Chat now with support
Chat with Support

Active Roles 8.2.1 - Administration Guide

Introduction Getting started with Active Roles Configuring rule-based administrative views Configuring role-based administration Configuring rule-based autoprovisioning and deprovisioning
Configuring Provisioning Policy Objects
User Logon Name Generation E-mail Alias Generation Exchange Mailbox AutoProvisioning Group Membership AutoProvisioning Home Folder AutoProvisioning Property Generation and Validation Script Execution O365 and Azure Tenant Selection AutoProvisioning in SaaS products
Configuring Deprovisioning Policy Objects
User Account Deprovisioning Group Membership Removal User Account Relocation Exchange Mailbox Deprovisioning Home Folder Deprovisioning User Account Permanent Deletion Office 365 Licenses Retention Group Object Deprovisioning Group Object Relocation Group Object Permanent Deletion Script Execution Notification Distribution Report Distribution
Configuring entry types Configuring a Container Deletion Prevention policy Configuring picture management rules Managing Policy Objects Checking for policy compliance Deprovisioning users or groups Restoring deprovisioned users or groups Configuring policy extensions
Using rule-based and role-based tools for granular administration Workflows
About workflow processes Workflow processing overview Workflow activities overview Configuring a workflow
Creating a workflow definition for a workflow Configuring workflow start conditions Configuring workflow parameters Adding activities to a workflow Configuring an Approval activity Configuring a Notification activity Configuring a Script activity Configuring an If-Else activity Configuring a Stop/Break activity Configuring an Add Report Section activity Configuring a Search activity Configuring CRUD activities Configuring a Save Object Properties activity Configuring a Modify Requested Changes activity Enabling or disabling an activity Enabling or disabling a workflow Using the initialization script
Approval workflow Email-based approval Automation workflow Activity extensions
Temporal Group Memberships Group Family Dynamic groups Active Roles Reporting Management History Entitlement profile Recycle Bin AD LDS data management One Identity Starling Join and configuration through Active Roles Managing One Identity Starling Connect Configuring linked mailboxes with Exchange Resource Forest Management Configuring remote mailboxes for on-premises users Migrating Active Roles configuration with the Configuration Transfer Wizard Managing Skype for Business Server with Active Roles
About Skype for Business Server User Management Active Directory topologies supported by Skype for Business Server User Management User Management policy for Skype for Business Server User Management Master Account Management policy for Skype for Business Server User Management Access Templates for Skype for Business Server Configuring the Skype for Business Server User Management feature Managing Skype for Business Server users
Exchanging provisioning information with Active Roles SPML Provider Monitoring Active Roles with Management Pack for SCOM Configuring Active Roles for AWS Managed Microsoft AD Azure AD, Microsoft 365, and Exchange Online Management
Azure tenant types and environment types supported by Active Roles Using Active Roles to manage Azure AD objects Unified provisioning policy for Azure M365 Tenant Selection, Microsoft 365 License Selection, Microsoft 365 Roles Selection, and OneDrive provisioning Changes to Active Roles policies for cloud-only Azure objects
Managing the configuration of Active Roles
Connecting to the Administration Service Managed domains Using unmanaged domains Evaluating product usage Creating and using virtual attributes Examining client sessions Monitoring performance Customizing the Console Using Configuration Center Changing the Active Roles Admin account Enabling or disabling diagnostic logs Active Roles Log Viewer
SQL Server replication Using regular expressions Administrative Template Configuring federated authentication Communication ports and URLs used by Active Roles Integrating Active Roles with other products and services Active Roles Language Pack Active Roles Diagnostic Tools Active Roles Add-on Manager

Configuring a Mask entry type

With this entry type, you can include a syntax that determines the number and type of characters that are allowed in the property that the policy controls.

To configure a Mask entry type

  1. Under Entry type, click Mask.

    Figure 62: Add Entry: Mask

  2. Select what characters the mask allows to use:

    • Any characters or no characters: Allows the entry to include any series of characters.

    • At most the specified number of characters: Enter the maximum number of allowed characters the entry may include.

      • In Number of characters, enter the maximum number of characters that are allowed in this entry.

        The entry can include any number of characters that do not exceed this number.

      • In Allowed characters, select the type of characters that are allowed in this entry.

    • Exactly the specified number of characters: Specify an exact number of allowed characters that the entry must include.

      • In Number of characters, enter the exact number of characters that are allowed in this entry.

        The entry must include exactly the specified number of characters.

      • In Allowed characters, select the type of characters that are allowed in this entry.

  3. Click OK.

Configuring a Uniqueness Number entry type

With this entry type, you can configure a value to include a number the policy will increment in the event of a naming conflict. For example, in a policy that generates a user logon name or email alias, you can add this entry type to the generation rule to ensure the uniqueness of the name or alias that is generated by the policy.

To configure a Uniqueness Number entry type

  1. Under Entry type, click Uniqueness Number.

    Figure 63: Entry Type: Uniqueness Number

  2. Decide when you want the policy to use this entry:

    • To always add this entry to the value regardless of whether or not the policy encounters a naming conflict, select Add always.

    • To only add this entry to the value if the policy encounters a naming conflict, select Add if the property value is in use.

  3. Specify how you want the entry to be formatted:

    • To format the entry as a variable-length string of digits, clear the Fixed-length number, with leading zeroes check box. In most cases, this will result in a single-digit entry.

    • To format the entry as a fixed-length string of digits, select Fixed-length number, with leading zeroes, then enter the number of digits that you want the string to include. This will result in an entry prefixed with the appropriate number of zeroes, for example, 001, 002 and 003.

  4. Click OK.

Configuring a Date and Time entry type

With this entry type, you can configure a value to include the date and time of the operation that the policy performs (for example, the date and time when the user was deprovisioned).

To configure a Date and Time entry type

  1. Under Entry type, click Date and Time.

    Figure 64: Entry type: Date and Time

  2. In the list under Date and time format, select the date or time format that you want to use.

  3. Click OK.

Configuring an Initiator ID entry type

With this entry type, you can configure a value to include the ID of the initiator, that is, the user who initiated the operation that the policy performs (for example, the ID of the user who initiated the deprovisioning process). The policy generates the Initiator ID based on certain properties of the initiator’s account, for example, the user logon name. You can configure a custom rule to use other properties.

To configure an Initiator ID entry

  1. Under Entry type, click Initiator ID.

    Figure 65: Entry type: Initiator ID

  2. Select one of the following options:

    • To set the Initiator ID to the pre-Windows 2000 user logon name of the initiator, select User logon name (pre-Windows 2000) of the Initiator, in the form Domain\Name.

    • To set the Initiator ID to the user logon name of the initiator, selectUser logon name of Initiator.

    • To compose the Initiator ID of other properties specific to the initiator, select Initiator ID built using a custom rule.

  3. If you selected Initiator ID built using a custom rule, click Configure. To set up the value that you want to use as the Initiator ID, in the Configure Value dialog click Add and specify the entries for the value.

    You can configure entries of the following categories:

  4. Click OK.

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating