Chat now with support
Chat with Support

Active Roles 8.2.1 - Administration Guide

Introduction Getting started with Active Roles Configuring rule-based administrative views Configuring role-based administration Configuring rule-based autoprovisioning and deprovisioning
Configuring Provisioning Policy Objects
User Logon Name Generation E-mail Alias Generation Exchange Mailbox AutoProvisioning Group Membership AutoProvisioning Home Folder AutoProvisioning Property Generation and Validation Script Execution O365 and Azure Tenant Selection AutoProvisioning in SaaS products
Configuring Deprovisioning Policy Objects
User Account Deprovisioning Group Membership Removal User Account Relocation Exchange Mailbox Deprovisioning Home Folder Deprovisioning User Account Permanent Deletion Office 365 Licenses Retention Group Object Deprovisioning Group Object Relocation Group Object Permanent Deletion Script Execution Notification Distribution Report Distribution
Configuring entry types Configuring a Container Deletion Prevention policy Configuring picture management rules Managing Policy Objects Checking for policy compliance Deprovisioning users or groups Restoring deprovisioned users or groups Configuring policy extensions
Using rule-based and role-based tools for granular administration Workflows
About workflow processes Workflow processing overview Workflow activities overview Configuring a workflow
Creating a workflow definition for a workflow Configuring workflow start conditions Configuring workflow parameters Adding activities to a workflow Configuring an Approval activity Configuring a Notification activity Configuring a Script activity Configuring an If-Else activity Configuring a Stop/Break activity Configuring an Add Report Section activity Configuring a Search activity Configuring CRUD activities Configuring a Save Object Properties activity Configuring a Modify Requested Changes activity Enabling or disabling an activity Enabling or disabling a workflow Using the initialization script
Approval workflow Email-based approval Automation workflow Activity extensions
Temporal Group Memberships Group Family Dynamic groups Active Roles Reporting Management History Entitlement profile Recycle Bin AD LDS data management One Identity Starling Join and configuration through Active Roles Managing One Identity Starling Connect Configuring linked mailboxes with Exchange Resource Forest Management Configuring remote mailboxes for on-premises users Migrating Active Roles configuration with the Configuration Transfer Wizard Managing Skype for Business Server with Active Roles
About Skype for Business Server User Management Active Directory topologies supported by Skype for Business Server User Management User Management policy for Skype for Business Server User Management Master Account Management policy for Skype for Business Server User Management Access Templates for Skype for Business Server Configuring the Skype for Business Server User Management feature Managing Skype for Business Server users
Exchanging provisioning information with Active Roles SPML Provider Monitoring Active Roles with Management Pack for SCOM Configuring Active Roles for AWS Managed Microsoft AD Azure AD, Microsoft 365, and Exchange Online Management
Azure tenant types and environment types supported by Active Roles Using Active Roles to manage Azure AD objects Unified provisioning policy for Azure M365 Tenant Selection, Microsoft 365 License Selection, Microsoft 365 Roles Selection, and OneDrive provisioning Changes to Active Roles policies for cloud-only Azure objects
Managing the configuration of Active Roles
Connecting to the Administration Service Managed domains Using unmanaged domains Evaluating product usage Creating and using virtual attributes Examining client sessions Monitoring performance Customizing the Console Using Configuration Center Changing the Active Roles Admin account Enabling or disabling diagnostic logs Active Roles Log Viewer
SQL Server replication Using regular expressions Administrative Template Configuring federated authentication Communication ports and URLs used by Active Roles Integrating Active Roles with other products and services Active Roles Language Pack Active Roles Diagnostic Tools Active Roles Add-on Manager

Delegating the Deprovision task

Deprovisioning is, by default, a right of Active Roles Admin, the administrative account specified during Active Roles installation, but the task of deprovisioning can be delegated to any group or user. A dedicated Access Template is provided for this purpose so that you can delegate the use of the Deprovision command without delegating the create or delete operation.

To delegate the task of deprovisioning users or groups in a certain container, such as an Organizational Unit or a Managed Unit, apply the Access Template as follows.

To delegate the Deprovision task

  1. In the Active Roles Console, right-click the container and click Delegate Control to display the Active Roles Security window.

  2. In the Active Roles Security window, click Add to start the Delegation of Control Wizard. Click Next.

  3. On the Users or Groups page, click Add, and then select the users or groups to which you want to delegate the deprovision task. Click Next.

  4. On the Access Templates page, expand the Active Directory folder, then do the following:

    • To delegate the task of deprovisioning users, select the check box next to Users - Perform Deprovision Tasks.

    • To delegate the task of deprovisioning groups, select the check box next to Groups - Perform Deprovision Tasks.

  5. Click Next and follow the instructions in the wizard, accepting the default settings.

After you complete these steps, the users and groups you selected in Step 3 are authorized to deprovision users or groups in the container you selected in Step 1, as well as in any sub-container of that container.

Restoring deprovisioned users or groups

Active Roles provides the ability to restore deprovisioned objects, such as deprovisioned users or groups. The purpose of this operation, referred to as the Undo Deprovisioning operation, is to roll back the changes that were made to an object by the Deprovision operation. When a deprovisioned object needs to be restored (for example, if a user account has been deprovisioned by mistake), the Undo Deprovisioning operation allows the object to be quickly returned to the state it was in before the changes were made.

For more details about this feature, see Concept: Undo Deprovisioning operation in the Active Roles Feature Guide.

Viewing or modifying the Undo Deprovisioning policy options

The behavior of the Undo Deprovisioning operation is determined by a configurable policy contained in a built-in Policy Object. This is the Policy Object named Built-in Policy - Default Rules to Undo User Deprovisioning and located in the Builtin container under Configuration/Policies/Administration. The Policy Object is applied to the Active Directory folder, thus taking effect in all domains that are registered with Active Roles (managed domains).

To view or modify the policy options

  1. Open the Active Roles Console.

  2. In the Console tree, expand Configuration > Policies > Administration, and select Builtin under Administration.

  3. In the details pane, double-click Built-in Policy - Default Rules to Undo User Deprovisioning.

  4. To access the policy options, in the Properties > Policies tab, click the policy in the list, then click View/Edit.

  5. Click the Options tab, then configure the following options:

    • Restore original group membership: When selected, causes the Undo Deprovisioning operation on a deprovisioned user account to add the account to the distribution and security groups from which the account was removed in accord with the Group Membership Removal policy. If you do not want restored accounts to be automatically added to groups, clear this option.

      Note that regardless of whether this option is selected, once a deprovisioned user account is restored, Active Roles automatically adds the account to the appropriate Dynamic Groups and Group Families depending on properties of the account.

    • Leave password unchanged: Causes the Undo Deprovisioning operation on a deprovisioned user account to prevent resetting of the password for the restored account. Select this option if you want the password to be reset by the HelpDesk or by using a self-service password management solution after the account is restored.

    • Prompt to reset password: Causes the Undo Deprovisioning operation on a deprovisioned user account to enable resetting of the password for the restored account. If this option is selected, the Undo Deprovisioning command displays a dialog in which the password can be reset.

Since the built-in Policy Object is normally applied to the Active Directory node in the Active Roles namespace, the policy options are in effect on any deprovisioned user account. If you need different policy options for different domains or containers, create a copy of the built-in Policy Object, and then configure and apply the copy as appropriate.

The Undo Deprovisioning operation is normally enabled in all domains that are registered with Active Roles. It is possible to prohibit this operation in individual domains or containers, or in all domains, by blocking or disabling the policy that governs the operation. In case of disabling the built-in Policy Object, an enabled copy of that Policy Object can be applied in order to allow the Undo Deprovisioning operation in individual domains or containers.

Delegating the task to undo deprovisioning

Restoring deprovisioned users or groups is, by default, a right of Active Roles Admin, the administrative account specified during Active Roles installation, but this task can be delegated to any group or user. A dedicated Access Template is provided for this purpose so you can delegate the use of the Undo Deprovisioning command without delegating the create or delete operation.

To delegate the task of restoring deprovisioned users or groups held in a certain container, such as an Organizational Unit or a Managed Unit, you should apply the Access Template as follows.

To delegate the Undo Deprovisioning task

  1. In the Active Roles Console, right-click the container and click Delegate Control to display the Active Roles Security window.

  2. In the Active Roles Security window, click Add to start the Delegation of Control Wizard. Click Next.

  3. On the Users or Groups page, click Add, and then select the users or groups to which you want to delegate the task. Click Next.

  4. On the Access Templates page, expand the Active Directory folder and then do the following:

    1. To delegate the task of restoring deprovisioned users, select the check box next to Users - Perform Undo Deprovision Tasks.

    2. To delegate the task of restoring deprovisioned groups, select the check box next to Groups - Perform Undo Deprovision Tasks.

  5. Click Next and follow the instructions in the wizard, accepting the default settings.

After you complete these steps, the users and groups you selected in Step 3 are authorized to restore deprovisioned users in the container you selected in Step 1, as well as in any sub-container of that container.

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating