Chat now with support
Chat with Support

Identity Manager 8.0 - Administration Guide for Connecting to Azure Active Directory

Managing Azure Active Directory Environments Setting Up Synchronization with an Azure Active Directory Tenant Base Data for Managing Azure Active Directory Azure Active Directory Core Directories Azure Active Directory user accounts Azure Active Directory groups Azure Active Directory Administrator Roles Azure Active Directory Subscriptions and Service Plans
Azure Active Directory Subscriptions Disabled Azure Active Directory Service Plan
Reports about Azure Active Directory Objects Appendix: Configuration Parameters for Managing Azure Active Directory Appendix: Default Project Template for Azure Active Directory

Initial Password for New Azure Active Directory User Accounts

Initial Password for New Azure Active Directory User Accounts

Table 17: Configuration Parameters for Formatting Initial Passwords for User Accounts
Configuration parameter Meaning

QER\Person\UseCentralPassword

This configuration parameter specifies whether the employee's central password is used in the user accounts. The employee’s central password is automatically mapped to the employee’s user account in all permitted target systems. This excludes privileged user accounts, which are not updated.

QER\Person\UseCentralPassword\PermanentStore

This configuration parameter controls the storage period for central passwords. If the parameter is set, the employee’s central password is permanently stored. If the parameter is not set, the central password is only used for publishing to existing target system specific user accounts and is subsequently deleted from the One Identity Manager database.

TargetSystem\AzureAD\Accounts\
InitialRandomPassword

This configuration parameter specifies whether a random generated password is issued when a new user account is added. The password must contain at least those character sets that are defined in the password policy.

You have the following possible options for issuing an initial password for a new Azure Active Directory user account.

  1. User the employee's central password. The employee’s central password is mapped to the user account password.
    • Set the configuration parameter "QER\Person\UseCentralPassword" in the Designer.

      If the configuration parameter "QER\Person\UseCentralPassword" is set, the employee's central password is automatically mapped to an employee's user account in each of the target systems. This excludes privileged user accounts, which are not updated.

    • Use the configuration parameter "QER\Person\UseCentralPassword\PermanentStore" in the Designer to specify whether an employee’s central password is permanently saved in the One Identity Manager database or only until the password has been published in the target system.

    The password policy "Employee central password policy" is used to format the central password.

    IMPORTANT: Ensure that the password policy "Employee central password policy" does not violate the target system specific password requirements.

  2. Create user accounts manually and enter a password in their master data.
  3. Specify an initial password to be used when user accounts are created automatically.
    • Apply the target system specific password policies and enter an initial password in the password policies.
  4. Assign a randomly generated initial password to enter when you create user accounts.

    • Set the configuration parameter "TargetSystem\AzureAD\Accounts\InitialRandomPassword" in the Designer.
    • Apply target system specific password policies and define the character sets that the password must contain.
    • Specify which employee will receive the initial password by email.
Related Topics

Email Notifications about Login Data

Email Notifications about Login Data

Table 18: Configuration Parameters for Notifications about Login Data
Configuration parameter Meaning

TargetSystem\AzureAD\Accounts\
InitialRandomPassword\SendTo

This configuration parameter specifies to which employee the email with the random generated password should be sent (manager cost center/department/location/business role, employee’s manager or XUserInserted). If no recipient can be found, the password is sent to the address stored in the configuration parameter "TargetSystem\AzureAD\DefaultAddress".

TargetSystem\AzureAD\Accounts\
InitialRandomPassword\SendTo\
MailTemplateAccountName

This configuration parameter contains the name of the mail template sent to inform users about their initial login data (name of the user account). Use the mail template "Employee - new account created".

TargetSystem\AzureAD\Accounts\
InitialRandomPassword\SendTo\
MailTemplatePassword

This configuration parameter contains the name of the mail template sent to inform users about their initial login data (initial password). Use the mail template "Employee - initial password for new user account".

TargetSystem\AzureAD\DefaultAddress

The configuration parameter contains the recipient's default email address for sending notifications about actions in the target system.

You can configure the login information for new user accounts to be sent by email to a specified person. In this case, two messages are sent with the user name and the initial password. Mail templates are used to generate the messages. The mail text in a mail template is defined in several languages, which means the recipient’s language can be taken into account when the email is generated. Mail templates are supplied in the default installation with which you can configure the notification procedure.

To use email notifications about login data

  1. Ensure that the email notification system is configured in One Identity Manager. For more detailed information, see the .One Identity Manager Configuration Guide
  2. Enable the configuration parameter "Common\MailNotification\DefaultSender" in the Designer and enter the email address for sending the notification.
  3. Ensure that all employees have a default email address. Notifications are sent to this address. For more detailed information, see the .One Identity Manager Identity Management Base Module Administration Guide
  4. Ensure that a language culture can be determined for all employees. Only then can they receive email notifications in their own language. For more detailed information, see the .One Identity Manager Identity Management Base Module Administration Guide

When a randomly generated password is issued for the new user account, the initial login data for a user account is sent by email to a previously specified person.

To send initial login data by email

  1. Set the configuration parameter "TargetSystem\AzureAD\Accounts\InitialRandomPassword" in the Designer.
  2. Set the configuration parameter "TargetSystem\AzureAD\Accounts\InitialRandomPassword\SendTo" in the Designer and enter the message recipient as the value.
  3. Set the configuration parameter "TargetSystem\AzureAD\Accounts\InitialRandomPassword\SendTo\MailTemplateAccountName" in the Designer.

    By default, the message sent uses the mail template "Employee - new account created". The message contains the name of the user account.

  4. Set the confiugration parameter "TargetSystem\AzureAD\Accounts\InitialRandomPassword\SendTo\MailTemplatePassword" in the Designer.

    By default, the message sent uses the mail template "Employee - initial password for new user account". The message contains the initial password for the user account.

TIP: Change the value of the configuration parameter in order to use custom mail templates for these mails.

Target System Managers

For more detailed information about implementing and editing application roles, see the One Identity Manager Application Roles Administration Guide.

Implementing Application Roles for Target System Managers
  1. The One Identity Manager administrator assigns employees to be target system managers.
  2. These target system managers add employees to the default application role for target system managers.

    The default application role target system managers are entitled to edit all tenants in One Identity Manager.

  3. Target system managers can authorize more employees as target system managers, within their scope of responsibilities and create other child application roles and assign individual tenants.
Table 19: Default Application Roles for Target System Managers
User Task

Target SystemClosed Managers

 

Target system managers must be assigned to the application role Target systems | Azure Active Directory or a sub application role.

Users with this application role:

  • Assume administrative tasks for the target system.
  • Create, change or delete target system objects, like user accounts or groups.
  • Edit password policies for the target system.
  • Prepare groups for adding to the IT Shop.
  • Configure synchronization in the Synchronization EditorClosed and defines the mapping for comparing target systems and One Identity Manager.
  • Edit the synchronization's target system types and outstanding objects.
  • Authorize other employees within their area of responsibility as target system managers and create child application roles if required.

To initially specify employees to be target system administrators

  1. Log in to the Manager as One Identity Manager administrator (application role Base role | Administrators)
  2. Select the category One Identity Manager Administration | Target systems | Administrators.
  3. Select Assign employees in the task view.
  4. Assign the employee you want and save the changes.

To add the first employees to the default application as target system managers.

  1. Log yourself into the Manager as target system administrator (application role Target systems | Administrator).
  2. Select the category One Identity Manager Administration | Target systems | Azure Active Directory.
  3. Select Assign employees in the task view.
  4. Assign the employees you want and save the changes.

To authorize other employees as target system managers when you are a target system manager

  1. Login to the Manager as target system manager.
  2. Select the application role in the category Azure Active Directory | Basic configuration data | Target system managers.
  3. Select Assign employees in the task view.
  4. Assign the employees you want and save the changes.

To define target system managers for individual tenants.

  1. Login to the Manager as target system manager.
  2. Select the category Azure Active Directory | Tenants.
  3. Select the tenant from the result list.
  4. Select Change master data in the task view.
  5. Select the application role on the General tab in the Target system manager menu.

    - OR -

    Click next to the Target system manager menu to create a new application role.

    • Enter the application role name and assign the parent application role Target system | Azure Active Directory.
    • Click OK to add the new application role.
  6. Save the changes.
  7. Assign the application role to employees, who are authorized to edit the tenant in One Identity Manager.
Related Topics

Editing a Server

Servers must know your server functionality in order to handle Azure Active Directory specific processes in One Identity Manager. For example, the synchronization server.

You have several options for defining a server's functionality:

  • Create an entry for the Job serverClosed in the category Base Data | Installation | Job server in the Designer. For detailed information, see the One Identity Manager Configuration Guide.

  • Select an entry for the Job server in the category Manager | Basic configuration data | Server in the Azure Active Directory and edit the Job server master data.

    Use this task if the Job server has already been declared in One Identity Manager and you want to configure special functions for the Job server.

NOTE: One Identity Manager Service must be installed, configured and started in order for a server to execute its function in the One Identity Manager network. Proceed as follows in the One Identity Manager Installation Guide.

To edit a Job server and its functions

  1. Select the category Azure Active Directory | Basic configuration data | Server in the Manager.
  2. Select the Job server entry in the result list.
  3. Select Change master data in the task view.
  4. Edit the Job server's master data.
  5. Select Assign server functions in the task view and specify server functionality.
  6. Save the changes.
Detailed information about this topic
Related Documents