지금 지원 담당자와 채팅
지원 담당자와 채팅

Active Roles 8.0 LTS - Administration Guide

Introduction About Active Roles Getting Started Rule-based Administrative Views Role-based Administration
Access Templates as administrative roles Access Template management tasks Examples of use Deployment considerations Windows claims-based Access Rules
Rule-based AutoProvisioning and Deprovisioning
About Policy Objects Policy Object management tasks Policy configuration tasks
Property Generation and Validation User Logon Name Generation Group Membership AutoProvisioning E-mail Alias Generation Exchange Mailbox AutoProvisioning AutoProvisioning for SaaS products OneDrive Provisioning Home Folder AutoProvisioning Script Execution Office 365 and Azure Tenant Selection User Account Deprovisioning Office 365 Licenses Retention Group Membership Removal Exchange Mailbox Deprovisioning Home Folder Deprovisioning User Account Relocation User Account Permanent Deletion Group Object Deprovisioning Group Object Relocation Group Object Permanent Deletion Notification Distribution Report Distribution
Deployment considerations Checking for policy compliance Deprovisioning users or groups Restoring deprovisioned users or groups Container Deletion Prevention policy Picture management rules Policy extensions
Workflows
Understanding workflow Workflow activities overview Configuring a workflow
Creating a workflow definition Configuring workflow start conditions Configuring workflow parameters Adding activities to a workflow Configuring an Approval activity Configuring a Notification activity Configuring a Script activity Configuring an If-Else activity Configuring a Stop/Break activity Configuring an Add Report Section activity Configuring a Search activity Configuring CRUD activities Configuring a Save Object Properties activity Configuring a Modify Requested Changes activity Enabling or disabling an activity Enabling or disabling a workflow Using the initialization script
Example: Approval workflow E-mail based approval Automation workflow Activity extensions
Temporal Group Memberships Group Family Dynamic Groups Active Roles Reporting Management History
Understanding Management History Management History configuration Viewing change history
Workflow activity report sections Policy report items Active Roles internal policy report items
Examining user activity
Entitlement Profile Recycle Bin AD LDS Data Management One Identity Starling Management Managing One Identity Starling Connect Configuring linked mailboxes with Exchange Resource Forest Management Configuring remote mailboxes for on-premises users Azure AD, Office 365, and Exchange Online management
Configuring Active Roles to manage hybrid AD objects Managing Hybrid AD Users Unified provisioning policy for Azure O365 Tenant Selection, Office 365 License Selection, and Office 365 Roles Selection, and OneDrive provisioning Office 365 roles management for hybrid environment users Managing Office 365 Contacts Managing Hybrid AD Groups Managing Microsoft 365 Groups Managing Azure Security Groups Managing cloud-only distribution groups Managing cloud-only Azure users Managing cloud-only Azure guest users Managing cloud-only Azure contacts Changes to Active Roles policies for cloud-only Azure objects Managing room mailboxes Managing cloud-only shared mailboxes
Managing Configuration of Active Roles
Connecting to the Administration Service Adding and removing managed domains Using unmanaged domains Evaluating product usage Creating and using virtual attributes Examining client sessions Monitoring performance Customizing the console Using Configuration Center Changing the Active Roles Admin account Enabling or disabling diagnostic logs Active Roles Log Viewer
SQL Server Replication Appendix A: Using regular expressions Appendix B: Administrative Template Appendix C: Communication ports Appendix D: Active Roles and supported Azure environments Appendix E: Active Roles integration with other One Identity and Quest products Appendix F: Active Roles integration with Duo Appendix G: Active Roles integration with Okta Active Roles Language Pack

Importing data to the new Management History database

You may need to populate the newly created Management History database with your existing Management History data, so that the data remains available to the Active Roles user interfaces after you have configured the Administration Service to use the new Management History database. You can do this by using Active Roles Configuration Center on the computer running the Administration Service.

IMPORTANT: The reports produced by the Change History or User Activity command include information only about the changes made using a certain group of Administration Services that share a common database from the connected management history database. If the Change History data is not imported from the previously available database, the data is not displayed in the new Management History database. For more information on the implications of not importing the Change History data from the available database, see Impact on management history data in the Active Roles What's New guide.

To import Management History data

  1. In the Configuration Center main window, under Administration Service, click Manage Settings.

    Start the Configuration Center by selecting Active Roles8.0 LTS Configuration Center on the Apps page or Start menu, depending on the version of your Windows operating system.

  2. On the Administration Service page, click Import Management History to open the Import Management History wizard.

  3. On the Source database page, specify the database from which you want to import the management history data (source database):

    1. Database Type: Select the required database type from the drop-down (on premises or Azure SQL).

    2. Database Server name: Enter the name of the SQL Server instance that hosts the source database.

    3. Database: Enter the name of the source database.

  4. Under Connect using, select the authentication option:

    • If your Windows logon account has sufficient rights to write data to the destination database, click Windows authentication.

    • If you have a SQL Server login with sufficient rights, click SQL Server authentication and enter the login name and password.

    • If you have an Azure AD login with sufficient rights, click Azure Active Directory authentication and enter the login name and password.

    NOTE: Azure databases can be connected using SQL Server authentication and Azure AD authentication. Windows authentication is applicable only for on-premises databases.

    NOTE: Azure AD authentication currently does not support Multi-Factor Authentication (MFA).

  5. Click Next.

    The Destination database page identifies the database of the Administration Service to which you are going to import data (destination database), and allows you to select the authentication option.

  6. Under Connect using, select the authentication option:

    • If your Windows logon account has sufficient rights to write data to the destination database, click Windows authentication.

    • If you have a SQL Server login with sufficient rights, click SQL Server authentication and enter the login name and password.

    • If you have an Azure AD login with sufficient rights, click Azure Active Directory authentication and enter the login name and password.

    NOTE: Azure databases can be connected using SQL Server authentication and Azure AD authentication. Windows authentication is applicable only for on-premises databases.

    NOTE: Azure AD authentication currently does not support Multi-Factor Authentication (MFA).

  7. Click Next.

  8. On the Records to Import page, specify whether you want to import all data records or only a certain range of the data records.

    NOTE: The data for unfinished temporal group membership is imported when the management history data is imported for a selected date range.

    You can choose not to import all the data records as importing a large volume of data can take hours. Later, you can import additional data by choosing a different range of data records. During subsequent import sessions, the wizard only imports the data records that were not imported earlier.

  9. Click Next and follow the instructions in the wizard to complete the import operation.

The Import Management History wizard merges the Management History data found in an existing Active Roles database with the data stored in the Management History database. The wizard only adds new data, keeping intact any data that already exists in the Management History database. You may import Management History data at any convenient time after you have configured the Administration Service to use the new Management History database, without being afraid of losing any data.

Viewing change history

The Change History log can be accessed from the Active Roles console, allowing you to quickly examine what changes were made to a given user or group, as well as when it was done and by whom. For example, if someone reset a user’s password via Active Roles, you might use change history to see when and by whom the password was reset.

To examine changes made to a given object, such as a user or group object, right-click it in the Active Roles console and click Change History. By default, the Change History window only displays basic options. You can display more choices by clicking the plus sign (+) in the top-left corner, next to the first column heading.

In the Change History window, you can find the following information:

  • Name  The name of the object for which you are examining change history.
  • Requested  The date and time that the changes were requested.
  • Requested by  The user account that requested the changes.
  • Completed  The date and time that the changes were applied.
  • Properties  The properties of the object that were changed, including information about the changed property values.
  • Status  Indicates whether the requested changes are applied (status COMPLETED) or waiting for approval (status PENDING).

The Change History window also includes the following areas:

  • Properties changed during this operation  Information about the object property values that were changed (old values), new values assigned to the properties, and the user account that was used to make the changes.
  • Workflow activities and policy actions  Detailed information about all policies and workflows performed by Active Roles when processing the change request.
  • Operation details  Additional information on when and by whom the changes were requested.

The Workflow activities and policy actions area displays a report of the policy actions and workflow activity actions. The report organizes the action results into sections, each containing report items specific to a single policy or activity. You can expand the area by clicking its title. To expand a section, click the title of the section. For certain items, the report provides the option to further expand the view and display additional information. The List option displays a list of items, such as user or group properties, affected by the policy or activity. By clicking the Details option, you can examine the policy or activity action result in more detail.

The following topics list the possible sections and report items in the Workflow activities and policy actions area. Each section in the report describes results of the action performed by a certain workflow activity or policy. The report items within the section inform about success or failure of the policy or activity action. In the event of a failure, the report item includes an error description.

Not all the listed sections and items must necessarily be present in a report. An actual report only includes the sections corresponding to the workflow activities and policies that Active Roles performed when processing the operation request.

The following topics elaborate on the report sections and report items you encounter in the Workflow activities and policy actions area:

Workflow activity report sections

In a Change History report, the report sections specific to workflow activities list all activities that Active Roles executed when processing a given operation request. For each activity, from the respective report section you can determine whether the activity was completed successfully or returned an error. In case of error, the report section provides an error description. For activities requesting changes to directory data (for example, activities that create new objects or modify existing objects), you can examine the requested changes in detail by clicking the Operation ID number in the report section.

This topic lists the contents of the activity report sections you may encounter in a Change History report. Each report section has a header that identifies the name of the activity; the target object of the activity (the object, such as a user, group or computer that the activity is applied to or acts upon); the time that the activity was executed; and the name of the workflow containing that activity. If the activity encountered an error, then the text in the header of the activity report section is red. You can expand the report section by clicking the header to view the body of the report section. The contents of the body varies depending on the type of the activity. In case of an error condition, the body displays an error description.

The remainder of this topic covers the contents of the report section body for each activity type in situations where no errors have occurred.

“Approval” activity

The report section specific to an approval activity provides information about the approval task created by that activity, and varies depending on the state of the approval task. Normally, the activity does not create an approval task if the operation that is subject to approval was requested by an Active Roles administrator or an approver. In this case, the section body displays a message indicating that the activity is bypassed. Otherwise, the contents of the report section body is as follows.

Task status: Pending

The following information is displayed if the task is waiting for approver action.

  • Approval task details
    • Task ID: <number>
    • Title: <title of the approval task>
    • Status: Pending
    • Requested: <date and time that the task was created>
    • Requested by: <name that identifies who requested the operation>

Task status: Completed

The following information is displayed if the approver allowed the requested operation.

  • Properties changed by approver
    • Property  <property of the operation target object set or changed by the approver>
    • Changed to  <value of the property supplied by the approver>
  • Approval task details
    • Task ID: <number>
    • Title: <title of the approval task>
    • Status: Completed
    • Requested: <date and time that the task was created>
    • Requested by: <name that identifies who requested the operation>
    • Completed: <date and time that the task was completed>
    • Completed by: <name of the approver who performed the task>
    • Completion reason: <text supplied by the approver>
    • Approver action: <resolution the approver chose to allow the operation>

Task status: Rejected

The following information is displayed if the approver denied the requested operation.

  • Approval task details
    • Task ID: <number>
    • Title: <title of the approval task>
    • Status: Rejected
    • Requested: <date and time that the task was created>
    • Requested by: <name that identifies who requested the operation>
    • Rejected: <date and time that the task was completed>
    • Rejected by: <name of the approver who performed the task>
    • Rejection reason: <text supplied by the approver>
    • Approver action: <resolution the approver chose to deny the operation>

Task status: Canceled

The following information is displayed if the approval task is canceled.

  • Approval task details
    • Task ID: <number>
    • Title: <title of the approval task>
    • Status: Canceled
    • Requested: <date and time that the task was created>
    • Requested by: <name that identifies who requested the operation>
    • Canceled: <date and time that the task was canceled>
    • Canceled by: <identifies who canceled the task>
    • Cancellation reason: <indicates why the task was canceled>

Task status: Any

The following information is always displayed in addition to the approval task details.

  • Approval task settings
    • Approvers: <list of names that identify who is authorized to approve the operation>
    • Possible actions of approver: <list of resolutions the approver may choose from>
    • Approver is requested to supply or change these properties: <list of property names>
    • Approver is allowed to change properties submitted for approval: <Yes | No>
관련 문서

The document was helpful.

평가 결과 선택

I easily found the information I needed.

평가 결과 선택