Azure Active Directory tenant
You must provide details about your organization the first time you register for a Microsoft cloud service. This detailed information is used to make a new Azure Active Directory directory partition. The organization represents one Azure Active Directory tenant. In One Identity Manager, you can edit the master data of each tenant. However, you cannot create new tenants in One Identity Manager.
To edit Azure Active Directory tenant master data
- Select the Azure Active Directory | Tenants category.
- Select the tenant in the result list.
- Select the Change master data task.
- Edit the tenant's master data.
- Save the changes.
Detailed information about this topic
General master data for Azure Active Directory tenants
Enter the following data on the General tab.
Table 18: Tenant master data
Display name |
The tenant’s display name. |
Account definition (initial) |
Initial account definition for creating user accounts. This account definition is used if automatic assignment of employees to user accounts is used for this tenant and user accounts should be created which are already managed (Linked configured state). The account definition's default manage level is applied.
User accounts are only linked to the employee (Linked) if no account definition is given. This is the case on initial synchronization, for example. |
Target system managers |
Application role, in which target system managers are specified for the tenant. Target system managers only edit the objects from tenants to which they are assigned. Each tenant can have a different target system manager assigned to it.
Select the One Identity Manager application role whose members are responsible for administration of this tenant. Use the button to add a new application role. |
Location |
The tenant's location. |
Street |
Street or road. |
City |
City. |
Zip code |
Zip code. |
Country |
Country. |
Synchronized by |
Type of synchronization through which the data is synchronized between the tenant and One Identity Manager. You can no longer change the synchronization type once objects for this tenant are present in One Identity Manager.
If you create a tenant with the Synchronization Editor, One Identity Manager is used.
Table 19: Permitted values
One Identity Manager |
Azure Active Directory connector |
Azure Active Directory connector |
No synchronization |
none |
none |
NOTE: If you select No synchronization, you can define custom processes to exchange data between One Identity Manager and the target system. |
Recipients (marketing notifications) |
List of recipients of marketing notifications. |
Recipient (technical notifications) |
List of recipients of technical notifications. |
Recipients (security notifications) |
List of recipients of security notifications. |
Phone numbers (security notifications) |
Phone numbers for security notifications. |
Related topics
Information about local Active Directory
The Linked tab shows information about the local Active Directory, which is linked to the Azure Active Directory tenant.
Table 20: Local Active Directory user account data
Synchronization with local Active Directory enabled |
Specifies whether synchronization with a local Active Directory is enabled. |
Last synchronization |
Time of the last Azure Active Directory tenant synchronization with the local Active Directory. |
Defining categories for the inheritance of entitlements
In One Identity Manager, groups, administrator roles, subscriptions, and disabled services plans can be selectively inherited by user accounts. For this purpose, the groups (administrator roles, subscriptions, disabled service plans) and the user accounts are divided into categories. The categories can be freely selected and are specified using a mapping rule. Each category is given a specific position within the template. The mapping rule contains different tables. Use the user account table to specify categories for target system dependent user accounts. In the other tables enter your categories for the target system-dependent groups, administrator roles, subscriptions, and disabled service plans. Each table contains the Position 1 to Position 31 category positions.
To define a category
-
In the Manager, select the tenant in the Azure Active Directory | Tenants category.
- Select the Change master data task.
- Switch to the Mapping rule category tab.
- Extend the relevant roots of a table.
- To enable the category, double-click .
- Enter a category name of your choice for user accounts and groups (administrator roles, subscriptions, disabled service plans) in the login language that you use.
- Save the changes.
Related topics