Chat now with support
Chat with Support

Active Roles 8.1.1 - Administration Guide

Introduction Getting started Rule-based administrative views Role-based administration
Access Templates as administrative roles Access Template management tasks Examples of use Deployment considerations Windows claims-based access rules
Rule-based autoprovisioning and deprovisioning
Provisioning Policy Objects Deprovisioning Policy Objects How Policy Objects work Policy Object management tasks Policy configuration tasks
Property Generation and Validation User Logon Name Generation Group Membership AutoProvisioning Exchange Mailbox AutoProvisioning AutoProvisioning in SaaS products OneDrive Provisioning Home Folder AutoProvisioning Script Execution Microsoft 365 and Azure Tenant Selection E-mail Alias Generation User Account Deprovisioning Office 365 Licenses Retention Group Membership Removal Exchange Mailbox Deprovisioning Home Folder Deprovisioning User Account Relocation User Account Permanent Deletion Group Object Deprovisioning Group Object Relocation Group Object Permanent Deletion Notification Distribution Report Distribution
Deployment considerations Checking for policy compliance Deprovisioning users or groups Restoring deprovisioned users or groups Container Deletion Prevention policy Picture management rules Policy extensions
Using rule-based and role-based tools for granular administration Workflows
Key workflow features and definitions About workflow processes Workflow processing overview Workflow activities overview Configuring a workflow
Creating a workflow definition for a workflow Configuring workflow start conditions Configuring workflow parameters Adding activities to a workflow Configure an Approval activity Configuring a Notification activity Configuring a Script activity Configuring an If-Else activity Configuring a Stop/Break activity Configuring an Add Report Section activity Configuring a Search activity Configuring CRUD activities Configuring a Save Object Properties activity Configuring a Modify Requested Changes activity Enabling or disabling an activity Enabling or disabling a workflow Using the initialization script
Approval workflow Email-based approval Automation workflow Activity extensions
Temporal Group Memberships Group Family Dynamic groups Active Roles Reporting Management History Entitlement profile Recycle Bin AD LDS data management One Identity Starling Join and configuration through Active Roles Managing One Identity Starling Connect Configuring linked mailboxes with Exchange Resource Forest Management Configuring remote mailboxes for on-premises users Azure AD, Microsoft 365, and Exchange Online Management
Configuring Active Roles to manage Hybrid AD objects Managing Hybrid AD users
Creating a new Azure AD user with the Web Interface Viewing or updating the Azure AD user properties with the Web Interface Viewing or modifying the manager of a hybrid Azure user Disabling an Azure AD user Enabling an Azure AD user Deprovisioning of an Azure AD user Undo deprovisioning of an Azure AD user Adding an Azure AD user to a group Removing an Azure AD user from a group View the change history and user activity for an Azure AD user Deleting an Azure AD user with the Web Interface Creating a new hybrid Azure user with the Active Roles Web Interface Converting an on-premises user with an Exchange mailbox to a hybrid Azure user Licensing a hybrid Azure user for an Exchange Online mailbox Viewing or modifying the Exchange Online properties of a hybrid Azure user Creating a new Azure AD user with Management Shell Updating the Azure AD user properties with the Management Shell Viewing the Azure AD user properties with the Management Shell Delete an Azure AD user with the Management Shell Assigning Microsoft 365 licenses to new hybrid users Assigning Microsoft 365 licenses to existing hybrid users Modifying or removing Microsoft 365 licenses assigned to hybrid users Updating Microsoft 365 licenses display names
Unified provisioning policy for Azure M365 Tenant Selection, Microsoft 365 License Selection, Microsoft 365 Roles Selection, and OneDrive provisioning Microsoft 365 roles management for hybrid environment users Managing Microsoft 365 contacts Managing Hybrid AD groups Managing Microsoft 365 Groups Managing cloud-only distribution groups Managing cloud-only dynamic distribution groups Managing Azure security groups Managing cloud-only Azure users Managing cloud-only Azure guest users Managing cloud-only Azure contacts Changes to Active Roles policies for cloud-only Azure objects Managing room mailboxes Managing cloud-only shared mailboxes
Modern Authentication Managing the configuration of Active Roles
Connecting to the Administration Service Managed domains Using unmanaged domains Evaluating product usage Creating and using virtual attributes Examining client sessions Monitoring performance Customizing the Console Using Configuration Center Changing the Active Roles Admin account Enabling or disabling diagnostic logs Active Roles Log Viewer
SQL Server replication Using regular expressions Administrative Template Communication ports Active Roles and supported Azure environments Integrating Active Roles with other products and services Active Roles Language Pack Active Roles Diagnostic Tools Active Roles Add-on Manager

Performing bulk operation

Active Roles Web Interface enables you to perform bulk attributes operation for multiple users at a time.

To perform bulk attribute operation

  1. On the Navigation bar, click Directory Management.

  2. On the Views tab in the Browse pane, click the required container.

  3. From the list of objects displayed for the selected container, select the required users for which you need to perform bulk attributes operation.

    The batch operations that can be performed on users are displayed in the Command pane.

  4. In the Command pane, click Update object attributes.

    The Update object attributes window is displayed, which lists the user attributes that can be selected for bulk operation.

  1. From the Attribute List tab, select the required attribute on which you want to perform the bulk operation, and click the + symbol.

  2. On the Update object attributes dialog box that is displayed, in the New Value field, enter a value for the attribute, and click OK.

    The selected attribute with the updated value is displayed in the Select attribute table.

  1. Repeat step 5 and step 6 to select and update more attributes, and then click Next.

    The Preview tab > Operation Summary section displays the summary of the selected attributes with the new values to be updated after the bulk operation is performed. To export the details, click Export as CSV.

  1. Click Finish, to complete the bulk operation on the selected attributes for the multiple users.

NOTE:

  • The bulk operation does not complete and an error is displayed if no attributes are selected or if no changes are made to the values of the attributes selected for the bulk operation.

  • The bulk operation cannot be performed beyond 1500 users. However, you can configure the limit to increase the number of users. For more information on configuring the limit, see Not able to query or update groups with more than 1500 members.

Performing bulk users password reset operation

Active Roles Web Interface enables you to reset the password for multiple users at a time.

To perform bulk users password reset operation

  1. On the Navigation bar, click Directory Management.

  2. On the Views tab in the Browse pane, click the required container.

  3. From the list of objects displayed for the selected container, select the required users for which you need to perform password reset operation.

    The batch operations that can be performed on users are displayed in the Command pane.

  4. In the Command pane, click Reset Password.

    The Reset Password window is displayed.

  5. On the General tab dialog box, click Generate to generate a new password for the selected users.

  6. Under Account options, select the check box corresponding to the required rule to be applied for change of password, and then click Save.

The password reset gets completed and the changes can be viewed on the selected user's Change History tab.

Active Roles service account minimum permissions

As Active Roles performs operations on objects on behalf of delegated users, the Active Roles service account which is used to manage the Active Directory domain requires adequate permissions. One Identity recommends to manage the domain using an account which is a member of the Domain Admins role group. If this configuration is not used, then guidance and documentation provided by One Identity may not be relevant.

Specify separate accounts for service and for managing the domain to separate the tasks performed by the service account from domain management. In this configuration scenario, the service account can be configured to run with the minimum permissions specified below, but the proxy account should be a member of the Domain Admins role group to stay within the One Identity Active Roles support model.

The service account credential has five main roles:

  • Access to the Administration Service computer.

  • Service publication in Active Directory.

  • All script modules are executed under the security context of the Active Roles Service Account.

  • Connecting to the Microsoft SQL database.

  • Synchronizing native permissions to Active Directory, if Active Roles is configured.

Access to the Administration Service computer

The service account must be a member of the Administrators group on the computer running the Administration Service.

Service publication in Active Directory

The Administration Service attempts to publish itself in the Active Directory. This enables Active Roles clients to automatically discover the Administration Service. This functionality is non-critical and if permissions are not granted, this will not prevent the service from functioning as expected, instead Active Roles clients won't automatically discover the Active Roles Administration Service. They will still be able to connect if the service name or IP address is available. Service publication requires that the service account have the following permissions on the Aelita sub-container of the System container in the domain of the computer running the Administration Service:

  • Create Container Objects.

  • Create serviceConnectionPoint Objects.

  • Delete the serviceConnectionPoint objects in the System container.

  • Write permission for the keywords attribute of the serviceConnectionPoint objects in the System container.

Along with these permissions, the service account (or the override account, if specified), must have these permissions on the Aelita sub-container of the System container in every managed domain. If an account has the domain administrator rights, then it has the required permissions by default. Otherwise, provide the permissions to the account by using the ADSI Edit console. The following instructions apply to the ADSI Edit console that ships with Windows Server 2016, Windows Server 2019, or Windows Server 2022.

To grant permissions for Administration Service publication in Active Directory

  1. Open the ADSI Edit console and connect to the Domain naming context.

  2. In the console tree, expand the System container, right-click the Aelita subcontainer, and then click Properties. If the Aelita container does not exist, create it: right-click System, point to New, click Object, and then, in the Create Object wizard, select the Container class and specify Aelita for the cn value.

  3. On the Security tab in the Properties dialog, click Advanced.

  4. On the Permissions tab in the Advanced Security Settings dialog box, click Add.

  5. On the Permission Entry page, configure the permission entry:

    • Click the Select a principal link, and select the desired account.

    • Verify that the Type box indicates Allow.

    • Verify that the Applies onto box indicates This object and all descendant objects.

    • In the Permissions area, select the Create container objects and Create serviceConnectionPoint objects check boxes.

    • Click OK.
  6. Click OK to close the Advanced Security Settings dialog box, and then click OK to close the Properties dialog box.

All script modules are executed under the security context of the Active Roles Service Account

The permissions needed by custom scripts will vary according to the needs of the scripts, and ideally should be reviewed on a case-by-case basis as a Best Practice security model.

Connecting to the Microsoft SQL database

In some configurations, assigning these permissions to the service account are optional, as an SQL Authentication credential may also be specified and the necessary permissions then be assigned to that SQL Authentication credential. For more information on the necessary SQL Server permissions, see SQL Server Permissions in the Active Roles Quick Start Guide.

Synchronizing native permissions to Active Directory

The service account must have the Read Permissions and Modify Permissions rights on the Active Directory objects and containers where it is desired to use the Active Roles security synchronization feature.

Rule-based administrative views

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating