Chat now with support
Chat with Support

Active Roles 7.6.3 - Administration Guide

Introduction About Active Roles Getting Started Rule-based Administrative Views Role-based Administration
Access Templates as administrative roles Access Template management tasks Examples of use Deployment considerations Windows claims-based Access Rules
Rule-based AutoProvisioning and Deprovisioning
About Policy Objects Policy Object management tasks Policy configuration tasks
Property Generation and Validation User Logon Name Generation Group Membership AutoProvisioning E-mail Alias Generation Exchange Mailbox AutoProvisioning AutoProvisioning for SaaS products OneDrive Provisioning Home Folder AutoProvisioning Script Execution Office 365 and Azure Tenant Selection User Account Deprovisioning Office 365 Licenses Retention Group Membership Removal Exchange Mailbox Deprovisioning Home Folder Deprovisioning User Account Relocation User Account Permanent Deletion Group Object Deprovisioning Group Object Relocation Group Object Permanent Deletion Notification Distribution Report Distribution
Deployment considerations Checking for policy compliance Deprovisioning users or groups Restoring deprovisioned users or groups Container Deletion Prevention policy Picture management rules Policy extensions
Workflows
Understanding workflow Workflow activities overview Configuring a workflow
Creating a workflow definition Configuring workflow start conditions Configuring workflow parameters Adding activities to a workflow Configuring an Approval activity Configuring a Notification activity Configuring a Script activity Configuring an If-Else activity Configuring a Stop/Break activity Configuring an Add Report Section activity Configuring a Search activity Configuring CRUD activities Configuring a Save Object Properties activity Configuring a Modify Requested Changes activity Enabling or disabling an activity Enabling or disabling a workflow Using the initialization script
Example: Approval workflow E-mail based approval Automation workflow Activity extensions
Temporal Group Memberships Group Family Dynamic Groups Active Roles Reporting Management History
Understanding Management History Management History configuration Viewing change history
Workflow activity report sections Policy report items Active Roles internal policy report items
Examining user activity
Entitlement Profile Recycle Bin AD LDS Data Management One Identity Starling Management Managing One Identity Starling Connect Configuring linked mailboxes with Exchange Resource Forest Management Configuring remote mailboxes for on-premises users Azure AD, Office 365, and Exchange Online management
Configuring Active Roles to manage hybrid AD objects Managing Hybrid AD Users Unified provisioning policy for Azure O365 Tenant Selection, Office 365 License Selection, and Office 365 Roles Selection, and OneDrive provisioning Office 365 roles management for hybrid environment users Managing Office 365 Contacts Managing Hybrid AD Groups Managing Office 365 Groups Managing Azure Security Groups Managing cloud-only distribution groups Managing cloud-only Azure users Managing cloud-only Azure guest users Managing cloud-only Azure contacts Changes to Active Roles policies for cloud-only Azure objects Managing room mailboxes Managing cloud-only shared mailboxes
Managing Configuration of Active Roles
Connecting to the Administration Service Adding and removing managed domains Using unmanaged domains Evaluating product usage Creating and using virtual attributes Examining client sessions Monitoring performance Customizing the console Using Configuration Center Changing the Active Roles Admin account Enabling or disabling diagnostic logs Active Roles Log Viewer
SQL Server Replication Using regular expressions Administrative Template Communication ports Active Roles and supported Azure environments Active Roles integration with other One Identity and Quest products Active Roles integration with Duo Active Roles integration with Okta Active Roles Diagnostic Tools Active Roles Add-on Manager

How this policy works

When processing a request to deprovision a user, Active Roles uses this policy to determine what changes are to be made to group memberships of the user’s account. By removing the account from security groups, the policy revokes user access to resources. By removing the account from mail-enabled groups, the policy prevents erroneous situations where e-mail is sent to the deprovisioned mailbox.

IMPORTANT: The deprovisioned users are automatically removed from all Dynamic Groups, regardless of the Group Membership Removal policy settings.

A Group Membership Removal policy includes separate rules for security groups and for mail-enabled groups. For each category of groups, a rule can instruct Active Roles to perform one of the actions that are summarized in the following table.

Table 24: Group Membership Removal policy includes separate rules

Category

Action

Result

Security groups

Do not remove from groups.

The deprovisioned user remains in all security groups it was a member of as of the time of deprovisioning, except for the Dynamic Groups.

 

Remove from all groups.

The deprovisioned user is removed from all security groups.

 

Remove from all groups except for the specified ones.

The deprovisioned user is not removed from the specified security groups, with the exception of Dynamic Groups. The user is removed from all the other security groups.

Mail-enabled groups

Do not remove from groups.

The deprovisioned user is not removed from distribution groups or mail-enabled security groups, except for the Dynamic Groups.

 

Remove from all groups.

The deprovisioned user is removed from all distribution groups and from all mail-enabled security groups.

 

Remove from all groups except for the specified ones.

The deprovisioned user is not removed from the specified distribution or mail-enabled security groups, with the exception of Dynamic Groups. The user is removed from all the other distribution and mail-enabled security groups.

In the event of a conflict in policy implementation, the remove action takes precedence. For example, with a rule configured to remove the user account from all security groups, the user account is removed from all security groups even if there is another rule according to which Active Roles does not remove the user account from mail-enabled security groups.

Another conflict may occur in the situation where a policy of this category attempts to remove a deprovisioned user from a group that is configured as Active Roles’ Dynamic Group (see the Dynamic Groups chapter, later in this document). The Dynamic Group policy detects the removal, and might add the deprovisioned user back to the Dynamic Group. To avoid such a situation, Active Roles does not allow Dynamic Groups to hold deprovisioned users. Once a user is deprovisioned, the user’s account is removed from all Dynamic Groups.

How to configure a Group Membership Removal policy

To configure a Group Membership Removal policy, select Group Membership Removal on the Policy to Configure page in the New Deprovisioning Policy Object wizard or in the Add Deprovisioning Policy wizard. Then, click Next to display the Removal from Security Groups page.

Figure 89: Removal from Security Groups

On this page, you can configure a rule on how to remove a deprovisioned user from security groups.

Select one of these options:

  • Click Do not remove from security groups for the policy not to make changes to security group memberships of the user account.
  • Click Remove from all security groups, with optional exceptions for the policy to remove the user account from all security groups.

With the second option, you can specify whether you want the policy not to remove the user account from certain security groups. To set up a list of such groups, select the Keep the user account in these security groups check box, and then click the Add button and select the groups you want to include in the list.

When you are done configuring the rule for security groups, click Next to display the Removal from Mail-enabled Groups page.

Figure 90: Removal from Mail-enabled Groups

This page is similar to the previous one. It allows you to configure a rule on how to remove a user account from both distribution groups and mail-enabled security groups, which are collectively referred to as mail-enabled groups.

Select one of these options:

  • Click Do not remove from mail-enabled groups for the policy not to make changes to mail-enabled group memberships of the user account.
  • Click Remove from all mail-enabled groups, with optional exceptions for the policy to remove the user account from all mail-enabled groups.

With the second option, you can specify whether you want the policy not to remove the user account from certain mail-enabled groups. To set up a list of such groups, select the Keep the user account in these mail-enabled groups check box, and then click the Add button and select the groups you want to include in the list.

When you are done configuring the rule for mail-enabled groups, click Next and follow the instructions in the wizard to create the Policy Object.

Steps for configuring a Group Membership Removal policy

To configure a Group Membership Removal policy

  1. On the Policy to Configure page, select Group Membership Removal, and then click Next.
  2. On the Removal from Security Groups page, do one of the following:
    • Click Do not remove from security groups for the policy not to make changes to security group memberships of the user account.
    • Click Remove from all security groups, with optional exceptions for the policy to remove the user account from all security groups.
  3. If you selected the second option in Step 2, specify whether you want the policy not to remove the user account from certain security groups. Do one of the following:
    • Select the Keep the user account in these security groups check box and set up the list of security groups from which you want the policy not to remove the user account.
    • If you want the policy to remove the user account from all security groups, leave the check box cleared.
  4. Click Next.
  5. On the Removal from Mail-enabled Groups page, do one of the following:
    • Click Do not remove from mail-enabled groups for the policy not to make changes to mail-enabled group memberships of the user account.
    • Click Remove from all mail-enabled groups, with optional exceptions for the policy to remove the user account from all mail-enabled groups.
  6. If you selected the second option in Step 5, specify whether you want the policy not to remove the user account from certain mail-enabled groups. Do one of the following:
    • Select the Keep the user account in these mail-enabled groups check box and set up the list of mail-enabled groups from which you want the policy not to remove the user account.
    • If you want the policy to remove the user account from all mail-enabled groups, leave the check box cleared.
  7. Click Next.
  8. On the Enforce Policy page, you can specify objects to which this Policy Object is to be applied:
    • Click Add, and use the Select Objects dialog box to locate and select the objects you want.
  9. Click Next, and then click Finish.

Scenario: Removing deprovisioned users from all groups

The policy described in this scenario, removes the deprovisioned users from all groups, both security and distribution.

To implement this scenario, you must perform the following actions:

  1. Create and configure the Policy Object that defines the appropriate policy.
  2. Apply the Policy Object to a domain, OU, or Managed Unit.

As a result, when deprovisioning a user account in the container you selected in Step 2, Active Roles removes the user account from all groups.

The following two sections elaborate on the steps to implement this scenario.

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating