Chat now with support
Chat with Support

Identity Manager 8.0 - Administration Guide for Connecting to Azure Active Directory

Managing Azure Active Directory Environments Setting Up Synchronization with an Azure Active Directory Tenant Base Data for Managing Azure Active Directory Azure Active Directory Core Directories Azure Active Directory user accounts Azure Active Directory groups Azure Active Directory Administrator Roles Azure Active Directory Subscriptions and Service Plans
Azure Active Directory Subscriptions Disabled Azure Active Directory Service Plan
Reports about Azure Active Directory Objects Appendix: Configuration Parameters for Managing Azure Active Directory Appendix: Default Project Template for Azure Active Directory

Assigning Extended Properties to an Azure Active Directory User Account

Assign Extended Properties to an Azure Active Directory User Account

Extended properties are meta objects that cannot be mapped directly in the One Identity Manager, for example, operating codes, cost codes or cost accounting areas.

To specify extended properties for a user account

  1. Select the category Azure Active Directory | User accounts.
  2. Select the user account in the result list.
  3. Select Assign extended properties in the task view.
  4. Assign extended properties in Add assignments.

    - OR -

    Remove assignments to extended properties in Remove assignments.

  5. Save the changes.

For more detailed information about using extended properties, see the One Identity Manager Identity Management Base Module Administration Guide.

Automatic Assignment of Employees to Azure Active Directory User Accounts

Automatic Assignment of Employees to Azure Active Directory User Accounts

Table 32: Configuration Parameters for Automatic Employee Assignment
Configuration parameter Meaning

TargetSystem\AzureAD\PersonAutoFullsync

This configuration parameter specifies the mode for automatic employee assignment for user accounts added to or updated in the database through synchronization.

TargetSystem\AzureAD\PersonAutoDefault

This configuration parameter specifies the mode for automatic employee assignment for user accounts added to the database outside synchronization.

TargetSystem\AzureAD\PersonExcludeList

List of all user accounts for which automatic employee assignment should not take place. Names given in a pipe (|) delimited list that is handled as a regular search pattern.

Example:

ADMINISTRATOR

TargetSystem\AzureAD\
PersonAutoDisabledAccounts

This configuration parameters specifies whether employees are automatically assigned to disable user accounts. User accounts do not obtain an account definition.

When you add a user account, an existing employee can be assigned automatically or added if necessary. In the process, the employee master data is created based for existing user master data. This mechanism can follow on after a new user account has been created manually or through synchronization. Define criteria for finding employees to apply to automatic employee assignment. If a user account is linked to an employee through the current mode, the user account is given, through an internal process, the default manage level of the account definition entered in the user account's target system. You can customize user account properties depending on how the behavior of the manage level is defined.

If you run this procedure during working hours, automatic assignment of employees to user accounts takes place from that moment onwards. If you disable the procedure again later, the changes only affect user accounts added or updated after this point in time. Existing employee assignment to user accounts remain intact.

NOTE: It is not recommended to assign employees using automatic employee assignment in the case of administrative user accounts. Use the task Change master data to assign employees to administrative user account for the respective user account.

Run the following tasks to assign employees automatically.

  • If employees can be assigned by user accounts during synchronization, set the parameter "TargetSystem\AzureAD\PersonAutoFullsync" in the Designer and select the required mode.
  • If employees can be assigned by user accounts during synchronization, set the parameter "TargetSystem\AzureAD\PersonAutoDefault" in the Designer and select the mode.
  • Specify the user accounts in the configuration parameter "TargetSystem\AzureAD\PersonExcludeList" which must not be assigned automatically to employees.

    Example:

    Administrator

  • Use the configuration parameter "TargetSystem\AzureAD\PersonAutoDisabledAccounts" to specify whether employees can be automatically assigned to disabled user accounts. User accounts do not obtain an account definition.
  • Assign an account definition to the tenant. Ensure the manage level to be used is entered as default automation level.
  • Define the search criteria for employees assigned to tenants.

NOTE:

The following applies for synchronization:

  • Automatic employee assignment takes effect if user accounts are added or updated.

The following applies outside synchronization:

  • Automatic employee assignment takes effect if user accounts are added.

NOTE: Following synchronization, employees are automatically created for user accounts in the default installation. If there are no account definitions for the tenant at the time of synchronization, user accounts are linked to employees. However, account definitions are not assigned. The user accounts are, therefore, in a "Linked" state.

To select user accounts through account definitions

  1. Create an account definition.
  2. Assign an account definition to the tenant.
  3. Assign the account definition and manage level to the user accounts in a "linked" state.
    1. Select the category Azure Active Directory | User accounts | Linked but not configured | <client>.
    2. Select the task Assign account definition to linked accounts.

For more detailed information about assigning employees automatically, see the One Identity Manager Target SystemClosed Base Module Administration Guide.

Related Topics

Editing Search Criteria for Automatic Employee Assignment

Criteria for employee assignment are defined in the tenant. In this case, you specify which user account properties must match the employee’s properties such that the employee can be assigned to the user account. You can limit search criteria further by using format definitions. The search criteria are written in XML notation in the column "Search criteria for automatic employee assignment" (AccountToPersonMatchingRule) of the AADOrganization table.

Search criteria are evaluated when employees are automatically assigned to user accounts. Furthermore, you can create a suggestion list for assignments of employees to user accounts based on the search criteria and make the assignment directly.

NOTE: When the employees are assigned to user accounts on the basis of search criteria, user accounts are given the default manage level of the account definition entered in the user account's target system. You can customize user account properties depending on how the behavior of the manage level is defined.

It is not recommended to make assignment to administrative user accounts based on search criteria. Use the task Change master data to assign employees to administrative user account for the respective user account.

NOTE: One Identity Manager supplies a default mapping for employee assignment. Only carry out the following steps when you want to customize the default mapping.

To specify criteria for employee assignment

  1. Select the category Azure Active Directory | Tenants.
  2. Select the tenant from the result list.
  3. Select Define search criteria for employee assignment in the task view.
  4. Specify which user account properties must match with which employee so that the employee is linked to the user account.
    Table 33: Default Search Criteria for User Accounts and Contacts
    Apply to Column on Employee Column on User Account
    Azure Active Directory user accounts Central user account (CentralAccount) Alias (MailNickName)
  5. Save the changes.
Direct Assignment of Employees to User Accounts Based on a Suggestion List

You can create a suggestion list in the "Assignments" view for assignments of employees to user accounts based on the search criteria. User accounts are grouped in different views for this.

Table 34: Manual Assignment View
View Description
Suggested assignments This view lists all user accounts to which One Identity Manager can assign an employee. All employees are shown who were found using the search criteria and can be assigned.
Assigned user accounts This view lists all user accounts to which an employee is assigned.
Without employee assignment This view lists all user accounts to which no employee is assigned and for which no employee was found using the search criteria.

TIP: By double-clicking on an entry in the view, you can view the user account and employee master data.

To apply search criteria to user accounts

  • Click Reload.

    All possible assignments based on the search criteria are found in the target system for all user accounts. The three views are updated.

To assign employees directly over a suggestion list

  1. Click Suggested assignments.
    1. Click Select for all user accounts to be assigned to the suggested employee. Multi-select is possible.
    2. Click Assign selected.
    3. Confirm the security prompt with Yes.

      The selected user accounts are assigned to the employees found using the search criteria.

    – OR –

  2. Click No employee assignment.
    1. Click Select employee... for the user account to which you want to assign the employee. Select an employee from the menu.
    2. Click Select for all user accounts to which you want to assign the selected employees. Multi-select is possible.
    3. Click Assign selected.
    4. Confirm the security prompt with Yes.

      This assigns the selected user accounts to the employees shown in the "Employee" column.

To remove assignments

  1. Click Assigned user accounts.
    1. Click Select for all user accounts whose employee assignment you want to remove. Multi-select is possible.
    2. Click Delete selected.
    3. Confirm the security prompt with Yes.

      The assigned employees are deleted from the selected user accounts.

For more detailed information about defining search criteria, see the One Identity Manager Target SystemClosed Base Module Administration Guide.

Related Topics

Disabling Azure Active Directory User Accounts

Disabling Azure Active Directory User Accounts

Table 35: Configuration Parameter for User Accounts
Configuration parameter Meaning
QER\Person\TemporaryDeactivation This configuration parameter specifies whether user accounts for an employee are locked if the employee is temporarily or permanently disabled.

The way you disable user accounts depends on how they are managed.

Scenario:
  • The user account is linked to employees and is managed through account definitions.

User accounts managed through account definitions are disabled when the employee is temporarily or permanently disabled. The behavior depends on the user account manage level. User accounts with the manage level "Full managed" are disabled depending on the account definition settings. For user accounts with another manage level, modify the column template AADUser.AccountDisabled accordingly.

Scenario:
  • The user accounts are linked to employees. No account definition is applied.

User accounts managed through user account definitions are disabled when the employee is temporarily or permanently disabled. The behavior depends on the configuration parameter "QER\Person\TemporaryDeactivation".

  • If the configuration parameter is set, the employee’s user accounts are disabled if the employee is permanently or temporarily disabled.
  • If the configuration parameter is not set, the employee’s properties do not have any effect on the associated user accounts.

To lock a user account when the configuration parameter is disabled

  1. Select the category Azure Active Directory | User accounts.
  2. Select the user account in the result list.
  3. Select Change master data in the task view.
  4. Set the option Account is disabled on the General tab.
  5. Save the changes.
Scenario:
  • User accounts not linked to employees.

To lock a user account, which is not linked to an employee

  1. Select the category Azure Active Directory | User accounts.
  2. Select the user account in the result list.
  3. Select Change master data in the task view.
  4. Set the option Account is disabled on the General tab.
  5. Save the changes.
Related Topics
Related Documents