Chat now with support
Chat with Support

Identity Manager 9.1 - Administration Guide for Connecting to Azure Active Directory

Managing Azure Active Directory environments Synchronizing an Azure Active Directory environment
Setting up initial synchronization with an Azure Active Directory tenant Adjusting the synchronization configuration for Azure Active Directory environments Running synchronization Tasks following synchronization Troubleshooting Ignoring data error in synchronization Pausing handling of target system specific processes (Offline mode)
Managing Azure Active Directory user accounts and employees Managing memberships in Azure Active Directory groups Managing Azure Active Directory administrator roles assignments Managing Azure Active Directory subscription and Azure Active Directory service plan assignments
Displaying enabled and disabled Azure Active Directory service plans forAzure Active Directory user accounts and Azure Active Directory groups Assigning Azure Active Directory subscriptions to Azure Active Directory user accounts Assigning disabled Azure Active Directory service plans to Azure Active Directory user accounts Inheriting Azure Active Directory subscriptions based on categories Inheritance of disabled Azure Active Directory service plans based on categories
Login information for Azure Active Directory user accounts Mapping of Azure Active Directory objects in One Identity Manager
Azure Active Directory core directories Azure Active Directory user accounts Azure Active Directory groups Azure Active Directory administrator roles Azure Active Directory subscriptions and Azure Active Directory service principals Disabled Azure Active Directory service plans Azure Active Directory app registrations and Azure Active Directory service principals Reports about Azure Active Directory objects
Handling of Azure Active Directory objects in the Web Portal Recommendations for federations Basic configuration data for managing an Azure Active Directory environment Troubleshooting Configuration parameters for managing an Azure Active Directory environment Default project template for Azure Active Directory Editing Azure Active Directory system objects Azure Active Directory connector settings

Editing main data of disabled Azure Active Directory service plans

To edit disabled Azure Active Directory service plan main data

  1. In the Manager, select the Azure Active Directory > Disabled service plans category.

  2. Select the disabled service plan from the result list.

  3. Select the Change main data task.

  4. Edit the disabled service plan's main data.

  5. Save the changes.

Table 38: Disabled service plan main data

Property

Description

Subscription

Name of the Azure Active Directory subscription.

Service plan

Name of the Azure Active Directory service plan.

IT Shop

Specifies whether the service plan can be requested through the IT Shop. The disabled service plan can be requested by your staff though the Web Portal and granted through a defined approval process. The disabled service plan can still be assigned directly to hierarchical roles.

Only for use in IT Shop

Specifies whether the disabled service plan can only be requested through the IT Shop. The disabled service plan can be requested by your staff though the Web Portal and granted through a defined approval process. The disabled service plan may not be assigned directly to hierarchical roles.

Service item

Service item data for requesting the disabled service plan through the IT Shop.

Category

Categories for disabled service plan inheritance. User accounts can selectively inherit disabled Azure Active Directory service plans. To do this, disabled service plans and Azure Active Directory user accounts are divided into categories. Use this menu to allocate one or more categories to the disabled service plan.

Related topics

Assigning extended properties to disabled Azure Active Directory service plans

Extended properties are meta objects, such as operating codes, cost codes, or cost accounting areas that cannot be mapped directly in One Identity Manager.

For more information about using extended properties, see the One Identity Manager Identity Management Base Module Administration Guide.

To specify extended properties for a disabled Azure Active Directory service plan

  1. In the Manager, select the Azure Active Directory > Disabled service plans category.

  2. Select the disabled service plan from the result list.

  3. Select Assign extended properties.

  4. In the Add assignments pane, assign extended properties.

    TIP: In the Remove assignments pane, you can remove assigned extended properties.

    To remove an assignment

    • Select the extended property and double-click .

  5. Save the changes.

Displaying the disabled Azure Active Directory service plan overview

Use this task to obtain an overview of the most important information about a disabled Azure Active Directory service plan.

To obtain an overview of a disabled Azure Active Directory service plan

  1. In the Manager, select the Azure Active Directory > Disabled service plans category.

  2. Select the disabled service plan from the result list.

  3. Select the Disabled Azure Active Directory service plan overview task.

Related topics

Azure Active Directory app registrations and Azure Active Directory service principals

When an application is registered in an Azure Active Directory tenant, it creates an associated Azure Active Directory service principal. There are so-called app roles defined for app registrations. Azure Active Directory users, Azure Active Directory groups, or Azure Active Directory service principals can use app roles to provide permissions or functions for the application.

For more information about integrating applications in Azure Active Directory, see the Azure Active Directory documentation from Microsoft.

Information about Azure Active Directory app registrations, Azure Active Directory service principals, and app roles within an Azure Active Directory tenant is loaded into One Identity Manager during synchronization.

If an Azure Active Directory application is used in an Azure Active Directory tenant that is registered in another Azure Active Directory tenant, only the Azure Active Directory service principal and not the Azure Active Directory app registration is loaded into One Identity Manager.

You cannot create new Azure Active Directory app registrations, Azure Active Directory service principals, and app roles in One Identity Manager but you can specify owners of app registrations and service principals and create or delete app roles in One Identity Manager.

Detailed information about this topic
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating