
manager |
desiredDeliveryMediums |
edsvadesiredDeliveryMediums |
nickname |
edsvanickname |
SCIM attribute mapping with Active Directory for Groups
SCIM |
Active Directory |
displayName |
cn |
members |
member |
email |
mail |
manager |
managedBy |
Azure AD, Office 365, and Exchange Online management
Active Roles is an administrative platform that facilitates the administration and provisioning of Active Directory, Exchange, and Azure Active Directory (Azure AD) resources in on-premises, cloud-only and hybrid environments as well. You can manage all these resources through the Active Roles Web Interface.
-
In an on-premises environment, when you create new Active Directory objects (users, guest users, groups, contacts, and so on), Active Roles creates and stores these new objects in the local infrastructure of your organization.
-
In a cloud-only environment, when you create new Active Directory objects (users, guest users, groups, contacts, and so on), Active Roles creates and stores these new objects in the Azure Cloud.
-
In hybrid environments, when you create new Active Directory objects (users, guest users, contacts, and so on) Active Roles synchronizes the on-premises Active Directory objects and their properties to the Azure AD cloud. This synchronization is performed by the Active Roles Synchronization Service between Active Roles and Microsoft Office 365, whenever you configure an Active Directory object with the Active Roles Web Interface.
|
NOTE: The Active Roles Web Interface supports Azure AD-related operations only on sites based on the Administrators template. While some of the configuration procedures listed in this page are also supported through the Management Shell, they are all described with using the Active Roles Web Interface. |
The Office 365 / Azure AD capabilities of Active Roles support the following administrative tasks:
- Create an Office 365 user account associated with a given Active Directory user account.
- Synchronize user properties from Active Directory user accounts to their associated Office 365 user accounts.
- View or change the properties of the Office 365 user account associated with a given Active Directory user account.
- Assign Office 365 licenses to the Office 365 user account associated with a given Active Directory user account.
- Delete the Office 365 user account associated with a given Active Directory user account.
- Create an Office 365 security group or distribution group associated with a given Active Directory group.
- Synchronize group properties, including the members list, from Active Directory groups to their associated Office 365 groups.
- View or change the properties of the Office 365 group associated with a given Active Directory group.
- Delete the Office 365 group associated with a given Active Directory group.
- Create an Office 365 external contact associated with a given Active Directory contact.
- Synchronize contact properties from Active Directory contacts to their associated Office 365 external contacts.
- View or change the properties of the Office 365 external contact associated with a given Active Directory contact.
- Delete the Office 365 external contact associated with a given Active Directory contact.
- View Office 365 domain and license information.
- Create Office 365 users. When you create an Office 365 user, you can choose whether to license that user for Exchange Online.
- Create security groups and distribution groups in Office 365. You can choose the type of the Office 365 group that you want to create.
- Assign licenses to Office 365 users. When creating or administering a user, you can choose the Office 365 licenses that you want to assign to that user.
- Restrict the licenses for Office 365 users. You can configure a policy to specify what Office 365 licenses can be assigned depending on user location in Active Directory.
- View or change the Office 365 specific object properties. You can edit Office 365 users, groups and contacts.
- Examine Office 365 licenses and license usage. For each of your license subscriptions, you can view how many licenses are valid, expired or assigned. This information is displayed on the add-on application page in the Active Roles console.
- Examine Office 365 domains. For each of your Office 365 domains, you can view the status of the domain and see whether the domain is configured for single sign-on (federated). Azure Domains are listed in Azure Domains in Azure Configuration
- Associate existing Office 365 users with on-premises Active Directory users. The synchronization workflow uses the GUID and the primary SMTP address to match an existing Office 365 user to the appropriate on-premises Active Directory user.