立即与支持人员聊天
与支持团队交流

Active Roles 7.6 - Administration Guide

Introduction About Active Roles Getting Started Rule-based Administrative Views Role-based Administration
Access Templates as administrative roles Access Template management tasks Examples of use Deployment considerations Windows claims-based Access Rules
Rule-based AutoProvisioning and Deprovisioning
About Policy Objects Policy Object management tasks Policy configuration tasks
Property Generation and Validation User Logon Name Generation Group Membership AutoProvisioning E-mail Alias Generation Exchange Mailbox AutoProvisioning AutoProvisioning for SaaS products OneDrive Provisioning Home Folder AutoProvisioning Script Execution Office 365 and Azure Tenant Selection User Account Deprovisioning Office 365 Licenses Retention Group Membership Removal Exchange Mailbox Deprovisioning Home Folder Deprovisioning User Account Relocation User Account Permanent Deletion Group Object Deprovisioning Group Object Relocation Group Object Permanent Deletion Notification Distribution Report Distribution
Deployment considerations Checking for policy compliance Deprovisioning users or groups Restoring deprovisioned users or groups Container Deletion Prevention policy Picture management rules Policy extensions
Workflows
Understanding workflow Workflow activities overview Configuring a workflow
Creating a workflow definition Configuring workflow start conditions Configuring workflow parameters Adding activities to a workflow Configuring an Approval activity Configuring a Notification activity Configuring a Script activity Configuring an If-Else activity Configuring a Stop/Break activity Configuring an Add Report Section activity Configuring a Search activity Configuring CRUD activities Configuring a Save Object Properties activity Configuring a Modify Requested Changes activity Enabling or disabling an activity Enabling or disabling a workflow Using the initialization script
Example: Approval workflow E-mail based approval Automation workflow Activity extensions
Temporal Group Memberships Group Family Dynamic Groups Active Roles Reporting Management History
Understanding Management History Management History configuration Viewing change history
Workflow activity report sections Policy report items Active Roles internal policy report items
Examining user activity
Entitlement Profile Recycle Bin AD LDS Data Management One Identity Starling Management Managing One Identity Starling Connect Configuring linked mailboxes with Exchange Resource Forest Management Configuring remote mailboxes for on-premises users Azure AD, Office 365, and Exchange Online management
Configuring Active Roles to manage hybrid AD objects Managing Hybrid AD Users Unified provisioning policy for Azure O365 Tenant Selection, Office 365 License Selection, and Office 365 Roles Selection, and OneDrive provisioning Office 365 roles management for hybrid environment users Managing Office 365 Contacts Managing Hybrid AD Groups Managing Office 365 Groups Managing Azure Security Groups Managing cloud-only distribution groups Managing cloud-only Azure users Managing cloud-only Azure guest users Managing cloud-only Azure contacts Changes to Active Roles policies for cloud-only Azure objects Managing room mailboxes Managing cloud-only shared mailboxes
Managing Configuration of Active Roles
Connecting to the Administration Service Adding and removing managed domains Using unmanaged domains Evaluating product usage Creating and using virtual attributes Examining client sessions Monitoring performance Customizing the console Using Configuration Center Changing the Active Roles Admin account Enabling or disabling diagnostic logs Active Roles Log Viewer
SQL Server Replication Appendix A: Using regular expressions Appendix B: Administrative Template Appendix C: Communication ports Appendix D: Active Roles and supported Azure environments [[[Missing Linked File System.LinkedTitle]]] Appendix E: Active Roles integration with other One Identity and Quest products Appendix F: Active Roles integration with Duo Appendix G: Active Roles integration with Okta

Performing bulk operation

Active Roles Web interface enables you to perform bulk attributes operation for multiple users at a time.

To perform bulk attribute operation

  1. On the Navigation bar, click Directory Management.
  2. On the Views tab in the Browse pane, click the required container.
  3. From the list of objects displayed for the selected container, select the required users for which you need to perform bulk attributes operation.

    The batch operations that can be performed on users are displayed in the Command pane.

  4. In the Command pane, click Update object attributes.

    The Update object attributes window is displayed, which lists the user attributes that can be selected for bulk operation.

  1. From the Attribute List tab, select the required attribute on which you want to perform the bulk operation, and click the + symbol.
  2. On the Update object attributes dialog box that is displayed, in the New Value field, enter a value for the attribute, and click OK.

    The selected attribute with the updated value is displayed in the Select attribute table.

  1. Repeat step 5 and step 6 to select and update more attributes, and then click Next.

    The Preview tab | Operation Summary section displays the summary of the selected attributes with the new values to be updated after the bulk operation is performed. To export the details, click Export as CSV.

  1. Click Finish, to complete the bulk operation on the selected attributes for the multiple users.

NOTE:

Performing bulk users password reset operation

Active Roles Web interface enables you to reset the password for multiple users at a time.

To perform bulk users password reset operation

  1. On the Navigation bar, click Directory Management.
  2. On the Views tab in the Browse pane, click the required container.
  3. From the list of objects displayed for the selected container, select the required users for which you need to perform password reset operation.

    The batch operations that can be performed on users are displayed in the Command pane.

  4. In the Command pane, click Reset Password.

    The Reset Password window is displayed.

  1. On the General tab dialog box, click Generate to generate a new password for the selected users.
  2. Under Account options, select the check box corresponding to the required rule to be applied for change of password, and then click Save.

    The password reset gets completed and the changes can be viewed on the selected user's Change History tab.

Active Roles service account minimum permissions

As Active Roles performs operations on objects on behalf of delegated users, the Active Roles service account which is used to manage the Active Directory domain requires adequate permissions. One Identity recommends to manage the domain using an account which is a member of the Domain Admins role group. If this configuration is not used, then guidance and documentation provided by One Identity may not be relevant.

Specify separate accounts for service and for managing the domain to separate the tasks performed by the service account from domain management. In this configuration scenario, the service account can be configured to run with the minimum permissions specified below, but the proxy account should be a member of the Domain Admins role group to stay within the One Identity Active Roles support model.

The service account credential has five main roles:

  • Access to the Administration Service computer

  • Service publication in Active Directory

  • All script modules are executed under the security context of the Active Roles Service Account

  • Connecting to the Microsoft SQL database

  • Synchronizing native permissions to Active Directory, if Active Roles is configured

Access to the Administration Service computer

The service account must be a member of the Administrators group on the computer running the Administration Service.

Service publication in Active Directory

The Administration Service attempts to publish itself in the Active Directory. This enables Active Roles clients to automatically discover the Administration Service. This functionality is non-critical and if permissions are not granted, this will not prevent the service from functioning as expected, instead Active Roles clients won't automatically discover the Active Roles Administration Service. They will still be able to connect if the service name or IP address is available. Service publication requires that the service account have the following permissions on the Aelita sub-container of the System container in the domain of the computer running the Administration Service:

  • Create Container Objects

  • Create serviceConnectionPoint Objects

  • Delete the serviceConnectionPoint objects in the System container

  • Write permission for the keywords attribute of the serviceConnectionPoint objects in the System container

Along with these permissions, the service account (or the override account, if specified), must have these permissions on the Aelita sub-container of the System container in every managed domain. If an account has the domain administrator rights, then it has the required permissions by default. Otherwise, provide the permissions to the account by using the ADSI Edit console. The following instructions apply to the ADSI Edit console that ships with Windows Server 2016, Windows Server 2019, or Windows Server 2022.

To grant permissions for Administration Service publication in Active Directory

  1. Open the ADSI Edit console and connect to the Domain naming context.

  2. In the console tree, expand the System container, right-click the Aelita subcontainer, and then click Properties. If the Aelita container does not exist, create it: right-click System, point to New, click Object, and then, in the Create Object wizard, select the Container class and specify Aelita for the cn value.

  3. On the Security tab in the Properties dialog box, click Advanced.

  4. On the Permissions tab in the Advanced Security Settings dialog box, click Add.

  5. On the Permission Entry page, configure the permission entry:

    • Click the Select a principal link, and select the desired account.

    • Verify that the Type box indicates Allow.

    • Verify that the Applies onto box indicates This object and all descendant objects.

    • In the Permissions area, select the Create container objects and Create serviceConnectionPoint objects check boxes.

    • Click OK
  6. Click OK to close the Advanced Security Settings dialog box, and then click OK to close the Properties dialog box.

All script modules are executed under the security context of the Active Roles Service Account

The permissions needed by custom scripts will vary according to the needs of the scripts, and ideally should be reviewed on a case-by-case basis as a Best Practise security model.

Connecting to the Microsoft SQL database

In some configurations, assigning these permissions to the service account are optional, as a SQL Authentication credential may also be specified and the necessary permissions then be assigned to that SQL Authentication credential. For more information on the necessary SQL Server permissions, see SQL Server Permissions topic in the Active Roles Quick Start Guide.

Synchronizing native permissions to Active Directory

The service account must have the Read Permissions and Modify Permissions rights on the Active Directory objects and containers where it is desired to use the Active Roles security synchronization feature.

Rule-based Administrative Views

相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级