Chat now with support
Chat with Support

Identity Manager 8.2.1 - Administration Guide for Connecting to Azure Active Directory

Managing Azure Active Directory environments Synchronizing an Azure Active Directory environment
Setting up initial synchronization with an Azure Active Directory tenant Adjusting the synchronization configuration for Azure Active Directory environments Running synchronization Tasks following synchronization Troubleshooting Ignoring data error in synchronization
Managing Azure Active Directory user accounts and employees Managing memberships in Azure Active Directory groups Managing Azure Active Directory administrator roles assignments Managing Azure Active Directory subscription and Azure Active Directory service plan assignments
Displaying enabled and disabled Azure Active Directory service plans forAzure Active Directory user accounts and Azure Active Directory groups Assigning Azure Active Directory subscriptions to Azure Active Directory user accounts Assigning disabled Azure Active Directory service plans to Azure Active Directory user accounts Inheriting Azure Active Directory subscriptions based on categories Inheritance of disabled Azure Active Directory service plans based on categories
Login information for Azure Active Directory user accounts Mapping of Azure Active Directory objects in One Identity Manager
Azure Active Directory core directories Azure Active Directory user accounts Azure Active Directory groups Azure Active Directory administrator roles Azure Active Directory subscriptions and Azure Active Directory service principals Disabled Azure Active Directory service plans Azure Active Directory applications and Azure Active Directory service principals Reports about Azure Active Directory objects
Handling of Azure Active Directory objects in the Web Portal Recommendations for federations Basic configuration data for managing an Azure Active Directory environment Troubleshooting Configuration parameters for managing an Azure Active Directory environment Default project template for Azure Active Directory Editing Azure Active Directory system objects Azure Active Directory connector settings

Assigning employees automatically to Azure Active Directory user accounts

When you add a user account, an existing employee can automatically be assigned to it. If necessary, a new employee can be created. The identity's main data is created on the basis of existing user account main data. This mechanism can be triggered after a new user account is created either manually or through synchronization.After synchronization, identities are automatically assigned to all new user accounts. If no matching identity can be found, a new identity is created using existing user main data.

Define criteria for finding employees to apply to automatic employee assignment. If a user account is linked to an employee through the current mode, the user account is given, through an internal process, the default manage level of the account definition entered in the user account's target system. You can customize user account properties depending on how the behavior of the manage level is defined.

If you run this procedure during working hours, automatic assignment of employees to user accounts takes place from that moment onwards. If you disable the procedure again later, the changes only affect user accounts added or updated after this point in time. Existing employee assignments to user accounts remain intact.

NOTE: It is not recommended to assign employees using automatic employee assignment in the case of administrative user accounts. Use Change main data to assign employees to administrative user accounts for the respective user account.

For more information about assigning employees automatically, see the One Identity Manager Target System Base Module Administration Guide.

Run the following tasks to assign employees automatically:

  • If you want employees to be assigned during the synchronization of user accounts, in the Designer, set the TargetSystem | AzureAD | PersonAutoFullsync configuration parameter and select the required mode.

  • If you want employees to be assigned outside synchronization in the Designer, set the TargetSystem | AzureAD | PersonAutoDefault configuration parameter and select the required mode.

  • In the TargetSystem | AzureAD | PersonExcludeList configuration parameter, define the user accounts for which no automatic assignment to employees is to take place.

    Example:

    ADMINISTRATOR|GUEST

    TIP: You can edit the value of the configuration parameter in the Exclude list for automatic employee assignment dialog.

  • Use the TargetSystem | AzureAD | PersonAutoDisabledAccounts configuration parameter to specify whether employees can be automatically assigned to disabled user accounts. User accounts do not obtain an account definition.

  • Assign an account definition to the tenant. Ensure that the manage level to be used is entered as the default manage level.

  • Define the search criteria for employee assignment in the tenant.

NOTE:

The following applies for synchronization:

  • Automatic employee assignment takes effect if user accounts are added or updated.

The following applies outside synchronization:

  • Automatic employee assignment takes effect if user accounts are added.

NOTE:

In the default installation, after synchronizing, employees are automatically created for the user accounts. If an account definition for the tenant is not known at the time of synchronization, user accounts are linked with employees. However, account definitions are not assigned. The user accounts are therefore in a Linked state.

To manage the user accounts using account definitions, assign an account definition and a manage level to these user accounts.

For more information, see Managing Azure Active Directory user accounts through account definitions.

Related topics

Editing search criteria for automatic employee assignment

NOTE: One Identity Manager supplies a default mapping for employee assignment. Only carry out the following steps when you want to customize the default mapping.

The criteria for employee assignments are defined for the tenant. You specify which user account properties must match the employee’s properties such that the employee can be assigned to the user account. You can limit search criteria further by using format definitions.

The search criterion is written in XML notation to the Search criteria for automatic employee assignment column (AccountToPersonMatchingRule) in the AADOrganization table.

Search criteria are evaluated when employees are automatically assigned to user accounts. Furthermore, you can create a suggestion list for assignments of employees to user accounts based on the search criteria and make the assignment directly.

NOTE: Object definitions for user accounts that can have search criteria applied to them are predefined. For example, if you require other objects definitions that limit a preselection of user accounts, set up the respective custom object definitions in the Designer. For more information, see the One Identity Manager Configuration Guide.

To specify criteria for employee assignment

  1. In the Manager, select the Azure Active Directory > Tenants category.

  2. Select the tenant in the result list.

  3. Select the Define search criteria for employee assignment task.

  4. Specify which user account properties must match with which employee so that the employee is linked to the user account.

    Table 11: Default search criteria for user accounts and contacts
    Apply to Column for employee Column for user account
    Azure Active Directory user accounts Central user account (CentralAccount) Alias (MailNickName)
  5. Save the changes.

For more information about defining search criteria, see the One Identity Manager Target System Base Module Administration Guide.

Related topics

Finding employees and directly assigning them to user accounts

Based on the search criteria, you can create a suggestion list for the assignment of employees to user accounts and make the assignment directly. User accounts are grouped in different views for this.

Table 12: Manual assignment view

View

Description

Suggested assignments

This view lists all user accounts to which One Identity Manager can assign an employee. All employees are shown who were found using the search criteria and can be assigned.

Assigned user accounts

This view lists all user accounts to which an employee is assigned.

Without employee assignment

This view lists all user accounts to which no employee is assigned and for which no employee was found using the search criteria.

To apply search criteria to user accounts

  1. In the Manager, select the Azure Active Directory > Tenants category.

  2. Select the tenant in the result list.

  3. Select the Define search criteria for employee assignment task.

  4. At the bottom of the form, click Reload.

    All possible assignments based on the search criteria are found in the target system for all user accounts. The three views are updated.

TIP: By double-clicking on an entry in the view, you can view the user account and employee main data.

The assignment of employees to user accounts creates connected user accounts (Linked state). To create managed user accounts (Linked configured state), you can assign an account definition at the same time.

To assign employees directly over a suggestion list

  • Click Suggested assignments.

    1. Click the Selection box of all user accounts to which you want to assign the suggested employees. Multi-select is possible.

    2. (Optional) Select an account definition in the Assign this account definition menu, and select a manage level in the Assign this account manage level menu.

    3. Click Assign selected.

    4. Confirm the security prompt with Yes.

      The employees determined using the search criteria are assigned to the selected user accounts. If an account definition was selected, this is assigned to all selected user accounts.

    - OR -

  • Click No employee assignment.

    1. Click Select employee for the user account to which you want to assign an employee. Select an employee from the menu.

    2. Click the Selection box of all user accounts to which you want to assign the selected employees. Multi-select is possible.

    3. (Optional) Select an account definition in the Assign this account definition menu, and select a manage level in the Assign this account manage level menu.

    4. Click Assign selected.

    5. Confirm the security prompt with Yes.

      The employees displayed in the Employee column are assigned to the selected user accounts. If an account definition was selected, this is assigned to all selected user accounts.

To remove assignments

  • Click Assigned user accounts.

    1. Click the Selection box of all the user accounts you want to delete the employee assignment from. Multi-select is possible.

    2. Click Remove selected.

    3. Confirm the security prompt with Yes.

      The assigned employees are removed from the selected user accounts.

Changing manage levels for Azure Active Directory user accounts

The default manage level is applied if you create user accounts using automatic employee assignment. You can change a user account manage level later.

To change the manage level for a user account

  1. In the Manager, select the Azure Active Directory > User accounts category.

  2. Select the user account in the result list.

  3. Select the Change main data task.

  4. Select the manage level in the Manage level list on the General tab.

  5. Save the changes.
Related topics
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating