サポートと今すぐチャット
サポートとのチャット

Identity Manager 8.1.4 - Administration Guide for Connecting to Azure Active Directory

Managing Azure Active Directory environments Setting up synchronization with an Azure Active Directory tenant Basic data for managing an Azure Active Directory environment Azure Active Directory core directories Azure Active Directory user accounts Azure Active Directory groups Azure Active Directory administrator roles Azure Active Directory subscriptions and service plans
Azure Active Directory subscriptions Disabled Azure Active Directory service plans
Reports about Azure Active Directory objects Configuration parameters for managing an Azure Active Directory environment Default project template for Azure Active Directory

Azure Active Directory tenant

You must provide details about your organization the first time you register for a Microsoft cloud service. This detailed information is used to make a new Azure Active Directory directory partition. The organization represents one Azure Active Directory tenant. In One Identity Manager, you can edit the master data of each tenant. However, you cannot create new tenants in One Identity Manager.

To edit Azure Active Directory tenant master data

  1. Select the Azure Active Directory | Tenants category.
  2. Select the tenant in the result list.
  3. Select the Change master data task.
  4. Edit the tenant's master data.
  5. Save the changes.
Detailed information about this topic

General master data for Azure Active Directory tenants

Enter the following data on the General tab.

Table 18: Tenant master data

Property

Description

Display name

The tenant’s display name.

Account definition (initial)

Initial account definition for creating user accounts. This account definition is used if automatic assignment of employees to user accounts is used for this tenant and user accounts should be created which are already managed (Linked configured state). The account definition's default manage level is applied.

User accounts are only linked to the employee (Linked) if no account definition is given. This is the case on initial synchronization, for example.

Target system managers

Application role, in which target system managers are specified for the tenant. Target system managers only edit the objects from tenants to which they are assigned. Each tenant can have a different target system manager assigned to it.

Select the One Identity Manager application role whose members are responsible for administration of this tenant. Use the button to add a new application role.

Location

The tenant's location.

Street

Street or road.

City

City.

Zip code

Zip code.

Country

Country.

Synchronized by

Type of synchronization through which the data is synchronized between the tenant and One Identity Manager. You can no longer change the synchronization type once objects for this tenant are present in One Identity Manager.

If you create a tenant with the Synchronization Editor, One Identity Manager is used.

Table 19: Permitted values
Value Synchronization by Provisioned by

One Identity Manager

Azure Active Directory connector

Azure Active Directory connector

No synchronization

none

none

NOTE: If you select No synchronization, you can define custom processes to exchange data between One Identity Manager and the target system.

Recipients (marketing notifications)

List of recipients of marketing notifications.

Recipient (technical notifications)

List of recipients of technical notifications.

Recipients (security notifications)

List of recipients of security notifications.

Phone numbers (security notifications)

Phone numbers for security notifications.

Related topics

Information about local Active Directory

The Linked tab shows information about the local Active Directory, which is linked to the Azure Active Directory tenant.

Table 20: Local Active Directory user account data
Property Description

Synchronization with local Active Directory enabled

Specifies whether synchronization with a local Active Directory is enabled.

Last synchronization

Time of the last Azure Active Directory tenant synchronization with the local Active Directory.

Defining categories for the inheritance of entitlements

In One Identity Manager, groups, administrator roles, subscriptions, and disabled services plans can be selectively inherited by user accounts. For this purpose, the groups (administrator roles, subscriptions, disabled service plans) and the user accounts are divided into categories. The categories can be freely selected and are specified using a mapping rule. Each category is given a specific position within the template. The mapping rule contains different tables. Use the user account table to specify categories for target system dependent user accounts. In the other tables enter your categories for the target system-dependent groups, administrator roles, subscriptions, and disabled service plans. Each table contains the Position 1 to Position 31 category positions.

To define a category

  1. In the Manager, select the tenant in the Azure Active Directory | Tenants category.

  2. Select the Change master data task.
  3. Switch to the Mapping rule category tab.
  4. Extend the relevant roots of a table.
  5. To enable the category, double-click .
  6. Enter a category name of your choice for user accounts and groups (administrator roles, subscriptions, disabled service plans) in the login language that you use.
  7. Save the changes.
Related topics
関連ドキュメント

The document was helpful.

評価を選択

I easily found the information I needed.

評価を選択