In the case of indirect assignment, identities and Azure Active Directory administrator roles are assigned to hierarchical roles, such as, departments, cost centers, locations, or business roles. When assigning Azure Active Directory administrator roles indirectly, check the following settings and modify them if necessary.
-
Assignment of identities and Azure Active Directory administrator roles is permitted for role classes (departments, cost centers, locations, or business roles).
For more detailed information, see the One Identity Manager Identity Management Base Module Administration Guide.
To configure assignments to roles of a role class
-
In the Manager, select role classes in the Organizations > Basic configuration data > Role classes category.
- OR -
In the Manager, select role classes in the Business roles > Basic configuration data > Role classes category.
-
Select the Configure role assignments task and configure the permitted assignments.
-
To generally allow an assignment, enable the Assignments allowed column.
-
To allow direct assignment, enable the Direct assignments permitted column.
-
- Save the changes.
-
-
Settings for assigning Azure Active Directory administrator roles to Azure Active Directory user accounts.
-
The Azure Active Directory user account is linked to an identity.
-
The Azure Active Directory user account has the Administrator roles can be inherited option set.
-
NOTE: There are other configuration settings that play a role when company resources are inherited through departments, cost centers, locations, and business roles. For example, role inheritance might be blocked or inheritance of identities not allowed.