Chat now with support
Chat with Support

Active Roles 8.2.1 - Administration Guide

Introduction Getting started with Active Roles Configuring rule-based administrative views Configuring role-based administration Configuring rule-based autoprovisioning and deprovisioning
Configuring Provisioning Policy Objects
User Logon Name Generation E-mail Alias Generation Exchange Mailbox AutoProvisioning Group Membership AutoProvisioning Home Folder AutoProvisioning Property Generation and Validation Script Execution O365 and Azure Tenant Selection AutoProvisioning in SaaS products
Configuring Deprovisioning Policy Objects
User Account Deprovisioning Group Membership Removal User Account Relocation Exchange Mailbox Deprovisioning Home Folder Deprovisioning User Account Permanent Deletion Office 365 Licenses Retention Group Object Deprovisioning Group Object Relocation Group Object Permanent Deletion Script Execution Notification Distribution Report Distribution
Configuring entry types Configuring a Container Deletion Prevention policy Configuring picture management rules Managing Policy Objects Checking for policy compliance Deprovisioning users or groups Restoring deprovisioned users or groups Configuring policy extensions
Using rule-based and role-based tools for granular administration Workflows
About workflow processes Workflow processing overview Workflow activities overview Configuring a workflow
Creating a workflow definition for a workflow Configuring workflow start conditions Configuring workflow parameters Adding activities to a workflow Configuring an Approval activity Configuring a Notification activity Configuring a Script activity Configuring an If-Else activity Configuring a Stop/Break activity Configuring an Add Report Section activity Configuring a Search activity Configuring CRUD activities Configuring a Save Object Properties activity Configuring a Modify Requested Changes activity Enabling or disabling an activity Enabling or disabling a workflow Using the initialization script
Approval workflow Email-based approval Automation workflow Activity extensions
Temporal Group Memberships Group Family Dynamic groups Active Roles Reporting Management History Entitlement profile Recycle Bin AD LDS data management One Identity Starling Join and configuration through Active Roles Managing One Identity Starling Connect Configuring linked mailboxes with Exchange Resource Forest Management Configuring remote mailboxes for on-premises users Migrating Active Roles configuration with the Configuration Transfer Wizard Managing Skype for Business Server with Active Roles
About Skype for Business Server User Management Active Directory topologies supported by Skype for Business Server User Management User Management policy for Skype for Business Server User Management Master Account Management policy for Skype for Business Server User Management Access Templates for Skype for Business Server Configuring the Skype for Business Server User Management feature Managing Skype for Business Server users
Exchanging provisioning information with Active Roles SPML Provider Monitoring Active Roles with Management Pack for SCOM Configuring Active Roles for AWS Managed Microsoft AD Azure AD, Microsoft 365, and Exchange Online Management
Azure tenant types and environment types supported by Active Roles Using Active Roles to manage Azure AD objects Unified provisioning policy for Azure M365 Tenant Selection, Microsoft 365 License Selection, Microsoft 365 Roles Selection, and OneDrive provisioning Changes to Active Roles policies for cloud-only Azure objects
Managing the configuration of Active Roles
Connecting to the Administration Service Managed domains Using unmanaged domains Evaluating product usage Creating and using virtual attributes Examining client sessions Monitoring performance Customizing the Console Using Configuration Center Changing the Active Roles Admin account Enabling or disabling diagnostic logs Active Roles Log Viewer
SQL Server replication Using regular expressions Administrative Template Configuring federated authentication Communication ports and URLs used by Active Roles Integrating Active Roles with other products and services Active Roles Language Pack Active Roles Diagnostic Tools Active Roles Add-on Manager

Property Generation and Validation

Property Generation and Validation policies automate the configuration of directory object properties. You can configure these policies to:

  • Populate new directory objects with default property values (for example, when creating new user accounts or groups).

  • Validate the compliance of directory property values against corporate rules.

For example, you can configure a policy to enforce a certain type of telephone number formatting in the contact information properties for your directory.

TIP: Consider the following when planning to configure a Property Generation and Validation policy:

  • To help you get started with configuring policy-based administration in your organization, Active Roles includes a set of built-in Policy Objects that offer provisioning and deprovisioning rules to the most typical administrative use cases. To find the built-in Policy Objects, navigate to the following node of the Active Roles Console:

    Configuration > Policies > Administration > Builtin

  • If the directory of your organization contains cloud-only Azure objects (Azure users, guest users or contacts), then use the built-in Azure CloudOnly Policy - Default Rules to Generate Properties Policy Object to provision their default properties and accepted values.

NOTE: Policy Object settings that are specific to Azure cloud-only objects (such as cloud-only Azure users, guest users, or contacts) are available only if your Active Roles deployment is licensed for managing cloud-only Azure objects. Contact One Identity support for more information.

Also, Policy Objects that are specific to Azure cloud-only objects will work correctly only if an Azure tenant is already configured in the AD of the organization, and Active Roles is already set as a consented Azure application for that Azure tenant. For more information on these settings, see Configuring a new Azure tenant and consenting Active Roles as an Azure applicationConfiguring a new Azure tenant and consenting Active Roles as an Azure application in the Active Roles Administration Guide.

For a detailed description of this policy, see Concept: Property Generation and Validation in the Active Roles Feature Guide.

Configuring a Property Generation and Validation policy

To configure a Property Generation and Validation policy via the Active Roles Console (also known as the MMC interface), perform the following procedure.

To configure a Property Generation and Validation policy

  1. In the Console tree, navigate to Configuration > Policies > Administration.

  2. To open the New Provisioning Policy Object Wizard dialog, right-click Administration, then select New > Provisioning Policy.

  3. On the Name and Description page, provide a unique Name for the new Policy Object. Optionally, also provide a Description. To continue, click Next.

  4. On the Policy to Configure page, select Property Generation and Validation, and then click Next.

  5. On the Controlled Property page, click Select to open the Select Object Type and Property dialog.

  6. To select the object type and its object property that you want the policy to control, use the settings of the Select Object Type and Property dialog:

    1. To select the object type that you want to configure, use the Object type drop-down menu.

      TIP: If you do not see the Object type that you need, to expand the Object type list, select Show all possible object types.

    2. To search for the object property, either enter it in the Look for Property search field, or browse for it in the Object Property list.

      NOTE: Policy Object settings that are specific to Azure cloud-only objects (such as cloud-only Azure users, guest users, or contacts) are available only if your Active Roles deployment is licensed for managing cloud-only Azure objects. Contact One Identity support for more information.

      Also, Policy Objects that are specific to Azure cloud-only objects will work correctly only if an Azure tenant is already configured in the AD of the organization, and Active Roles is already set as a consented Azure application for that Azure tenant. For more information on these settings, see Configuring a new Azure tenant and consenting Active Roles as an Azure applicationConfiguring a new Azure tenant and consenting Active Roles as an Azure application in the Active Roles Administration Guide.

      TIP: If you do not see the Object property that you need, to expand the Object property list, select Show all possible properties.

    3. After you selected the Object type and Object property, to continue, click OK.

    4. After you validated on the Controlled Property page that you selected the correct Object type and Object property, click Next.

  7. On the Configure Policy Rule page, to specify the condition(s) that you want to configure for the policy, select them in the Select conditions to configure policy rule list. The selected conditions then appear in the Edit policy rule text box.

  8. (Optional) If the selected condition supports editing, to open the Add Value dialog and edit its settings, click the underlined item.

    To specify additional configuration for the condition, enter a variable into the Value field, then click OK to close the Add Value dialog.

    Alternatively, click Configure, then click Add, and configure an entry manually in the Add Entry dialog. For more information on manual configuration, see Configuring entry types. To close the Add Value dialog, click OK.

  9. (Optional) To specify a default value if you have selected a condition with (generates default value) in its name:

    1. Set the value of Upon object creation, this policy generates default value to Yes.

    2. If you have added more than one value, click the value that you want to configure as the default value, and select Default value, then click OK. The string (default value) appears next to the value.

  10. (Optional) If you have selected multiple conditions, switch between the AND and OR logic of the condition relations by clicking and or or. The displayed logic is the condition relation that is in effect.

  11. After selecting and configuring the condition(s), click Next.

  12. (Optional) To modify the default description of the policy generated by the wizard, on the Policy Description page, select Modify this policy description. Modify the description, then click Next.

  13. Click Next, then follow the instructions in the wizard to create (and optionally, immediately apply) the Policy Object.

  14. To apply the Policy Object:

    • Use the Enforce Policy page in the New Policy Object Wizard.

    • Alternatively, complete the New Policy Object Wizard, then use the Enforce Policy command on the domain, OU, or Managed Unit where you want to apply the policy.

    For more information on how to apply a Policy Object, see Linking Policy Objects to directory objects.

    TIP: When provisioning cloud-only Azure users or guest users, you can either select the respective object category (such as the Azure user or Azure guest user node) in this step, or the Azure tenant that contains the Azure objects.

Example: Using a Mask entry type to control phone number format

This example describes how to configure a policy that forces the user telephone number to conform to the following format: (123) 456-78-90.

To implement this example scenario

  1. Create and configure a Policy Object that defines the appropriate policy.

  2. Apply the Policy Object to a domain, OU, or Managed Unit.

As a result, when creating or modifying a user object in the container that you selected, Active Roles validates the telephone number against the defined format. If it does not conform to the defined format, the policy does not allow creating or editing the user object.

For the steps of creating this policy, see Creating and configuring a Property Generation and Validation Policy Object with a Mask entry type.

Creating and configuring a Property Generation and Validation Policy Object with a Mask entry type

You can create the Property Generation and Validation policy that is described in Example: Using a Mask entry type to control phone number format with the New Provisioning Policy Object Wizard.

To control the phone number format with the Property Generation and Validation Policy Object using a Mask entry type

  1. In the Console tree, navigate to Configuration > Policies > Administration.

  2. To open the New Provisioning Policy Object Wizard dialog, right-click Administration, then select New > Provisioning Policy.

  3. On the Name and Description page, provide a unique Name for the new Policy Object. Optionally, also provide a Description. To continue, click Next.

  4. Select the Property Generation and Validation policy type for configuration. Click Next.

    For more information, see Configuring a Property Generation and Validation policy.

  5. On the Controlled Property page, click Select.

  6. In the Select Object Type and Property dialog, from the Object type list, select User.

  7. In the Object property list, select Telephone number.

    Figure 32: Select Object Type and Property

  8. After you selected the Object type and Object property, to continue, click OK.

  9. After you validated on the Controlled Property page that you selected the correct Object type and Object property, click Next.

  10. On the Configure Policy Rule page, select the following:

    • ‘Telephone Number’ must be specified: This condition requires a phone number for every user account.

    • ‘Telephone Number’ must be <value>: This condition requires a certain value as the telephone number. In this example, this is a mask.

    Figure 33: Configure Policy Rule: Telephone Number must be specified and must be <value>

  11. Click the <click to add value> link.

  12. In the Add Value dialog, click Configure.

  13. To open the Add Entry window, click Add.

  14. In the Add Entry window, under Entry type, select Mask.

  15. The telephone number format consists of four groups of numerals divided by certain characters: spaces, hyphens, and brackets. First, configure a mask that requires the first three characters to be numerals:

    1. Select Exactly the specified number of characters.

    2. In the Number of characters field, enter 3.

    3. Under Allowed characters, select the Numerals check box.

    Figure 34: Entry properties

  16. To apply the value setting for the entry, click OK.

  17. To close the Configure Value dialog, click OK.

    Figure 35: Add value dialog

  18. Taking into consideration the mask that you have configured, the mask for the telephone number format that you need is as follows:

    ({3 required [0-9]}) {3 required [0-9]}-{2 required [0-9]}-{2 required [0-9]}

    Type this mask in the Add Value dialog, in the ‘Telephone Number’ must be field. Pay attention to the round brackets enclosing the first three characters, a space character following the group in the round brackets, and two hyphen characters that separate the groups of characters.

  19. To apply the value setting for the entry, click OK.

  20. Click Next, then follow the instructions in the wizard to create (and optionally, immediately apply) the Policy Object.

  21. To apply the Policy Object:

    • Use the Enforce Policy page in the New Policy Object Wizard.

    • Alternatively, complete the New Policy Object Wizard, then use the Enforce Policy command on the domain, OU, or Managed Unit where you want to apply the policy.

    For more information on how to apply a Policy Object, see Linking Policy Objects to directory objects.

    TIP: When provisioning cloud-only Azure users or guest users, you can either select the respective object category (such as the Azure user or Azure guest user node) in this step, or the Azure tenant that contains the Azure objects.

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating