Information about the local Active Directory user account
The Linked tab shows information about the local Active Directory user account, which is linked to the Azure Active Directory user account.
Table 31: Local Active Directory user account data
Synchronization with local Active Directory enabled |
Specifies whether synchronization with a local Active Directory is enabled. |
Last synchronization |
Time of the last Azure Active Directory user account synchronization with the local Active Directory. |
SID of the local account. |
Security ID of the local Active Directory user account. |
Immutable identifier |
Identifier that is used to maintain the relationship between the Active Directory user account and the Azure Active Directory user account. The identifier cannot be changed. |
Distinguished name |
Active Directory user account's distinguished name. |
Full domain name |
Full domain name of the user account's Active Directory domain. |
Login name (pre Win2000) |
Login name of the Active Directory user account for the previous version of Active Directory. |
User login name (of local account) |
Active Directory user account login name. |
Attribute extension 01 - attribute extension 15 |
Additional company-specific information about the Active Directory user account. |
Related topics
Assigning extended properties to Azure Active Directory user accounts
Extended properties are meta objects, such as operating codes, cost codes, or cost accounting areas that cannot be mapped directly in One Identity Manager.
For detailed information about using extended properties, see the One Identity Manager Identity Management Base Module Administration Guide.
To specify extended properties for a user account
-
In the Manager, select the Azure Active Directory > User accounts category.
-
Select the user account in the result list.
-
Select Assign extended properties.
-
In the Add assignments pane, assign extended properties.
TIP: In the Remove assignments pane, you can remove assigned extended properties.
To remove an assignment
- Save the changes.
Disabling Azure Active Directory user accounts
The way you disable user accounts depends on how they are managed.
Scenario:
The user account is linked to employees and is managed through account definitions.
User accounts managed through account definitions are disabled when the employee is temporarily or permanently disabled. The behavior depends on the user account manage level. Accounts with the Full managed manage level are disabled depending on the account definition settings. For user accounts with a manage level, configure the required behavior using the template in the AADUser.AccountDisabled column.
Scenario:
The user accounts are linked to employees. No account definition is applied.
User accounts managed through user account definitions are disabled when the employee is temporarily or permanently disabled. The behavior depends on the QER | Person | TemporaryDeactivation configuration parameter
-
If the configuration parameter is set, the employee’s user accounts are disabled when the employee is permanently or temporarily disabled.
-
If the configuration parameter is not set, the employee’s properties do not have any effect on the associated user accounts.
To disable the user account when the configuration parameter is disabled
-
In the Manager, select the Azure Active Directory > User accounts category.
-
Select the user account in the result list.
-
Select the Change main data task.
-
On the General tab, set the Account is disabled option.
- Save the changes.
Scenario:
User accounts not linked to employees.
To disable a user account that is no longer linked to an employee
-
In the Manager, select the Azure Active Directory > User accounts category.
-
Select the user account in the result list.
-
Select the Change main data task.
-
On the General tab, set the Account is disabled option.
- Save the changes.
For more information about deactivating and deleting employees and user accounts, see the One Identity Manager Target System Base Module Administration Guide.
Related topics
Deleting and restoring Azure Active Directory user accounts
NOTE: As long as an account definition for an employee is valid, the employee retains the user account that was created by it. If the account definition assignment is removed, the user account that was created from this account definition, is deleted.
You can delete a user account that was not created using an account definition through the result list or from the menu bar. After you have confirmed the security alert the user account is marked for deletion in the One Identity Manager. The user account is locked in One Identity Manager and permanently deleted from the One Identity Manager database and the target system depending on the deferred deletion setting.
For more information about deactivating and deleting employees and user accounts, see the One Identity Manager Target System Base Module Administration Guide.
To delete a user account that is not managed using an account definition
-
In the Manager, select the Azure Active Directory > User accounts category.
-
Select the user account in the result list.
- Click in the result list.
- Confirm the security prompt with Yes.
To restore a user account
-
In the Manager, select the Azure Active Directory > User accounts category.
-
Select the user account in the result list.
-
Click in the result list.
Related topics