After an application is created for the Azure AD tenant, the administrator with the Global Administrators group privileges must provide consent for communication between the application and Active Roles Server for the permission scopes that are configured for the application.
To provide Administrator consent for an application
The list of existing Azure AD applications are displayed.
On successful completion of the task the Local host window is displayed.
You can use the Active Roles Web Interface to delete an Azure AD application.
To delete an Azure AD application
The list of existing Azure AD applications are displayed.
A message is displayed prompting you to confirm if you want to delete the application.
The Azure AD application is deleted and can be verified by navigating to Azure Configuration -> Azure Applications.
|
NOTE: The Azure AD application is deleted from the Active Roles database and Azure AD. |
Active Roles Management Shell enables you to perform the following configuration tasks to manage Hybrid AD:
You can use the Active Roles Management Shell to add an Azure AD tenant.
To add an Azure AD tenant
On the Management Shell interface, run the New-QADConfigObject cmdlet.
Synopsis
This cmdlet enables you to add an Azure AD tenant to Active Directory.
Syntax
New-QADAzureConfigObject -type 'AzureTenant' -name 'Azuretenantname' -AzureTenantId 'AzureTenantGUID' -AzureTenantDescription 'AzureTenantDescription' -AzureAdminUserID 'AzureGlobalAdminUserID' -AzureAdminPassword 'AzureGlobalIDPassword'
Description
Use this cmdlet to add an Azure AD tenant using the tenant ID provided by Microsoft for the default tenant created at the time of Microsoft Azure subscription.
Parameters
Use this parameter to specify the object class of the directory object to be created. This is the name of a schema class object, such as User or Group. The cmdlet creates a directory object of the object class specified by the value of this parameter.
Required |
true |
Position |
named |
Accepts pipeline input |
false |
Accepts wildcard characters |
false |
Use this parameter to set the 'name' attribute to this parameter value on the new object created by this cmdlet in the directory.
Required |
true |
Position |
named |
Accepts pipeline input |
false |
Accepts wildcard characters |
false |
Use this parameter to enter the Azure AD tenant ID obtained from the default tenant created after subscribing for Microsoft Azure.
|
NOTE: The values entered for configuring Azure AD tenant must exactly match the values configured for Azure AD, else Azure AD application creation and management of Azure AD objects fail. |
Required |
true |
Position |
named |
Accepts pipeline input |
false |
Accepts wildcard characters |
false |
Use this parameter to specify the required description for the Azure AD tenant.
Required |
false |
Position |
named |
Accepts pipeline input |
false |
Accepts wildcard characters |
false |
Use this parameter to specify the administrative user name for Microsoft Azure AD.
|
NOTE: The Administrative user must have the required privileges to perform license management and Azure user and group management. |
Required |
true |
Position |
named |
Accepts pipeline input |
false |
Accepts wildcard characters |
false |
Use this parameter to specify the administrative user name for Microsoft Azure AD.
Required |
true |
Position |
named |
Accepts pipeline input |
false |
Accepts wildcard characters |
false |
Example
Connect to any available domain controller with the credentials of the locally logged on user, and create a new Azure AD tenant:
C:\PS> New-QADAzureConfigObject -type 'Tenant1' -name 'ComapnyAzuretenant' -AzureTenantId 'CompanyAzureTenantID' -AzureTenantDescription 'Azure tenant for Company' -AzureAdminUserID 'AzureAdminUser1' -AzureAdminPassword 'AzureAdminPassword1’
Example
Connect to the local Administration Service with the credentials of a specific user, create a new Azure AD tenant and then disconnect:
C:\PS> $pw = read-host "Enter password" -AsSecureString
C:\PS> connect-qadService -service 'localhost' -proxy -ConnectionAccount 'company\administrator' -ConnectionPassword $pw
C:\PS> New-QADAzureConfigObject -type 'Tenant1' -name 'ComapnyAzuretenant' -AzureTenantId 'CompanyAzureTenantID' -AzureTenantDescription 'Azure tenant for Company' -AzureAdminUserID 'AzureAdminUser1' -AzureAdminPassword 'AzureAdminPassword1’
C:\PS> disconnect-qadService
© 2021 One Identity LLC. ALL RIGHTS RESERVED. Feedback Terms of Use Privacy