The below steps outline the process of integrating Microsoft Azure with Active Roles 7.2 so that Active Roles can create and edit objects. A video is available below.
For steps on configuring the Active Roles Synchronization Service for a Back Sync which links objects already in Azure with on-prem Active Directory objects, please see Part 2.
- Log into the Azure Portal and choose Help | Show Diagnotics. This will download a file called PortalDiagnostics.json which contains the necessary information.
- Open PortalDiagnostics.json in WordPad and find the "tenants" section. This will contain the id and domainName which are required in order to complete the integration.
- In the Active Roles Web Interface, click on Directory Management | Azure Configuration and choose the option to Add Azure Tenant
- The Azure Tenant Name must be the domainName from PortalDiagnostics.json. The Azure Tenant ID must be the id from PortalDiagnostics.json.
- An Azure Service Account which has the Global Administrator role must be used for the initial Azure configuration and to complete the following steps. After the configuration is complete, the Global Administrator Role can be retained or the Azure service account can be changed to have both the User Management Administrator and Exchange Administrator roles.
- The Azure Tenant Type can be confirmed in the Azure Portal under Azure Active Directory | Custom Domain Names. If the Domain is not checked off as Federated then it must be integrated as a Non-Federated Domain if AADConnect is not being used and as a Synchronized Domain if it is.
- After the Azure Tenant has been added, choose the option to Add Azure Application
- The Display Name must be unique on the Azure side. The Azure Tenant ID must be the id from PortalDiagnostics.json.
- After the Azure application has been added, the necessary permissions must be granted using the Consent URL. Open the URL and log in with a Global Administrator account. Choose Accept.
- In the Active Roles Console, expand Configuration | Policies | Administration | Builtin
- Link the Built-in Policy - Azure - Default Rules to Generate Properties to the containers where the on-prem Active Directory accounts for Azure Users will reside.
- On those same containers, using Advanced Properties, set the edsvaAzureOffice365Enabled attribute to TRUE. Optionally, also set edsvaAzureOffice365EnabledIncludeChildOUs so that child containers are also selected.
NOTE: In Active Roles 7.4.3, step 12 can be skipped because of Enhancement ID 99213 which sets edsvaAzureOffice365Enabled to TRUE if the Built-in Policy - Azure - Default Rules to Generate Properties policy is linked.