View Office 365 Roles Report
Office 365 Roles Report displays the Office 365 roles that are available and assigned to a user.
To view the Office 365 roles report
- On the Active Roles Web interface Navigation bar, click Directory Management.
- On the Views tab in the Browse pane, click Azure | Azure Configuration | Office 365 Roles Report. Select the Tenant name from the Tenant list drop down for which you want to view the Office 365 roles report.
The Office 365 Roles Report wizard displays the list of Office 365 roles and the users assigned with the roles for the Azure AD domain.
After the import or upgrade operation, a scheduled task is created for tenant association. This scheduled task runs at a specified date and time or you can also choose to run the task immediately to associate azure objects with the selected tenant.
The task can be scheduled to run at a specific time. To schedule the task, navigate to Configuration | Server Configuration | Scheduled Tasks | Builtin container in the Active Roles console.
After successfully completing the task, a log file is found in the Configuration Center logs folder with the name SyncAssociatedTenantId.log.
NOTE: Alternatively, Azure Tenant association can be run at any time using the template workflow Update Azure Objects Associated Tenant Id available in the Built-in Workflow Container. The parameter in the script used by the workflow can be configured with the required tenant ID. You can use the drop-down to select a default Azure Tenant from the list of available Azure Tenants. The script used by the workflow can be modified to Search Azure objects based on the requirement.
Configuring Active Roles to manage Hybrid AD using Management Shell
Active Roles Management Shell enables you to perform the following configuration tasks to manage Hybrid AD:
Use the Active Roles Management Shell to add an Azure AD tenant. To do so, run the New-QADAzureConfigObject cmdlet on the Management Shell interface.
Description
New-QADAzureConfigObject lets you add an Azure AD tenant to Active Directory.
Usage Recommendations
Use New-QADAzureConfigObject to add an Azure AD tenant using the tenant ID provided by Microsoft for the default tenant (created at the time of the Microsoft Azure subscription).
Syntax
New-QADAzureConfigObject -type 'AzureTenant' -name 'Azuretenantname' -AzureTenantId 'AzureTenantGUID' -AzureTenantDescription 'AzureTenantDescription' -AzureAdminUserID 'AzureGlobalAdminUserID' -AzureAdminPassword 'AzureGlobalIDPassword' -AzureADTenantType 'AzureTenantType'
Parameters
The New-QADAzureConfigObject cmdlet has the following parameters.
-
type (string): Specifies the object class of the directory object to be created (such as User or Group). The cmdlet creates a directory object of the object class specified with this parameter.
Table 96: Parameter: type (string)
Required |
true |
Position |
named |
Accepts pipeline input |
false |
Accepts wildcard characters |
false |
-
name (string): Sets the name attribute to the value of this parameter on the new object created by New-QADAzureConfigObject in the directory.
Table 97: Parameter: name (string)
Required |
true |
Position |
named |
Accepts pipeline input |
false |
Accepts wildcard characters |
false |
-
AzureTenantId (string): Specifies the Azure AD tenant ID obtained from the default tenant (created after subscribing to Microsoft Azure).
NOTE: The Azure AD ID value configured for this parameter must match the tenant ID configured on the Azure AD side. Otherwise, attempts to create an Azure AD application or manage Azure AD objects will fail.
Table 98: Parameters: AzureTenantId (string)
Required |
true |
Position |
named |
Accepts pipeline input |
false |
Accepts wildcard characters |
false |
-
AzureTenantDescription: Specifies the required description of the Azure AD tenant.
Table 99: AzureTenantDescription
Required |
false |
Position |
named |
Accepts pipeline input |
false |
Accepts wildcard characters |
false |
-
AzureAdminUserID: Specifies the administrative user name for Microsoft Azure AD.
NOTE: The administrative user must have the required privileges (for example, License Administrator, User Administrator or Groups Administrator roles) to perform license management or Azure user, guest user, and group management.
For more information on the available privileges and for an overview of the various Azure and Azure AD administrative roles, see Azure AD built-in roles and Classic subscription administrator roles, Azure roles, and Azure AD roles in the official Microsoft documentation.
Table 100: Parameters: AzureAdminUserID
Required |
true |
Position |
named |
Accepts pipeline input |
false |
Accepts wildcard characters |
false |
-
AzureAdminPassword: Specifies the administrative user password for Microsoft Azure AD.
Table 101: Parameters: AzureAdminPassword
Required |
true |
Position |
named |
Accepts pipeline input |
false |
Accepts wildcard characters |
false |
-
AzureADTenantType: Specifies the Azure AD tenant type (Federated, Non-Federated, or Synchronized Identity).
NOTE: Make sure that you select the tenant type corresponding to your organization environment.
Table 102: Parameters: AzureADTenantType
Required |
true |
Position |
named |
Accepts pipeline input |
false |
Accepts wildcard characters |
false |
Accepts value |
- Federated
- NonFederated
- SynchronizedIdentity
|
Examples
See the following use cases for examples on how to use this cmdlet.
Example: Creating a new Azure AD tenant with a local user
To create a new Azure AD tenant with a locally logged on user
-
Connect to any available domain controller with the credentials of your local user.
-
Create a new Azure AD tenant with the following New-QADAzureConfigObject cmdlet:
C:\PS> New-QADAzureConfigObject -type 'AzureTenant' -name 'CompanyAzuretenant' -AzureTenantId 'CompanyAzureTenantID' -AzureTenantDescription 'Azure tenant for Company' -AzureAdminUserID 'AzureAdminUser1' -AzureAdminPassword 'AzureAdminPassword1’ -AzureADTenantType 'AzureTenantType'
Example: Creating a new Azure AD tenant with a specific user and then disconnecting
To create a new Azure AD tenant with a specific user and then disconnect
-
Connect to any available domain controller:
C:\PS> $pw = read-host "Enter password" -AsSecureString
-
Connect to the local Administration Service with a specific user of your choice:
C:\PS> connect-qadService -service 'localhost' -proxy -ConnectionAccount 'company\administrator' -ConnectionPassword $pw
-
Create the new Azure AD tenant:
C:\PS> New-QADAzureConfigObject -type 'AzureTenant' -name 'CompanyAzuretenant' -AzureTenantId 'CompanyAzureTenantID' -AzureTenantDescription 'Azure tenant for Company' -AzureAdminUserID 'AzureAdminUser1' -AzureAdminPassword 'AzureAdminPassword1’ -AzureADTenantType 'AzureTenantType'
-
Once the Azure AD tenant is created, disconnect your user:
C:\PS> disconnect-qadService