Chat now with support
Chat with Support

Identity Manager 8.0.5 - Administration Guide for Connecting to Azure Active Directory

Managing Azure Active Directory Environments Setting Up Synchronization with an Azure Active Directory Tenant Base Data for Managing Azure Active Directory Azure Active Directory Core Directories Azure Active Directory User Accounts Azure Active Directory Groups Azure Active Directory Administrator Roles Azure Active Directory Subscriptions and Service Plans
Azure Active Directory Subscriptions Disabled Azure Active Directory Service Plan
Reports about Azure Active Directory Objects Appendix: Configuration Parameters for Managing Azure Active Directory Appendix: Default Project Template for Azure Active Directory

Managing Azure Active Directory Environments

One Identity Manager offers simplified user account administration for Azure Active Directory. One Identity Manager concentrates on setting up and editing user accounts and providing the required permissions. To equip users with the required permissions, subscriptions, service plans, groups and administration roles are mapped in One Identity Manager. This makes it possible to use Identity and Access Governance processes such as attesting, Identity Audit, user account management and system entitlements, IT Shop or report subscriptions for Azure Active Directory tenants.

One Identity Manager provides company employees with the necessary user accounts. For this, you can use different mechanisms to connect employees to their user accounts. You can also manage user accounts independently of employees and therefore set up administrator user accounts.

Additional information about the Azure Active Directory core directory like tenants and verified domains is loaded into the One Identity Manager database by data synchronization. There are only limited possibilities for customizing this information in the One Identity Manager due to the complex dependencies and far reaching effects of changes.

For more detailed information about the Azure Active Directory structure, see the Azure Active Directory documentation from Microsoft.

Architecture Overview

To access Azure Active Directory tenant data, the Azure Active Directory connector is installed on a synchronization server. The synchronization server ensures data is compared between the One Identity Manager database and Azure Active Directory. The Azure Active Directory connector uses the Microsoft Graph API for accessing Azure Active Directory data.

The Azure Active Directory connector must authenticate itself on the Azure Active Directory tenant to access Azure Active Directory tenant data. Authentication is carried out by a One Identity Manager application that is integrated in the Azure Active Directory tenant and equipped with the respective access rights.

Figure 1: Architecture for synchronization

One Identity Manager Users for Managing an Azure Active Directory System

The following users are used in Azure Active Directory system administration.

Table 1: Users
User Task
Target system administrators

Target system administrators must be assigned to the application role Target system | Administrators.

Users with this application role:

  • Administrate application roles for individual target systems types.
  • Specify the target system manager.
  • Set up other application roles for target system managers if required.
  • Specify which application roles are conflicting for target system managers
  • Authorize other employee to be target system administrators.
  • Do not assume any administrative tasks within the target system.
Target system managers

Target system managers must be assigned to the application role Target systems | Azure Active Directory or a sub application role.

Users with this application role:

  • Assume administrative tasks for the target system.
  • Create, change or delete target system objects, like user accounts or groups.
  • Edit password policies for the target system.
  • Prepare groups for adding to the IT Shop.
  • Configure synchronization in the Synchronization Editor and defines the mapping for comparing target systems and One Identity Manager.
  • Edit the synchronization's target system types and outstanding objects.
  • Authorize other employees within their area of responsibility as target system managers and create child application roles if required.
One Identity Manager administrators
  • Create customized permissions groups for application roles for role-based login to administration tools in the Designer, as required.
  • Create system users and permissions groups for non-role based login to administration tools, as required.
  • Enable or disable additional configuration parameters in the Designer, as required.
  • Create custom processes in the Designer, as required.
  • Create and configures schedules, as required.
  • Create and configure password policies, as required.
Administrators for the IT Shop

Administrators must be assigned to the application role Request & Fulfillment | IT Shop | Administrators.

Users with this application role:

  • Assign to IT Shop structures.

Product owner for the IT Shop

The product owners must be assigned to the application roles Request & Fulfillment | IT Shop | Product owners or an application role below that.

Users with this application role:

  • Approve through requests.
  • Edit service items and service categories under their management.
Administrators for organizations

Administrators must be assigned to the application role Identity Management | Organizations | Administrators.

Users with this application role:

  • Assign to departments, cost centers and locations.
Business roles administrators

Administrators must be assigned to the application role Identity Management | Business roles | Administrators.

Users with this application role:

  • Assign to business roles.

Setting Up Synchronization with an Azure Active Directory Tenant

To load One Identity Manager tenant objects into the Azure Active Directory database for the first time

  1. Prepare a user account in the Azure Active Directory tenant with sufficient permissions for synchronization.
  2. Integrate One Identity Manager in Azure Active Directory as an application for your tenants.
  3. The One Identity Manager components for managing Azure Active Directory tenants are available if the configuration parameter "TargetSystem\AzureADS" is set.

    • Check whether the configuration parameter is set in the Designer. Otherwise, set the configuration parameter and compile the database.

    • Other configuration parameters are installed when the module is installed. Check the configuration parameters and modify them as necessary to suit your requirements.
  4. Install and configure a synchronization server and declare the server as Job server in One Identity Manager.
  5. Create a synchronization project with the Synchronization Editor.
Detailed information about this topic
Self Service Tools
Knowledge Base
Notifications & Alerts
Product Support
Software Downloads
Technical Documentation
User Forums
Video Tutorials
RSS Feed
Contact Us
Licensing Assistance
Technical Support
View All
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating