You can view the Azure Health Check status of your configured Azure tenants and Azure applications in the Active Roles Web Interface. This informs you about the connection status of Active Roles to your Azure AD deployment, and the health status of your Azure AD deployment itself.
To view the Azure AD health status in Active Roles
-
On the Active Roles Web Interface, navigate to Directory Management > Views > Azure > Azure Configuration > Azure Health Check.
-
In the Tenant drop-down list, select the Azure tenant for which you want to view the Azure health status.
Active Roles then shows the following health status information:
-
Graph Connectivity: Indicates if Active Roles is connected to the Microsoft Graph API. Successful connection is indicated with a green status.
-
Tenant Connectivity Indicates if the Azure tenant user name and password credentials are validated. Successful connection is indicated with a green status.
NOTE: Active Roles can establish Tenant Connectivity only if Graph Connectivity is established successfully.
-
Azure Application Connectivity Indicates if Active Roles is consented, validated and verified as an Azure AD application. Successful connection is indicated with a green status.
NOTE: Active Roles can establish Azure Application Connectivity only if Tenant Connectivity and Graph Connectivity are established successfully.
You can view the Azure Licenses Report of an Azure tenant in the Active Roles Web Interface. Use this feature to check the Office 365 (O365) licenses available in an Azure tenant and assigned to the (guest) users of the Azure tenant.
To view the Azure AD licenses report of an Azure tenant
-
On the Active Roles Web Interface, navigate to Directory Management > Views > Azure > Azure Configuration > Azure Licenses Report.
-
In the Tenant drop-down list, select the Azure tenant for which you want to view the Azure licenses report.
Active Roles then shows the list of O365 licenses available in the Azure AD domain with the following information:
-
Valid: The total number of a specific O365 license available for the Azure AD domain.
-
Expired: The number of licenses for a specific O365 license that are in renewal period or have expired.
-
Assigned: The number of licenses for a specific O365 license that have been assigned to any users in the domain.
You can view the Office 365 Roles Report of an Azure tenant in the Active Roles Web Interface. Use this feature to check the Office 365 (O365) roles that are available and assigned to the users within your Azure tenant.
To view the Office 365 roles report
-
On the Active Roles Web Interface, navigate to Directory Management > Views > Azure > Azure Configuration > Office 365 Rules Report.
-
In the Tenant drop-down list, select the Azure tenant for which you want to view the O365 roles report.
The O365 Roles Report wizard then appears, showing the list of available O365 roles and the users assigned with those roles in the Azure AD domain.
To add an Azure AD tenant, use the Active Roles Management Shell. To do so, run the New-QADAzureConfigObject cmdlet on the Management Shell interface.
Description
New-QADAzureConfigObject allows you add an Azure AD tenant to Active Directory.
Usage Recommendations
To add an Azure AD tenant using the tenant ID provided by Microsoft for the default tenant (created at the time of the Microsoft Azure subscription), use New-QADAzureConfigObject.
Syntax
New-QADAzureConfigObject -type 'AzureTenant' -name 'Azuretenantname' -AzureTenantId 'AzureTenantGUID' -AzureTenantDescription 'AzureTenantDescription' -AzureAdminUserID 'AzureGlobalAdminUserID' -AzureAdminPassword 'AzureGlobalIDPassword' -AzureADTenantType 'AzureTenantType'
Parameters
The New-QADAzureConfigObject cmdlet has the following parameters.
-
type (string): Specifies the object class of the directory object to be created (such as User or Group). The cmdlet creates a directory object of the object class specified with this parameter.
Table 120: Parameter: type (string)
Required |
true |
Position |
named |
Accepts pipeline input |
false |
Accepts wildcard characters |
false |
-
name (string): Sets the name attribute to the value of this parameter on the new object created by New-QADAzureConfigObject in the directory.
Table 121: Parameter: name (string)
Required |
true |
Position |
named |
Accepts pipeline input |
false |
Accepts wildcard characters |
false |
-
AzureTenantId (string): Specifies the Azure AD tenant ID obtained from the default tenant (created after subscribing to Microsoft Azure).
NOTE: The Azure AD ID value configured for this parameter must match the tenant ID configured on the Azure AD side. Otherwise, attempts to create an Azure AD application or manage Azure AD objects will fail.
Table 122: Parameters: AzureTenantId (string)
Required |
true |
Position |
named |
Accepts pipeline input |
false |
Accepts wildcard characters |
false |
-
AzureTenantDescription: Specifies the required description of the Azure AD tenant.
Table 123: AzureTenantDescription
Required |
false |
Position |
named |
Accepts pipeline input |
false |
Accepts wildcard characters |
false |
-
AzureAdminUserID: Specifies the administrative user name for Microsoft Azure AD.
NOTE: To perform license management or Azure user, guest user, and group management, the administrative user must have the required privileges (for example, License Administrator, User Administrator or Groups Administrator roles).
For more information on the available privileges and for an overview of the various Azure and Azure AD administrative roles, see Azure AD built-in roles and Classic subscription administrator roles, Azure roles, and Azure AD roles in the official Microsoft documentation.
Table 124: Parameters: AzureAdminUserID
Required |
true |
Position |
named |
Accepts pipeline input |
false |
Accepts wildcard characters |
false |
-
AzureAdminPassword: Specifies the administrative user password for Microsoft Azure AD.
Table 125: Parameters: AzureAdminPassword
Required |
true |
Position |
named |
Accepts pipeline input |
false |
Accepts wildcard characters |
false |
-
AzureADTenantType: Specifies the Azure AD tenant type (Federated, Non-Federated, or Synchronized Identity).
NOTE: Make sure that you select the tenant type corresponding to your organization environment.
Table 126: Parameters: AzureADTenantType
Required |
true |
Position |
named |
Accepts pipeline input |
false |
Accepts wildcard characters |
false |
Accepts value |
-
Federated
-
NonFederated
-
SynchronizedIdentity |
Examples
See the following use cases for examples on how to use this cmdlet.
Creating a new Azure AD tenant with a local user
To create a new Azure AD tenant with a locally logged on user
-
Connect to any available domain controller with the credentials of your local user.
-
Create a new Azure AD tenant with the following New-QADAzureConfigObject cmdlet:
C:\PS> New-QADAzureConfigObject -type 'AzureTenant' -name 'CompanyAzuretenant' -AzureTenantId 'CompanyAzureTenantID' -AzureTenantDescription 'Azure tenant for Company' -AzureAdminUserID 'AzureAdminUser1' -AzureAdminPassword 'AzureAdminPassword1’ -AzureADTenantType 'AzureTenantType'
Creating a new Azure AD tenant with a specific user and then disconnecting
To create a new Azure AD tenant with a specific user and then disconnect
-
Connect to any available domain controller:
C:\PS> $pw = read-host "Enter password" -AsSecureString
-
Connect to the local Administration Service with a specific user of your choice:
C:\PS> connect-qadService -service 'localhost' -proxy -ConnectionAccount 'company\administrator' -ConnectionPassword $pw
-
Create the new Azure AD tenant:
C:\PS> New-QADAzureConfigObject -type 'AzureTenant' -name 'CompanyAzuretenant' -AzureTenantId 'CompanyAzureTenantID' -AzureTenantDescription 'Azure tenant for Company' -AzureAdminUserID 'AzureAdminUser1' -AzureAdminPassword 'AzureAdminPassword1’ -AzureADTenantType 'AzureTenantType'
-
Once the Azure AD tenant is created, disconnect your user:
C:\PS> disconnect-qadService