Chat now with support
Chat with Support

Active Roles 7.5 - Administration Guide

Introduction About Active Roles Getting Started Rule-based Administrative Views Role-based Administration
Access Templates as administrative roles Access Template management tasks Examples of use Deployment considerations Windows claims-based Access Rules
Rule-based AutoProvisioning and Deprovisioning
About Policy Objects Policy Object management tasks Policy configuration tasks
Property Generation and Validation User Logon Name Generation Group Membership AutoProvisioning E-mail Alias Generation Exchange Mailbox AutoProvisioning AutoProvisioning for SaaS products OneDrive Provisioning Home Folder AutoProvisioning Script Execution Office 365 and Azure Tenant Selection User Account Deprovisioning Office 365 Licenses Retention Group Membership Removal Exchange Mailbox Deprovisioning Home Folder Deprovisioning User Account Relocation User Account Permanent Deletion Group Object Deprovisioning Group Object Relocation Group Object Permanent Deletion Notification Distribution Report Distribution
Deployment considerations Checking for policy compliance Deprovisioning users or groups Restoring deprovisioned users or groups Container Deletion Prevention policy Picture management rules Policy extensions
Workflows
Understanding workflow Workflow activities overview Configuring a workflow
Creating a workflow definition Configuring workflow start conditions Configuring workflow parameters Adding activities to a workflow Configuring an Approval activity Configuring a Notification activity Configuring a Script activity Configuring an If-Else activity Configuring a Stop/Break activity Configuring an Add Report Section activity Configuring a Search activity Configuring CRUD activities Configuring a Save Object Properties activity Configuring a Modify Requested Changes activity Enabling or disabling an activity Enabling or disabling a workflow Using the initialization script
Example: Approval workflow E-mail based approval Automation workflow Activity extensions
Temporal Group Memberships Group Family Dynamic Groups Active Roles Reporting Management History
Understanding Management History Management History configuration Viewing change history
Workflow activity report sections Policy report items Active Roles internal policy report items
Examining user activity
Entitlement Profile Recycle Bin AD LDS Data Management One Identity Starling Management One Identity Starling Two-factor Authentication for Active Roles Managing One Identity Starling Connect Azure AD, Office 365, and Exchange Online management
Configuring Active Roles to manage hybrid AD objects Managing Hybrid AD Users Unified provisioning policy for Azure O365 Tenant Selection, Office 365 License Selection, and Office 365 Roles Selection, and OneDrive provisioning Office 365 roles management for hybrid environment users Managing Office 365 Contacts Managing Hybrid AD Groups Managing Office 365 Groups Managing Azure Security Groups Managing cloud-only Azure users Managing cloud-only Azure guest users Managing cloud-only Azure contacts Changes to Active Roles policies for cloud-only Azure objects Managing room mailboxes
Managing Configuration of Active Roles
Connecting to the Administration Service Adding and removing managed domains Using unmanaged domains Evaluating product usage Creating and using virtual attributes Examining client sessions Monitoring performance Customizing the console Using Configuration Center Changing the Active Roles Admin account Enabling or disabling diagnostic logs Active Roles Log Viewer
SQL Server Replication Appendix A: Using regular expressions Appendix B: Administrative Template Appendix C: Communication ports Appendix D: Active Roles and supported Azure environments Appendix E: Enabling Federated Authentication Appendix F: Active Roles integration with other One Identity and Quest products Appendix G: Active Roles integration with Duo MFA Appendix H: Active Roles integration with Okta MFA

Adding or removing owners from an Azure Security Group with the Web Interface

You can use the Active Roles Web Interface to specify owners for an Azure Security group. Using the applicable options, you can either add or remove owners to or from the selected Azure Security group.

NOTE: Consider the following when configuring group ownership:

  • You cannot specify a group as an owner of another group.

  • Although Active Roles and Azure AD support specifying Azure guest users as group owners, One Identity recommends doing so only if assigning the ownership of a specific group to a guest user is in line with the security policies of your organization.

To add owners to an Azure Security group

  1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> > Security Groups.

    The list of existing Azure Security groups in the selected Azure tenant appears.

  2. Select the group that you want to configure.

  3. In the right-side pane, click Azure Properties.

  4. To list the owners of the selected group, click the Owners tab of the Azure Properties window.

  5. Click Add to add a new owner (or owners) to the selected group.

  6. In the Select Object page, use the search field to find the (guest) users in the Azure tenant that you want to specify as owners.

    The (guest) users meeting the search criteria will appear in the Display Name column.

  7. Select the check boxes of the (guest) users you want to specify as owners of the group. The selected users will be listed in the lower pane of the Select Object page.

  8. (Optional) To search for additional (guest) users, enter another search string. After that, select the (guest) users you want to add from the updated list.

  9. To apply your changes, click OK. The Owners page will be updated with the new settings.

To remove owners from an O365 group

  1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> > Security Groups.

    The list of existing Azure Security groups in the selected Azure tenant appears.

  2. Select the group that you want to configure.

  3. In the right-side pane, click Azure Properties.

  4. To list the owners of the selected group, click the Owners tab of the Azure Properties window.

  5. Select the owners whose ownership you want to revoke, and click Remove. The selected owners are removed from the list of owners.

  6. To apply your changes, click OK. The Owners page will be updated with the new settings.

Adding or removing members from an Azure Security Group with the Web Interface

You can use the Active Roles Web Interface to add members to an existing Azure Security group with an Assigned membership setting.

NOTE: Consider the following when managing the members of an Azure Security group in Active Roles:

  • In the Active Roles Web Interface, you can only specify Azure users, Azure guest users, other Azure security groups and external users as group members for Azure Security groups with an Assigned membership setting. You cannot specify devices and applications. However, you can:

    • Configure Azure Security groups in the Active Roles Web Interface to have dynamic device membership by using the appropriate dynamic membership rules (such as device.displayName). For more information on the applicable membership rule syntax, see Dynamic membership rules for groups in Azure Active Directory in the Microsoft 365 documentation.

    • Configure device and application memberships later in Azure Portal for Azure Security groups created in Active Roles.

  • You cannot add or remove members manually to or from an Azure Security group with dynamic membership. To change the members of a dynamic group manually, first modify its membership type from Dynamic Members to Assigned membership. For more information, see Modifying an Azure Security Group with the Web Interface.

  • Although you can use the Active Roles Web Interface to manage Azure Security groups that also contain devices and applications, the Active Roles Web Interface cannot display the member devices and applications of such groups.

To add members to an Azure Security group

  1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> > Security Groups.

    The list of existing Azure Security groups in the selected Azure tenant appears.

  2. Select the group that you want to configure.

  3. In the right-side pane, click Members.

    The Members page then appears with the list of members in the selected group.

  4. Click Add to add a new member (or members) to the group.

  5. In the Select Object page, use the search field to find the (guest) users or Azure Security groups in the Azure tenant that you want to add.

    The (guest) users and Azure Security groups that meet the search criteria will appear in the Display Name column.

  6. Select the check boxes of the (guest) users or Azure Security groups that you want to add to the group. The selected objects will appear in the lower pane of the Select Object page.

  7. (Optional) To search for additional (guest) users or Azure Security groups, enter another search string. After that, select the objects you want to add from the updated list.

  8. To apply your changes, click OK. The Members page will be updated with the new membership settings.

To remove members from an Azure Security group

  1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> > Security Groups.

    The list of existing Azure Security groups in the selected Azure tenant appears.

  2. Select the group that you want to configure.

  3. In the right-side pane, click Members.

    The Members page then appears with the list of members in the selected group.

  4. To remove a member (or members) from the selected group, select the members from the Members Name list, and click Remove.

    The selected members are removed from the Members Name list.

  5. To apply your changes, click OK. The Members page will be updated with the new membership settings.

Viewing the members of a dynamic Azure Security Group with the Web Interface

You can check the member (guest) users and member Azure Security groups of an Azure Security group with dynamic membership via the Active Roles Web Interface. This is useful if you want to get a quick update on the current membership status of the dynamic Azure Security group.

NOTE: Consider the following when using dynamic Azure Security groups in Active Roles:

  • You cannot add or remove members manually to or from an Azure Security group with dynamic membership. To change the members of a dynamic group manually, first modify its membership type from Dynamic Members to Assigned membership. For more information, see Modifying an Azure Security Group with the Web Interface.

  • Although you can use the Active Roles Web Interface to manage Azure Security groups that also contain devices and applications, the Active Roles Web Interface cannot display the member devices and applications of such groups.

To view the members of an Azure Security group with dynamic membership

  1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> > Security Groups.

    The list of existing Azure Security groups in the selected Azure tenant appears.

  2. Select the group whose members you want to check.

  3. In the right-side pane, click Dynamic Members.

    The Dynamic Members page then appears with the list of members in the selected group.

  4. To exit the Dynamic Members window, click Close.

Viewing the change history of an Azure Security Group in the Web Interface

You can check the change history of an Azure Security group with the Active Roles Web Interface. This is useful if you want to view the list of changes that occurred to the selected Azure Security group, such as:

  • Membership changes (that is, added or removed members).

  • Membership type changes (that is, whether the group has been set to assigned or dynamic membership).

NOTE: The Change History option of the Active Roles Web Interface lists only group modifications that were performed in Active Roles. It does not list the changes of the group that were performed outside Active Roles, for example in Azure Portal.

To view the change history of an Azure Security group

  1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> > Security Groups.

    The list of existing Azure Security groups in the selected Azure tenant appears.

  2. Select the group whose change history you want to check.

  3. In the right-side pane, click Change History.

    The Change History page then appears, with the newest change of the group listed at the top of the page.

  4. To close the Change History window, click any Tree node, or any option listed in the right-side pane.

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating