Converse agora com nosso suporte
Chat com o suporte

Identity Manager 9.2.1 - Administration Guide for Connecting to Exchange Online

About this guide Managing Exchange Online environments Synchronizing an Exchange Online environment
Setting up Exchange Online synchronization Customizing the synchronization configuration Running synchronization Tasks following synchronization Troubleshooting Ignoring data error in synchronization Pausing handling of target system specific processes (Offline mode)
Basic data for managing an Exchange Online environment Exchange Online organization configuration Exchange Online mailboxes Exchange Online mail users Exchange Online mail contacts Exchange Online mail-enabled distribution groups
Creating Exchange Online mail-enabled distribution groups Editing main data for Exchange Online mail-enabled distribution groups Main data for Exchange Online mail-enabled distribution groups Receive restrictions for Exchange Online mail-enabled distribution groups Customizing send permissions for Exchange Online mail-enabled distribution groups Specifying moderators for Exchange Online mail-enabled distribution groups Specifying Exchange Online mail-enabled distribution groups Assigning Exchange Online mail-enabled distribution groups to Exchange Online recipients Exchange Online mail-enabled distribution group inheritance based on categories Adding Exchange Online dynamic distribution groups to Exchange Online mail-enabled distribution groups Adding an Exchange Online dynamic distribution group to Exchange Online mail-enabled distribution groups Adding Exchange Online mail-enabled public folder to Exchange Online mail-enabled distribution groups Assigning extended properties to Exchange Online mail-enabled distribution groups Deleting Exchange Online mail-enabled distribution groups
Exchange Online Office 365 groups Exchange Online dynamic distribution groups Exchange Online mail-enabled public folders Reports about Exchange Online objects Configuration parameters for managing an Exchange Online environment Default project template for Exchange Online Editing Exchange Online system objects Exchange Online connector settings

Adding account definitions in the IT Shop

An account definition can be requested by shop customers when it is assigned to an IT Shop shelf. To ensure it can be requested, further prerequisites need to be guaranteed.

  • The account definition must be labeled with the IT Shop option.

  • The account definition must be assigned to a service item.

    TIP: In the Web Portal, all products that can be requested are grouped together by service category. To make the account definition easier to find in the Web Portal, assign a service category to the service item.

  • If the account definition is only assigned to identities using IT Shop assignments, you must also set the Only for use in IT Shop option. Direct assignment to hierarchical roles may not be possible.

NOTE: IT Shop administrators can assign account definitions to IT Shop shelves if login is role-based. Target system administrators are not authorized to add account definitions in the IT Shop.

To add an account definition to the IT Shop (role-based login)

  1. In the Manager, select the Entitlements > Account definitions category.

  2. Select an account definition in the result list.

  3. Select the Add to IT Shop task.

  4. In the Add assignments pane, assign the account definitions to the IT Shop shelves.

  5. Save the changes.

To add an account definition to the IT Shop (non role-based login)

  1. In the Manager, select the Azure Active Directory > Basic configuration data > Account definitions > Account definitions category.

  2. Select an account definition in the result list.

  3. Select the Add to IT Shop task.

  4. In the Add assignments pane, assign the account definitions to the IT Shop shelves.

  5. Save the changes.

To remove an account definition from individual IT Shop shelves (role-based login)

  1. In the Manager, select the Entitlements > Account definitions category.

  2. Select an account definition in the result list.

  3. Select the Add to IT Shop task.

  4. In the Remove assignments pane, remove the account definitions from the IT Shop shelves.

  5. Save the changes.

To remove an account definition from individual IT Shop shelves (non role-based login)

  1. In the Manager, select the Azure Active Directory > Basic configuration data > Account definitions > Account definitions category.

  2. Select an account definition in the result list.

  3. Select the Add to IT Shop task.

  4. In the Remove assignments pane, remove the account definitions from the IT Shop shelves.

  5. Save the changes.

To remove an account definition from all IT Shop shelves (role-based login)

  1. In the Manager, select the Entitlements > Account definitions category.

  2. Select an account definition in the result list.

  3. Select the Remove from all shelves (IT Shop) task.

  4. Confirm the security prompt with Yes.
  5. Click OK.

    The account definition is removed from all shelves by the One Identity Manager Service. At the same time, any requests and assignment requests with this account definition are canceled.

To remove an account definition from all IT Shop shelves (non role-based login)

  1. In the Manager, select the Azure Active Directory > Basic configuration data > Account definitions > Account definitions category.

  2. Select an account definition in the result list.

  3. Select the Remove from all shelves (IT Shop) task.

  4. Confirm the security prompt with Yes.
  5. Click OK.

    The account definition is removed from all shelves by the One Identity Manager Service. At the same time, any requests and assignment requests with this account definition are canceled.

For more information about requesting company resources through the IT Shop, see the One Identity Manager IT Shop Administration Guide.

Related topics

Assigning account definitions to Azure Active Directory tenants

The following prerequisites must be fulfilled if you implement automatic assignment of user accounts and identities resulting in administered user accounts (Linked configured state):

  • The account definition is assigned to the target system.

  • The account definition has the default manage level.

User accounts are only linked to the identity (Linked state) if no account definition is given. This is the case on initial synchronization, for example.

To assign the account definition to a target system

  1. In the Manager, select the Azure Active Directory tenant in the Azure Active Directory > Tenants category.

  2. Select the Change main data task.

  3. From the Account definition (initial) menu, select the account definition for user accounts.

  4. From the Mail contact definition (initial) menu, select the account definition for mail contacts.

  5. From the Mail user definition (initial) menu, select the account definition for mail users.

  6. Save the changes.

Related topics

Deleting account definitions

You can delete account definitions if they are not assigned to target systems, identities, hierarchical roles or any other account definitions.

To delete an account definition

  1. Remove automatic assignments of the account definition from all identities.

    1. In the Manager, select the Azure Active Directory > Basic configuration data > Account definitions > Account definitions category.

    2. Select an account definition in the result list.

    3. Select the Change main data task.

    4. Select the Disable automatic assignment to identities task.

    5. Confirm the security prompt with Yes.

    6. Save the changes.

  2. Remove direct assignments of the account definition to identities.

    1. In the Manager, select the Azure Active Directory > Basic configuration data > Account definitions > Account definitions category.

    2. Select an account definition in the result list.

    3. Select the Assign to identities task.

    4. In the Remove assignments pane, remove identities.

    5. Save the changes.

  3. Remove the account definition's assignments to departments, cost centers, and locations.

    1. In the Manager, select the Azure Active Directory > Basic configuration data > Account definitions > Account definitions category.

    2. Select an account definition in the result list.

    3. Select the Assign organizations task.

    4. In the Remove assignments pane, remove the relevant departments, cost centers, and locations.

    5. Save the changes.

  4. Remove the account definition's assignments to business roles.

    1. In the Manager, select the Azure Active Directory > Basic configuration data > Account definitions > Account definitions category.

    2. Select an account definition in the result list.

    3. Select the Assign business roles task.

    4. In the Remove assignments pane, remove the business roles.

    5. Save the changes.

  5. If the account definition was requested through the IT Shop, it must be canceled and removed from all IT Shop shelves.

    For more detailed information about unsubscribing requests, see the One Identity Manager Web Designer Web Portal User Guide.

    To remove an account definition from all IT Shop shelves (role-based login)

    1. In the Manager, select the Entitlements > Account definitions category.

    2. Select an account definition in the result list.

    3. Select the Remove from all shelves (IT Shop) task.

    4. Confirm the security prompt with Yes.
    5. Click OK.

      The account definition is removed from all shelves by the One Identity Manager Service. At the same time, any requests and assignment requests with this account definition are canceled.

    To remove an account definition from all IT Shop shelves (non role-based login)

    1. In the Manager, select the Azure Active Directory > Basic configuration data > Account definitions > Account definitions category.

    2. Select an account definition in the result list.

    3. Select the Remove from all shelves (IT Shop) task.

    4. Confirm the security prompt with Yes.
    5. Click OK.

      The account definition is removed from all shelves by the One Identity Manager Service. At the same time, any requests and assignment requests with this account definition are canceled.

  6. Remove the required account definition assignment. As long as the account definition is required for another account definition, it cannot be deleted. Check all the account definitions.

    1. In the Manager, select the Azure Active Directory > Basic configuration data > Account definitions > Account definitions category.

    2. Select an account definition in the result list.

    3. Select the Change main data task.

    4. From the Required account definition menu, remove the account definition.

    5. Save the changes.

  7. Remove the account definition's assignments to target systems.

    1. In the Manager, select the Azure Active Directory tenant in the Azure Active Directory > Tenants category.

    2. Select the Change main data task.
    3. On the General tab, remove the assigned account definitions.

    4. Save the changes.

  8. Delete the account definition.

    1. In the Manager, select the Azure Active Directory > Basic configuration data > Account definitions > Account definitions category.

    2. Select an account definition in the result list.

    3. Click to delete an account definition.

Target system managers for Exchange Online

A default application role exists for the target system manager in One Identity Manager. Assign identities to this application role who have permission to edit all Exchange Online objects in One Identity Manager.

Define additional application roles if you want to limit the permissions for target system managers to individual tenants with Exchange Online. The application roles must be added under the default application role.

For more information about implementing and editing application roles, see the One Identity Manager Authorization and Authentication Guide.

Implementing application roles for target system managers
  1. The One Identity Manager administrator allocates identities to be target system administrators.

  2. These target system administrators add identities to the default application role for target system managers.

    Target system managers with the default application role are authorized to edit all the Exchange Online objects in One Identity Manager.

  3. Target system managers can authorize other identities within their area of responsibility as target system managers and if necessary, create additional child application roles and assign these to individual tenants.

Table 9: Default application roles for target system managers
User Tasks

Target system managers

 

Target system managers must be assigned to the Target systems | Exchange Online application role or a child application role.

Users with this application role:

  • Assume administrative tasks for the target system.

  • Create, change, or delete target system objects.

  • Edit password policies for the target system.

  • Prepare groups to add to the IT Shop.

  • Can add identities that do not have the Primary identity identity type.

  • Configure synchronization in the Synchronization Editor and define the mapping for comparing target systems and One Identity Manager.

  • Edit the synchronization's target system types and outstanding objects.

  • Authorize other identities within their area of responsibility as target system managers and create child application roles if required.

To initially specify identities to be target system administrators

  1. Log in to the Manager as a One Identity Manager administrator (Base role | Administrators application role)

  2. Select the One Identity Manager Administration > Target systems > Administrators category.

  3. Select the Assign identities task.

  4. Assign the identity and save the changes.

To add the first identities to the default application as target system managers

  1. Log in to the Manager as a target system administrator (Target systems | Administrators application role).

  2. Select the One Identity Manager Administration > Target systems > Exchange Online category.

  3. Select the Assign identities task.

  4. Assign the identities you want and save the changes.

To authorize other identities as target system managers when you are a target system manager

  1. Log in to the Manager as a target system manager.

  2. Select the application role in the Azure Active Directory > Basic configuration data > Target system managers category.

  3. Select the Assign identities task.

  4. Assign the identities you want and save the changes.

To specify target system managers for individual tenants

  1. Log in to the Manager as a target system manager.

  2. Select the Azure Active Directory > Tenants category.

  3. Select the tenant in the result list.

  4. Select the Change main data task.

  5. On the General tab, select the application role in the Target system manager (Exchange Online) menu.

    - OR -

    Next to the Target system manager (Exchange Online) menu, click to create a new application role.

    1. Enter the application role name and assign the Target systems | Exchange Online parent application role.

    2. Click OK to add the new application role.

  6. Save the changes.
  7. Assign identities to this application role who are permitted to edit the tenant in One Identity Manager.

Related topics
Documentos relacionados

The document was helpful.

Selecione a classificação

I easily found the information I needed.

Selecione a classificação