Chat now with support
Chat with Support

Active Roles 7.5.3 - Administration Guide

Introduction About Active Roles Getting Started Rule-based Administrative Views Role-based Administration
Access Templates as administrative roles Access Template management tasks Examples of use Deployment considerations Windows claims-based Access Rules
Rule-based AutoProvisioning and Deprovisioning
About Policy Objects Policy Object management tasks Policy configuration tasks
Property Generation and Validation User Logon Name Generation Group Membership AutoProvisioning E-mail Alias Generation Exchange Mailbox AutoProvisioning AutoProvisioning for SaaS products OneDrive Provisioning Home Folder AutoProvisioning Script Execution Office 365 and Azure Tenant Selection User Account Deprovisioning Office 365 Licenses Retention Group Membership Removal Exchange Mailbox Deprovisioning Home Folder Deprovisioning User Account Relocation User Account Permanent Deletion Group Object Deprovisioning Group Object Relocation Group Object Permanent Deletion Notification Distribution Report Distribution
Deployment considerations Checking for policy compliance Deprovisioning users or groups Restoring deprovisioned users or groups Container Deletion Prevention policy Picture management rules Policy extensions
Workflows
Understanding workflow Workflow activities overview Configuring a workflow
Creating a workflow definition Configuring workflow start conditions Configuring workflow parameters Adding activities to a workflow Configuring an Approval activity Configuring a Notification activity Configuring a Script activity Configuring an If-Else activity Configuring a Stop/Break activity Configuring an Add Report Section activity Configuring a Search activity Configuring CRUD activities Configuring a Save Object Properties activity Configuring a Modify Requested Changes activity Enabling or disabling an activity Enabling or disabling a workflow Using the initialization script
Example: Approval workflow E-mail based approval Automation workflow Activity extensions
Temporal Group Memberships Group Family Dynamic Groups Active Roles Reporting Management History
Understanding Management History Management History configuration Viewing change history
Workflow activity report sections Policy report items Active Roles internal policy report items
Examining user activity
Entitlement Profile Recycle Bin AD LDS Data Management One Identity Starling Management One Identity Starling Two-factor Authentication for Active Roles Managing One Identity Starling Connect Azure AD, Office 365, and Exchange Online management
Configuring Active Roles to manage hybrid AD objects Managing Hybrid AD Users Unified provisioning policy for Azure O365 Tenant Selection, Office 365 License Selection, and Office 365 Roles Selection, and OneDrive provisioning Office 365 roles management for hybrid environment users Managing Office 365 Contacts Managing Hybrid AD Groups Managing Office 365 Groups Managing Azure Security Groups Managing cloud-only Azure users Managing cloud-only Azure guest users Managing cloud-only Azure contacts Changes to Active Roles policies for cloud-only Azure objects Managing room mailboxes
Managing Configuration of Active Roles
Connecting to the Administration Service Adding and removing managed domains Using unmanaged domains Evaluating product usage Creating and using virtual attributes Examining client sessions Monitoring performance Customizing the console Using Configuration Center Changing the Active Roles Admin account Enabling or disabling diagnostic logs Active Roles Log Viewer
SQL Server Replication Appendix A: Using regular expressions Appendix B: Administrative Template Appendix C: Communication ports Appendix D: Active Roles and supported Azure environments Appendix E: Enabling Federated Authentication Appendix F: Active Roles integration with other One Identity and Quest products Appendix G: Active Roles integration with Duo Appendix H: Active Roles integration with Okta

Creating an Azure Security Group with the Web Interface

You can use the Active Roles Web Interface to create and enable new Azure security groups.

For more information on Azure Security groups, see Groups in Microsoft 365 and Azure in the Microsoft 365 community documentation.

To create a new Azure Security group

  1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> > Security Groups.

    The list of existing Azure Security groups in the selected Azure tenant appears.

  2. In the right-side pane, click New Group.

    The New Group in Security Groups window appears.

  3. Specify the Group Azure Display Name of the configured group.

    TIP: You can configure multiple groups with the same Group Azure Display Name in the same Azure tenant.

  4. Provide a short Description for the group.

  5. Configure the Membership type of the group:

    • Assigned: When selected, you can add or remove members to or from the group manually later. For more information, see Adding or removing members from an Azure Security Group with the Web Interface.

    • Dynamic Members: When selected, Active Roles sets up the group as a dynamic membership group, and will automatically update group membership based on the configured Dynamic membership rule syntax.

    TIP: Consider the following when configuring the Membership type:

    • Select Dynamic Members to quickly configure a group based on a certain membership logic. For example, if you need to set up a group for employees from the same geographical location, business unit, or functional area, One Identity recommends configuring the group with Dynamic Members.

    • If you select Dynamic Members, you will not be able to manually add or remove members to or from the Azure Security group, unless you change its Membership type to Assigned later. However, you can still manually configure the owner(s) for a dynamic Azure Security group, as described in Adding or removing owners from an Azure Security Group with the Web Interface.

    • Although the Membership type drop-down setting does not offer a separate Dynamic Devices option, you can actually set up dynamic Azure Security groups in Active Roles with the appropriate dynamic device membership rules (such as device.displayName). However, the Active Roles Web Interface cannot display member devices and applications.

    • You can always change the Membership type later by navigating to the following option of the Active Roles Web Interface:

      Directory Management > Tree > Azure > <azure-tenant-name> > Security Groups > <azure-security-group-name> > Azure Properties > General.

    • Changing the Membership type from Dynamic Members to Assigned later will keep the last set of members that were dynamically assigned to the group.

  6. If you set the Membership type to Dynamic Members, specify the Dynamic membership rule syntax. Active Roles will send the logic configured in this field to Azure to automatically assign or remove members to or from the group later.

    NOTE: Consider the following when using the Dynamic membership rule syntax setting:

    • This setting is enabled only if Membership type is set to Dynamic Members. However, in that case, it is mandatory and cannot be empty.

    • The specified dynamic membership rule must meet all rule syntax requirements, otherwise the window will return an error. For more information on the available membership rule properties, operators and values, see Dynamic membership rules for groups in Azure Active Directory in the Microsoft 365 documentation.

    • Whenever you modify the dynamic membership rule of a dynamic O365 group, it can take several minutes for Azure to update the list of group members in the Directory Management > Tree > Azure > <azure-tenant-name> > Security Groups > <azure-security-group-name> > Dynamic Members window.

  7. To complete the configuration of the new Azure Security group, click Finish.

    The new Azure Security group will appear under the Directory Management > Tree > Azure > <azure-tenant-name> > Security Groups node.

Modifying an Azure Security Group with the Web Interface

You can use the Active Roles Web Interface to modify the Azure properties of an existing Azure Security group in your Azure tenant. This is typically useful if you have to:

  • Modify the display name of the Azure Security group, for example because of an organizational or security policy change.

  • Change the configured membership type (manually assigned or dynamic) of the Azure Security group.

To modify the Azure properties of an Azure Security group

  1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> > Security Groups.

    The list of existing Azure Security groups in the selected Azure tenant appears.

  2. Select the group that you want to configure.

  3. In the right-side pane, click Azure Properties.

  4. In the left-side pane of the Azure Properties window, click Properties.

  5. (Optional) Specify the Group Azure Display Name of the configured group.

    TIP: You can configure multiple groups with the same Group Azure Display Name in the same Azure tenant.

  6. (Optional) Provide a short Description for the group.

  7. (Optional) Configure the Membership type of the group:

    • Assigned: When selected, you can add or remove members to or from the group manually later. For more information, see Adding or removing members from an Azure Security Group with the Web Interface.

    • Dynamic Members: When selected, Active Roles sets up the group as a dynamic membership group, and will automatically update group membership based on the configured Dynamic membership rule syntax.

    TIP: Consider the following when configuring the Membership type:

    • Select Dynamic Members to quickly configure a group based on a certain membership logic. For example, if you need to set up a group for employees from the same geographical location, business unit, or functional area, One Identity recommends configuring the group with Dynamic Members.

    • If you select Dynamic Members, you will not be able to manually add or remove members to or from the Azure Security group, unless you change its Membership type to Assigned later. However, you can still manually configure the owner(s) for a dynamic Azure Security group, as described in Adding or removing owners from an Azure Security Group with the Web Interface.

    • Changing the Membership type from Dynamic Members to Assigned later will keep the last set of members that were dynamically assigned to the group.

  8. (Optional) If you set the Membership type to Dynamic Members, specify the Dynamic membership rule syntax. Active Roles will send the logic configured in this field to Azure to automatically assign or remove members to or from the group later. For more information on how to specify a membership rule, see Dynamic membership rules for groups in Azure Active Directory in the Microsoft 365 documentation.

  9. To apply your changes, click Save.

Adding or removing owners from an Azure Security Group with the Web Interface

You can use the Active Roles Web Interface to specify owners for an Azure Security group. Using the applicable options, you can either add or remove owners to or from the selected Azure Security group.

NOTE: Consider the following when configuring group ownership:

  • You cannot specify a group as an owner of another group.

  • Although Active Roles and Azure AD support specifying Azure guest users as group owners, One Identity recommends doing so only if assigning the ownership of a specific group to a guest user is in line with the security policies of your organization.

To add owners to an Azure Security group

  1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> > Security Groups.

    The list of existing Azure Security groups in the selected Azure tenant appears.

  2. Select the group that you want to configure.

  3. In the right-side pane, click Azure Properties.

  4. To list the owners of the selected group, click the Owners tab of the Azure Properties window.

  5. Click Add to add a new owner (or owners) to the selected group.

  6. In the Select Object page, use the search field to find the (guest) users in the Azure tenant that you want to specify as owners.

    The (guest) users meeting the search criteria will appear in the Display Name column.

  7. Select the check boxes of the (guest) users you want to specify as owners of the group. The selected users will be listed in the lower pane of the Select Object page.

  8. (Optional) To search for additional (guest) users, enter another search string. After that, select the (guest) users you want to add from the updated list.

  9. To apply your changes, click OK. The Owners page will be updated with the new settings.

To remove owners from an O365 group

  1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> > Security Groups.

    The list of existing Azure Security groups in the selected Azure tenant appears.

  2. Select the group that you want to configure.

  3. In the right-side pane, click Azure Properties.

  4. To list the owners of the selected group, click the Owners tab of the Azure Properties window.

  5. Select the owners whose ownership you want to revoke, and click Remove. The selected owners are removed from the list of owners.

  6. To apply your changes, click OK. The Owners page will be updated with the new settings.

Adding or removing members from an Azure Security Group with the Web Interface

You can use the Active Roles Web Interface to add members to an existing Azure Security group with an Assigned membership setting.

NOTE: Consider the following when managing the members of an Azure Security group in Active Roles:

  • In the Active Roles Web Interface, you can only specify Azure users, Azure guest users, other Azure security groups and external users as group members for Azure Security groups with an Assigned membership setting. You cannot specify devices and applications. However, you can:

    • Configure Azure Security groups in the Active Roles Web Interface to have dynamic device membership by using the appropriate dynamic membership rules (such as device.displayName). For more information on the applicable membership rule syntax, see Dynamic membership rules for groups in Azure Active Directory in the Microsoft 365 documentation.

    • Configure device and application memberships later in Azure Portal for Azure Security groups created in Active Roles.

  • You cannot add or remove members manually to or from an Azure Security group with dynamic membership. To change the members of a dynamic group manually, first modify its membership type from Dynamic Members to Assigned membership. For more information, see Modifying an Azure Security Group with the Web Interface.

  • Although you can use the Active Roles Web Interface to manage Azure Security groups that also contain devices and applications, the Active Roles Web Interface cannot display the member devices and applications of such groups.

To add members to an Azure Security group

  1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> > Security Groups.

    The list of existing Azure Security groups in the selected Azure tenant appears.

  2. Select the group that you want to configure.

  3. In the right-side pane, click Members.

    The Members page then appears with the list of members in the selected group.

  4. Click Add to add a new member (or members) to the group.

  5. In the Select Object page, use the search field to find the (guest) users or Azure Security groups in the Azure tenant that you want to add.

    The (guest) users and Azure Security groups that meet the search criteria will appear in the Display Name column.

  6. Select the check boxes of the (guest) users or Azure Security groups that you want to add to the group. The selected objects will appear in the lower pane of the Select Object page.

  7. (Optional) To search for additional (guest) users or Azure Security groups, enter another search string. After that, select the objects you want to add from the updated list.

  8. To apply your changes, click OK. The Members page will be updated with the new membership settings.

To remove members from an Azure Security group

  1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> > Security Groups.

    The list of existing Azure Security groups in the selected Azure tenant appears.

  2. Select the group that you want to configure.

  3. In the right-side pane, click Members.

    The Members page then appears with the list of members in the selected group.

  4. To remove a member (or members) from the selected group, select the members from the Members Name list, and click Remove.

    The selected members are removed from the Members Name list.

  5. To apply your changes, click OK. The Members page will be updated with the new membership settings.

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating