Chat now with support
Chat with Support

Active Roles 7.5.2 - Administration Guide

Introduction About Active Roles Getting Started Rule-based Administrative Views Role-based Administration
Access Templates as administrative roles Access Template management tasks Examples of use Deployment considerations Windows claims-based Access Rules
Rule-based AutoProvisioning and Deprovisioning
About Policy Objects Policy Object management tasks Policy configuration tasks
Property Generation and Validation User Logon Name Generation Group Membership AutoProvisioning E-mail Alias Generation Exchange Mailbox AutoProvisioning AutoProvisioning for SaaS products OneDrive Provisioning Home Folder AutoProvisioning Script Execution Office 365 and Azure Tenant Selection User Account Deprovisioning Office 365 Licenses Retention Group Membership Removal Exchange Mailbox Deprovisioning Home Folder Deprovisioning User Account Relocation User Account Permanent Deletion Group Object Deprovisioning Group Object Relocation Group Object Permanent Deletion Notification Distribution Report Distribution
Deployment considerations Checking for policy compliance Deprovisioning users or groups Restoring deprovisioned users or groups Container Deletion Prevention policy Picture management rules Policy extensions
Workflows
Understanding workflow Workflow activities overview Configuring a workflow
Creating a workflow definition Configuring workflow start conditions Configuring workflow parameters Adding activities to a workflow Configuring an Approval activity Configuring a Notification activity Configuring a Script activity Configuring an If-Else activity Configuring a Stop/Break activity Configuring an Add Report Section activity Configuring a Search activity Configuring CRUD activities Configuring a Save Object Properties activity Configuring a Modify Requested Changes activity Enabling or disabling an activity Enabling or disabling a workflow Using the initialization script
Example: Approval workflow E-mail based approval Automation workflow Activity extensions
Temporal Group Memberships Group Family Dynamic Groups Active Roles Reporting Management History
Understanding Management History Management History configuration Viewing change history
Workflow activity report sections Policy report items Active Roles internal policy report items
Examining user activity
Entitlement Profile Recycle Bin AD LDS Data Management One Identity Starling Management One Identity Starling Two-factor Authentication for Active Roles Managing One Identity Starling Connect Azure AD, Office 365, and Exchange Online management
Configuring Active Roles to manage hybrid AD objects Managing Hybrid AD Users Unified provisioning policy for Azure O365 Tenant Selection, Office 365 License Selection, and Office 365 Roles Selection, and OneDrive provisioning Office 365 roles management for hybrid environment users Managing Office 365 Contacts Managing Hybrid AD Groups Managing Office 365 Groups Managing Azure Security Groups Managing cloud-only Azure users Managing cloud-only Azure guest users Managing cloud-only Azure contacts Changes to Active Roles policies for cloud-only Azure objects Managing room mailboxes
Managing Configuration of Active Roles
Connecting to the Administration Service Adding and removing managed domains Using unmanaged domains Evaluating product usage Creating and using virtual attributes Examining client sessions Monitoring performance Customizing the console Using Configuration Center Changing the Active Roles Admin account Enabling or disabling diagnostic logs Active Roles Log Viewer
SQL Server Replication Appendix A: Using regular expressions Appendix B: Administrative Template Appendix C: Communication ports Appendix D: Active Roles and supported Azure environments Appendix E: Enabling Federated Authentication Appendix F: Active Roles integration with other One Identity and Quest products Appendix G: Active Roles integration with Duo Appendix H: Active Roles integration with Okta

“Other Properties” tab in the Properties dialog box

The Active Roles console also makes it possible to extend the Properties dialog box for directory objects with an extra tab named Other Properties, allowing the management of a custom set of object properties through the use of the Properties command.

The Active Roles console makes it easy to view or modify the set of properties on the Other Properties tab by using a separate tab in the Properties dialog box for display specifier objects. In this way, you can customize the set of properties included on the Other Properties tab. Note that the Properties dialog box only includes the Other Properties tab if there are any properties to display on that tab.

The Other Properties to Display tab can be used to add or remove properties from the Other Properties tab, only affecting the object type that the display specifier is associated with. The Other Properties to Display tab lists the object properties included on the Other Properties tab for that object type, and allows you to make changes to the list.

You can use the following instructions to add the Other Properties tab to the Properties dialog box for user objects. Similarly, you can extend the property pages for a different object type by creating and configuring a custom display specifier for that object type. For example, to extend the Properties dialog box for Group, Computer, or Organizational Unit, create and configure a custom display specifier named group-Display, computer-Display, or organizationalUnit-Display, respectively.

Note that the names of display specifiers are case-sensitive, so you must type the name exactly as specified in the Active Directory schema. To view the names of display specifiers, you can use the console to examine the “Active Directory | Configuration Container | Display Specifiers | 409” container in the Raw view mode.

To extend the Properties dialog box for User objects

  1. Open the Active Roles console and switch into Raw view mode (select View | Mode, then click Raw Mode and click OK).
  2. In the console tree, expand Configuration | Application Configuration, and select the Active Roles Display Specifiers (Custom) container.
  3. Use the All Tasks | Advanced Create command to create the appropriate locale container.

The custom display specifier must be created in the locale container matching the locale of your environment. These locale containers are named using the hex representation of that locale’s LCID. Thus the US/English locale’s container is named 409, the German locale’s container is named 407, the Japanese locale’s container is named 411, and so forth.

You may need to first create the appropriate locale container. You can do this by using the All Tasks | Advanced Create command to create an object of the class EDS-Display-Specifier-Container.

  1. In the locale container, create the custom display specifier named user-Display.

You can do this by using the All Tasks | Advanced Create command on the locale container to create an object of the class Display-Specifier. Note that the name of the display specifier is case-sensitive, so you should type the name for the new display specifier exactly user-Display, not user-display or User-display.

  1. In the details pane, right-click user-Display and click Properties.
  2. Go to the Other Properties to Display tab.
  3. Add one or more properties to the Other properties on the object property pages list. Then, click OK.
  4. Restart the Administration Service and then reconnect the Console to the Service, for your changes to take effect.

As a result of these steps, the Properties dialog box includes the Other Properties tab where you can view or modify values of the properties you selected in Step 7. You can access that tab in the Active Roles console by right-clicking a user account and then clicking Properties.

Customizing object display names

In Active Directory, each object type may have a display name, and each property of objects may have a display name. In user interfaces, display names are used as friendly names to identify object types and properties. The display names specific to a given object type are stored in the display specifier objects for that object type.

The Active Roles console makes it easy to view or modify display names by using a separate tab in the Properties dialog box for display specifier objects. The Display Names tab provides a convenient way to customize display names for object types and properties.

The Display Names tab can be used to specify or change the display name for the object type that the display specifier is associated with, and to add, modify or remove display names for properties of objects of that type. The property display names are managed using a list of name pairs, with the first name being the LDAP display name of a property and the display name of that property following the LDAP display name.

To customize the English-language display name for the User object class within a forest

  1. Open the Active Roles console and switch into Raw view mode (select View | Mode, then click Raw Mode and click OK).
  2. In the console tree, expand Active Directory | Configuration Container | Display Specifiers, and select the 409 container.
  3. In the details pane, right-click user-Display and click Properties.
  4. On the Display Names tab, in Display name for object type, modify the display name as appropriate, and then click OK.
  5. Restart the Administration Service and then reconnect the Console to the Service, for your changes to take effect.

By using these steps, you make changes to the display specifier held in Active Directory, so your changes affect not only Active Roles but also any client application intended to manage user objects in Active Directory, such as Active Directory Users and Computers. If you only want the display names to be customized within the Active Roles client interfaces, make changes to the custom display specifiers held in the Active Roles Display Specifiers (Custom) container. The Properties dialog box for custom display specifiers also includes the Display Names tab, allowing you to customize display names so that your changes only affect the Active Roles environment.

Using Configuration Center

Configuration Center provides a single solution for configuring Administration Service instances and Web Interface sites, allowing you to perform the core configuration tasks from a single location. Highlights include:

  • Initial configuration tasks such as creation of Administration Service instances and default Web Interface sites
  • Import of configuration and management history from earlier Active Roles versions
  • Management of core Administration Service settings such as the Active Roles Admin account, service account, and database connection
  • Creation of Web Interface sites based on site configuration objects of the current Active Roles version or by importing site configuration objects of earlier Active Roles versions
  • Management of core Web Interface site settings such as the site’s address on the Web server and configuration object on the Administration Service
  • Configuration of One Identity Starling Join for Active Roles
  • Management of MMC interface user access

The Configuration Center operations are fully scriptable using Windows PowerShell command-line tools provided by the Active Roles Management Shell.

Configuration Center design elements

Configuration Center is composed of the following elements:

  • Initial configuration wizards  After completing Active Roles Setup, the administrator uses the initial configuration wizards to create a new Active Roles instance, including the Administration Service and Web Interface. The wizards allow you to specify, in a logical manner, all the required configuration settings.
  • Hub pages and management wizards  Once initial configuration has been completed, Configuration Center provides a consolidated view of the core Active Roles configuration settings, and offers tools for changing those settings. Hub pages in the Configuration Center main window display the current settings specific to the Administration Service and Web Interface, and include commands to start management wizards for changing those settings.
  • From the Administration Service page, you can view or change the service account, Active Roles and Admin account; configure the Active Roles Configuration Database and the Management history database; import configuration data or management history data from an Active Roles database of an earlier version or the current version; view status information, such as whether the Administration Service is started and ready for use; start, stop or restart the Administration Service.

    By allowing configuration data to be imported at any convenient time, Configuration Center makes Active Roles much easier to upgrade. You can install the new Administration Service version side-by-side with an earlier version and then import configuration data to the new version as needed.

  • From the Web Interface page, you can view, create, modify, delete Web Interface sites, enable force SSL redirection, and configure authentication settings; export configuration of any existing Web Interface site to a file; open each site in a Web browser. The site parameters available for setting, viewing and changing include the site’s address (URL, which is based on the Web site and alias of the Web application that implements the Web Interface site on the Web server) and the configuration object that stores the site’s configuration data on the Administration Service. When creating or modifying a Web Interface site, you can reuse an existing configuration object, or create a new configuration object based on a template or by importing data from another configuration object or from an export file.

    Wizards that start from hub pages help you manage configuration settings. Management wizards streamline the core configuration tasks by reducing time it takes to change the service account, Active Roles Admin account and database; import configuration and management history; and configure Web Interface sites on the Web server.

  • From the Join to One Identity Starling wizard, you can enable Active Roles to connect to One Identity Starling, the Software as a Service (SaaS) solution of One Identity.
  • From the MMC Interface Access wizard, you can manage the settings for enabling or disabling user login to MMC interface.
  • Configuration Shell  Active Roles Management Shell enables access to all Configuration Center features and functions from a command line or from a script, allowing for unattended configuration of Active Roles components. The Windows PowerShell module named ActiveRolesConfiguration provides cmdlets for the key set of configuration tasks, such as creation of the Active Roles database, creation or modification of Administration Service instances and Web Interface sites, data exchange between Active Roles databases and between site configuration objects, querying the current state of the Administration Service, and starting, stopping or restarting the Administration Service. The cmdlets provided by the ActiveRolesConfiguration module have their noun prefixed with AR, such as New-ARDatabase, Set-ARService, or Set-ARWebSite.
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating