サポートと今すぐチャット
サポートとのチャット

Active Roles 7.5.3 - Administration Guide

Introduction About Active Roles Getting Started Rule-based Administrative Views Role-based Administration
Access Templates as administrative roles Access Template management tasks Examples of use Deployment considerations Windows claims-based Access Rules
Rule-based AutoProvisioning and Deprovisioning
About Policy Objects Policy Object management tasks Policy configuration tasks
Property Generation and Validation User Logon Name Generation Group Membership AutoProvisioning E-mail Alias Generation Exchange Mailbox AutoProvisioning AutoProvisioning for SaaS products OneDrive Provisioning Home Folder AutoProvisioning Script Execution Office 365 and Azure Tenant Selection User Account Deprovisioning Office 365 Licenses Retention Group Membership Removal Exchange Mailbox Deprovisioning Home Folder Deprovisioning User Account Relocation User Account Permanent Deletion Group Object Deprovisioning Group Object Relocation Group Object Permanent Deletion Notification Distribution Report Distribution
Deployment considerations Checking for policy compliance Deprovisioning users or groups Restoring deprovisioned users or groups Container Deletion Prevention policy Picture management rules Policy extensions
Workflows
Understanding workflow Workflow activities overview Configuring a workflow
Creating a workflow definition Configuring workflow start conditions Configuring workflow parameters Adding activities to a workflow Configuring an Approval activity Configuring a Notification activity Configuring a Script activity Configuring an If-Else activity Configuring a Stop/Break activity Configuring an Add Report Section activity Configuring a Search activity Configuring CRUD activities Configuring a Save Object Properties activity Configuring a Modify Requested Changes activity Enabling or disabling an activity Enabling or disabling a workflow Using the initialization script
Example: Approval workflow E-mail based approval Automation workflow Activity extensions
Temporal Group Memberships Group Family Dynamic Groups Active Roles Reporting Management History
Understanding Management History Management History configuration Viewing change history
Workflow activity report sections Policy report items Active Roles internal policy report items
Examining user activity
Entitlement Profile Recycle Bin AD LDS Data Management One Identity Starling Management One Identity Starling Two-factor Authentication for Active Roles Managing One Identity Starling Connect Azure AD, Office 365, and Exchange Online management
Configuring Active Roles to manage hybrid AD objects Managing Hybrid AD Users Unified provisioning policy for Azure O365 Tenant Selection, Office 365 License Selection, and Office 365 Roles Selection, and OneDrive provisioning Office 365 roles management for hybrid environment users Managing Office 365 Contacts Managing Hybrid AD Groups Managing Office 365 Groups Managing Azure Security Groups Managing cloud-only Azure users Managing cloud-only Azure guest users Managing cloud-only Azure contacts Changes to Active Roles policies for cloud-only Azure objects Managing room mailboxes
Managing Configuration of Active Roles
Connecting to the Administration Service Adding and removing managed domains Using unmanaged domains Evaluating product usage Creating and using virtual attributes Examining client sessions Monitoring performance Customizing the console Using Configuration Center Changing the Active Roles Admin account Enabling or disabling diagnostic logs Active Roles Log Viewer
SQL Server Replication Appendix A: Using regular expressions Appendix B: Administrative Template Appendix C: Communication ports Appendix D: Active Roles and supported Azure environments Appendix E: Enabling Federated Authentication Appendix F: Active Roles integration with other One Identity and Quest products Appendix G: Active Roles integration with Duo Appendix H: Active Roles integration with Okta

Policy Objects

Policy Objects/
  • Linked Property Validation Settings  Lists object properties that are under the control of any Property Generation and Validation policy defined in Active Roles. For each property, lists the object classes possessing that property, identifies the Policy Objects that affect the property, the container to which the Policy Object is linked, and the policy conditions. The report only includes containers to which Policy Objects are linked directly, without considering policy inheritance. You can filter the list of properties by various parameters, such as property name, object class name, container name, and Policy Object name.
  • Linked Property Validation Settings (with inheritance)  Lists objects along with their properties that are under the control of any Property Generation and Validation policy defined in Active Roles. An object included in this report may have a Policy Object linked to the object itself (direct policy) or to a container that holds the object (inherited policy). The report groups the list of objects by property. For each property, the report lists the objects possessing that property, identifies the Policy Objects and policy conditions that affect each of the listed objects, and indicates whether this is a direct or inherited policy. You can filter the list of objects and object properties by various parameters, such as property name, object name and type, and Policy Object name.
  • Linked Script Settings (with inheritance)  Lists objects that are under the control of any script-based (Script Execution) policy defined in Active Roles. An object included in this report may have a Policy Object linked to the object itself (direct policy effect) or to a container that holds the object (inherited policy effect). The report identifies the script-based Policy Objects that affect each of the listed objects, along with the origin of the policy effect (direct or inherited). You can filter the list of objects by various parameters, such as object name, object class name, and Policy Object name.
  • Policy Object references  Lists Active Roles Policy Objects that are applied (linked) to any container or Managed Unit. For each Policy Object, identifies its name, description and category (provisioning or deprovisioning), and lists the container to which the Policy Object is linked. You can filter the list by Policy Object name, container or Managed Unit name, and Policy Object category.
  • Policy Object Settings  Lists Active Roles Policy Objects together with their policy entries. For each Policy Object, provides detailed information about all policies that are defined in the Policy Object. You can filter the list by Policy Object name, policy type, and policy entry name.
  • Policy Object summary  Lists Active Roles Policy Objects together with the following information for each Policy Object: name; type (provisioning or deprovisioning); number of directory objects to which the Policy Object is linked (reference number); total number of individual policies defined in the Policy Object (entry number); number of policies of each particular type defined in the Policy Object.
  • Policy Objects with Securable Objects  Lists Active Roles Policy Objects together with the directory objects that are affected by each Policy Object. A directory object included in this report may have a Policy Object linked to the object itself (direct policy effect) or to a container that holds the object (inherited policy effect). For each directory object that is affected by a given Policy Object, the report identifies the object’s canonical name, type and description, and indicates whether the policy effect is direct or inherited. You can filter the list by Policy Object name, policy type, and by directory object name and type.
  • Securable Objects (with inheritance)  Lists directory objects that are affected by Active Roles Policy Objects. For each directory object, identifies the Policy Objects that are linked to the directory object itself (direct policy effect) or to a container that holds the directory object (inherited policy effect). For each Policy Object that affects a given directory object, the report lists the Policy Object’s name, path, description and policy entries, and indicates whether the policy effect is direct or inherited. You can filter the list by directory object name and type, Policy Object name and type, and by policy entry name.

Policy Compliance

Policy Compliance/
  • Objects violating Policy Rules  Lists directory objects and their properties that are not in compliance with policies determined by Active Roles Policy Objects. For each directory object, identifies the object’s name, parent container, type and description, and indicates what properties violate policy rules and what Policy Objects define the policy rules that are violated.
  • Violated Policy Rules  Lists Active Roles Policy Objects whose policy rules are violated by certain directory objects. For each Policy Object, identifies the policies defined in that Policy Object, and, for every single policy, provides information about directory objects and their properties which are not in compliance with that policy.

 

 

Management History

Understanding Management History

The Management History feature provides information on who did what and when it was done with regard to the Active Directory management tasks performed using Active Roles.

This feature gives you a clear log documenting the changes that have been made to a given object, such as a user or group object. The log includes entries detailing actions performed, success or failure of the actions, as well as which attributes were changed.

By using the Management History feature, you can examine:

  • Change History  Information on changes that were made to directory data via Active Roles.
  • User Activity  Information on management actions that were performed by a given user.

IMPORTANT:

  • The reports produced by the Change History or User Activity command include information only about the changes that were made using a certain group of Administration Services (those Services that share a common database). As the Active Roles console or Web Interface automatically selects the Service to connect to, you may encounter different reports for the same target object or user account during different connection sessions.
  • Active Roles uses the Management History storage to hold approval, temporal group membership, and deprovisioning tasks. Without synchronizing information between Management History storages, such a task created by one of the Administration Services may not be present on other Administration Services. As a result, behavior of the Active Roles console or Web Interface varies depending on the chosen Administration Service.

Both Change History and User Activity use the same source of information—the Management History log, also referred to as the Change Tracking log. The configuration settings of the Change Tracking log are discusses later in this chapter (see Management History configuration).

Active Roles also includes reports to examine management history by collecting and analyzing event log records (see Active Roles Reporting earlier in this document). However, the process of retrieving and consolidating records from the event log may be time-consuming and inefficient.

For more information on the impact of change on the Management History database, see the Impact on management history data topic in Active Roles What's New Guide.

関連ドキュメント

The document was helpful.

評価を選択

I easily found the information I needed.

評価を選択