Chat now with support
Chat with Support

Active Roles 7.5 - Administration Guide

Introduction About Active Roles Getting Started Rule-based Administrative Views Role-based Administration
Access Templates as administrative roles Access Template management tasks Examples of use Deployment considerations Windows claims-based Access Rules
Rule-based AutoProvisioning and Deprovisioning
About Policy Objects Policy Object management tasks Policy configuration tasks
Property Generation and Validation User Logon Name Generation Group Membership AutoProvisioning E-mail Alias Generation Exchange Mailbox AutoProvisioning AutoProvisioning for SaaS products OneDrive Provisioning Home Folder AutoProvisioning Script Execution Office 365 and Azure Tenant Selection User Account Deprovisioning Office 365 Licenses Retention Group Membership Removal Exchange Mailbox Deprovisioning Home Folder Deprovisioning User Account Relocation User Account Permanent Deletion Group Object Deprovisioning Group Object Relocation Group Object Permanent Deletion Notification Distribution Report Distribution
Deployment considerations Checking for policy compliance Deprovisioning users or groups Restoring deprovisioned users or groups Container Deletion Prevention policy Picture management rules Policy extensions
Workflows
Understanding workflow Workflow activities overview Configuring a workflow
Creating a workflow definition Configuring workflow start conditions Configuring workflow parameters Adding activities to a workflow Configuring an Approval activity Configuring a Notification activity Configuring a Script activity Configuring an If-Else activity Configuring a Stop/Break activity Configuring an Add Report Section activity Configuring a Search activity Configuring CRUD activities Configuring a Save Object Properties activity Configuring a Modify Requested Changes activity Enabling or disabling an activity Enabling or disabling a workflow Using the initialization script
Example: Approval workflow E-mail based approval Automation workflow Activity extensions
Temporal Group Memberships Group Family Dynamic Groups Active Roles Reporting Management History
Understanding Management History Management History configuration Viewing change history
Workflow activity report sections Policy report items Active Roles internal policy report items
Examining user activity
Entitlement Profile Recycle Bin AD LDS Data Management One Identity Starling Management One Identity Starling Two-factor Authentication for Active Roles Managing One Identity Starling Connect Azure AD, Office 365, and Exchange Online management
Configuring Active Roles to manage hybrid AD objects Managing Hybrid AD Users Unified provisioning policy for Azure O365 Tenant Selection, Office 365 License Selection, and Office 365 Roles Selection, and OneDrive provisioning Office 365 roles management for hybrid environment users Managing Office 365 Contacts Managing Hybrid AD Groups Managing Office 365 Groups Managing Azure Security Groups Managing cloud-only Azure users Managing cloud-only Azure guest users Managing cloud-only Azure contacts Changes to Active Roles policies for cloud-only Azure objects Managing room mailboxes
Managing Configuration of Active Roles
Connecting to the Administration Service Adding and removing managed domains Using unmanaged domains Evaluating product usage Creating and using virtual attributes Examining client sessions Monitoring performance Customizing the console Using Configuration Center Changing the Active Roles Admin account Enabling or disabling diagnostic logs Active Roles Log Viewer
SQL Server Replication Appendix A: Using regular expressions Appendix B: Administrative Template Appendix C: Communication ports Appendix D: Active Roles and supported Azure environments Appendix E: Enabling Federated Authentication Appendix F: Active Roles integration with other One Identity and Quest products Appendix G: Active Roles integration with Duo MFA Appendix H: Active Roles integration with Okta MFA

Administrative Roles

Administrative Roles/
  • Access Template Permissions  Lists Active Roles Access Templates, allowing you to examine each Access Template in detail. You can view the name, location and description the Access Template, along with all permission entries held in the Access Template.
  • Access Template summary  Lists Active Roles Access Templates along with quantitative information regarding Access Template links. For each Access Template, this report allows you to determine the number of links that use the Access Template and the number of objects (Trustees and Containers) to which the Access Template is linked.
  • Access Templates linked to Managed Units  Lists Active Roles Access Templates that are linked to Active Roles Managed Units. Identifies the name, location and description of each Access Template along with the fully qualified name of every Managed Unit to which the Access Template is linked. You can extend the list to include both the Managed Units to which the Access Template is linked and the Managed Units that are affected by the Access Template through permission inheritance.
  • Access Templates linked to Organizational Units  Lists Active Roles Access Templates that are linked to Active Directory Organizational Units. Identifies the name, location and description of each Access Template along with the fully qualified name of every Organizational Unit to which the Access Template is linked. You can extend the list to include both the Organizational Units to which the Access Template is linked and the Organizational Units that are affected by the Access Template through permission inheritance.
  • Control delegation by object  Lists Active Directory objects to which Active Roles Access Templates are linked. Identifies the name, location and description of each object along with the name of every Access Template linked to that object and the security principal (Trustee) whose administrative permissions are determined by that link through direct assignment (without considering permission inheritance).
  • Control delegation by object (with group hierarchy)  Lists Active Directory objects to which Active Roles Access Templates are linked. Identifies the name, location and description of each object along with the name of every Access Template linked to that object and the security principals (Trustees) whose administrative permissions are determined by that link through direct assignment or because of group memberships.
  • Control delegation by Trustee  Lists Active Directory security principals (Trustees) that have administrative permissions specified by applying Active Roles Access Templates. Identifies the name of each Trustee along with the name of every Access Template that determines the Trustee’s administrative permissions in Active Roles, as well as the name of the container or leaf object to which the Access Template is linked thereby providing the Trustee with administrative permissions over that container or leaf object.
  • Control delegation by Trustee (with container hierarchy)  Lists security principals (Trustees) that have administrative permissions specified by applying Active Roles Access Templates, and provides detailed information about securable objects and containers for which the Trustee has administrative permissions and Access Templates that determine the Trustee’s permissions. You can filter the list of Trustees by various parameters, including Trustee name and type, securable object or container name and type, Access Template name and type, permission name and type, and permission inheritance type.

Managed Units

Managed Units/
  • Managed Unit members  Lists Active Roles Managed Units along with their members. For each Managed Unit, identifies its name, path and description as well as the name, type and description of every object held in that Managed Unit.
  • Managed Unit membership rules  Lists Active Roles Managed Units along with their membership rules. For each Managed Unit, identifies its name, path and description as well as the rules that determine what objects are included to, or excluded from, that Managed Unit.
  • Managed Unit summary  Lists Active Roles Managed Units along with quantitative information regarding Managed Unit members, membership rules, Trustees and policies. For each Managed Unit, identifies the number of its members and membership rules, the number of security principals (Trustees) that have administrative permissions for that Managed Unit, and the number of Active Roles Policy Objects that affect the Managed Unit.
  • Managed Units affected by Policy  Lists Active Roles Managed Units that are affected by Active Roles Policy Objects whether through a Policy Object linked to the Managed Unit itself or through a Policy Object linked to a container or another Managed Unit that holds the given Managed Unit. For each Managed Unit, identifies the name and description of every Policy Object that affects the Managed Unit as well as the container or Managed Unit from which the policy effect is inherited.
  • Managed Units with delegated control  Lists Active Roles Managed Units that have administrative control delegated by applying Active Roles Access Templates whether to the Managed Unit itself (direct permissions) or to a container or another Managed Unit that holds the given Managed Unit (inherited permissions). For each Managed Unit, identifies the security principals (Trustees) to which administrative control is delegated, the Access Templates that determine the administrative permissions, and whether those are direct or inherited permissions.

Policy Objects

Policy Objects/
  • Linked Property Validation Settings  Lists object properties that are under the control of any Property Generation and Validation policy defined in Active Roles. For each property, lists the object classes possessing that property, identifies the Policy Objects that affect the property, the container to which the Policy Object is linked, and the policy conditions. The report only includes containers to which Policy Objects are linked directly, without considering policy inheritance. You can filter the list of properties by various parameters, such as property name, object class name, container name, and Policy Object name.
  • Linked Property Validation Settings (with inheritance)  Lists objects along with their properties that are under the control of any Property Generation and Validation policy defined in Active Roles. An object included in this report may have a Policy Object linked to the object itself (direct policy) or to a container that holds the object (inherited policy). The report groups the list of objects by property. For each property, the report lists the objects possessing that property, identifies the Policy Objects and policy conditions that affect each of the listed objects, and indicates whether this is a direct or inherited policy. You can filter the list of objects and object properties by various parameters, such as property name, object name and type, and Policy Object name.
  • Linked Script Settings (with inheritance)  Lists objects that are under the control of any script-based (Script Execution) policy defined in Active Roles. An object included in this report may have a Policy Object linked to the object itself (direct policy effect) or to a container that holds the object (inherited policy effect). The report identifies the script-based Policy Objects that affect each of the listed objects, along with the origin of the policy effect (direct or inherited). You can filter the list of objects by various parameters, such as object name, object class name, and Policy Object name.
  • Policy Object references  Lists Active Roles Policy Objects that are applied (linked) to any container or Managed Unit. For each Policy Object, identifies its name, description and category (provisioning or deprovisioning), and lists the container to which the Policy Object is linked. You can filter the list by Policy Object name, container or Managed Unit name, and Policy Object category.
  • Policy Object Settings  Lists Active Roles Policy Objects together with their policy entries. For each Policy Object, provides detailed information about all policies that are defined in the Policy Object. You can filter the list by Policy Object name, policy type, and policy entry name.
  • Policy Object summary  Lists Active Roles Policy Objects together with the following information for each Policy Object: name; type (provisioning or deprovisioning); number of directory objects to which the Policy Object is linked (reference number); total number of individual policies defined in the Policy Object (entry number); number of policies of each particular type defined in the Policy Object.
  • Policy Objects with Securable Objects  Lists Active Roles Policy Objects together with the directory objects that are affected by each Policy Object. A directory object included in this report may have a Policy Object linked to the object itself (direct policy effect) or to a container that holds the object (inherited policy effect). For each directory object that is affected by a given Policy Object, the report identifies the object’s canonical name, type and description, and indicates whether the policy effect is direct or inherited. You can filter the list by Policy Object name, policy type, and by directory object name and type.
  • Securable Objects (with inheritance)  Lists directory objects that are affected by Active Roles Policy Objects. For each directory object, identifies the Policy Objects that are linked to the directory object itself (direct policy effect) or to a container that holds the directory object (inherited policy effect). For each Policy Object that affects a given directory object, the report lists the Policy Object’s name, path, description and policy entries, and indicates whether the policy effect is direct or inherited. You can filter the list by directory object name and type, Policy Object name and type, and by policy entry name.

Policy Compliance

Policy Compliance/
  • Objects violating Policy Rules  Lists directory objects and their properties that are not in compliance with policies determined by Active Roles Policy Objects. For each directory object, identifies the object’s name, parent container, type and description, and indicates what properties violate policy rules and what Policy Objects define the policy rules that are violated.
  • Violated Policy Rules  Lists Active Roles Policy Objects whose policy rules are violated by certain directory objects. For each Policy Object, identifies the policies defined in that Policy Object, and, for every single policy, provides information about directory objects and their properties which are not in compliance with that policy.

 

 

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating