立即与支持人员聊天
与支持团队交流

Active Roles 8.1.1 - Administration Guide

Introduction Getting started Rule-based administrative views Role-based administration
Access Templates as administrative roles Access Template management tasks Examples of use Deployment considerations Windows claims-based access rules
Rule-based autoprovisioning and deprovisioning
Provisioning Policy Objects Deprovisioning Policy Objects How Policy Objects work Policy Object management tasks Policy configuration tasks
Property Generation and Validation User Logon Name Generation Group Membership AutoProvisioning Exchange Mailbox AutoProvisioning AutoProvisioning in SaaS products OneDrive Provisioning Home Folder AutoProvisioning Script Execution Microsoft 365 and Azure Tenant Selection E-mail Alias Generation User Account Deprovisioning Office 365 Licenses Retention Group Membership Removal Exchange Mailbox Deprovisioning Home Folder Deprovisioning User Account Relocation User Account Permanent Deletion Group Object Deprovisioning Group Object Relocation Group Object Permanent Deletion Notification Distribution Report Distribution
Deployment considerations Checking for policy compliance Deprovisioning users or groups Restoring deprovisioned users or groups Container Deletion Prevention policy Picture management rules Policy extensions
Using rule-based and role-based tools for granular administration Workflows
Key workflow features and definitions About workflow processes Workflow processing overview Workflow activities overview Configuring a workflow
Creating a workflow definition for a workflow Configuring workflow start conditions Configuring workflow parameters Adding activities to a workflow Configure an Approval activity Configuring a Notification activity Configuring a Script activity Configuring an If-Else activity Configuring a Stop/Break activity Configuring an Add Report Section activity Configuring a Search activity Configuring CRUD activities Configuring a Save Object Properties activity Configuring a Modify Requested Changes activity Enabling or disabling an activity Enabling or disabling a workflow Using the initialization script
Approval workflow Email-based approval Automation workflow Activity extensions
Temporal Group Memberships Group Family Dynamic groups Active Roles Reporting Management History Entitlement profile Recycle Bin AD LDS data management One Identity Starling Join and configuration through Active Roles Managing One Identity Starling Connect Configuring linked mailboxes with Exchange Resource Forest Management Configuring remote mailboxes for on-premises users Azure AD, Microsoft 365, and Exchange Online Management
Configuring Active Roles to manage Hybrid AD objects Managing Hybrid AD users
Creating a new Azure AD user with the Web Interface Viewing or updating the Azure AD user properties with the Web Interface Viewing or modifying the manager of a hybrid Azure user Disabling an Azure AD user Enabling an Azure AD user Deprovisioning of an Azure AD user Undo deprovisioning of an Azure AD user Adding an Azure AD user to a group Removing an Azure AD user from a group View the change history and user activity for an Azure AD user Deleting an Azure AD user with the Web Interface Creating a new hybrid Azure user with the Active Roles Web Interface Converting an on-premises user with an Exchange mailbox to a hybrid Azure user Licensing a hybrid Azure user for an Exchange Online mailbox Viewing or modifying the Exchange Online properties of a hybrid Azure user Creating a new Azure AD user with Management Shell Updating the Azure AD user properties with the Management Shell Viewing the Azure AD user properties with the Management Shell Delete an Azure AD user with the Management Shell Assigning Microsoft 365 licenses to new hybrid users Assigning Microsoft 365 licenses to existing hybrid users Modifying or removing Microsoft 365 licenses assigned to hybrid users Updating Microsoft 365 licenses display names
Unified provisioning policy for Azure M365 Tenant Selection, Microsoft 365 License Selection, Microsoft 365 Roles Selection, and OneDrive provisioning Microsoft 365 roles management for hybrid environment users Managing Microsoft 365 contacts Managing Hybrid AD groups Managing Microsoft 365 Groups Managing cloud-only distribution groups Managing cloud-only dynamic distribution groups Managing Azure security groups Managing cloud-only Azure users Managing cloud-only Azure guest users Managing cloud-only Azure contacts Changes to Active Roles policies for cloud-only Azure objects Managing room mailboxes Managing cloud-only shared mailboxes
Modern Authentication Managing the configuration of Active Roles
Connecting to the Administration Service Managed domains Using unmanaged domains Evaluating product usage Creating and using virtual attributes Examining client sessions Monitoring performance Customizing the Console Using Configuration Center Changing the Active Roles Admin account Enabling or disabling diagnostic logs Active Roles Log Viewer
SQL Server replication Using regular expressions Administrative Template Communication ports Active Roles and supported Azure environments Integrating Active Roles with other products and services Active Roles Language Pack Active Roles Diagnostic Tools Active Roles Add-on Manager

Modifying an Azure security group with the Web Interface

You can use the Active Roles Web Interface to modify the Azure properties of an existing Azure security group in your Azure tenant. This is typically useful if you have to:

  • Modify the display name of the Azure security group, for example because of an organizational or security policy change.

  • Change the configured membership type (manually assigned or dynamic) of the Azure security group.

To modify the Azure properties of an Azure security group

  1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> > Security Groups.

    The list of existing Azure security groups in the selected Azure tenant appears.

  2. Select the group that you want to configure.

  3. In the right-side pane, click Azure Properties.

  4. In the left-side pane of the Azure Properties window, click Properties.

  5. (Optional) Specify the Group Azure Display Name of the configured group.

    TIP: You can configure multiple groups with the same Group Azure Display Name in the same Azure tenant.

  6. (Optional) Provide a short Description for the group.

  7. (Optional) Configure the Membership type of the group:

    • Assigned: When selected, you can add or remove members to or from the group manually later. For more information, see Adding or removing members from an Azure security group with the Web Interface.

    • Dynamic Members: When selected, Active Roles sets up the group as a dynamic membership group, and will automatically update group membership based on the configured Dynamic membership rule syntax.

    TIP: Consider the following when configuring the Membership type:

    • Select Dynamic Members to quickly configure a group based on a certain membership logic. For example, if you need to set up a group for employees from the same geographical location, business unit, or functional area, One Identity recommends configuring the group with Dynamic Members.

    • If you select Dynamic Members, you will not be able to manually add or remove members to or from the Azure security group, unless you change its Membership type to Assigned later. However, you can still manually configure the owner(s) for a dynamic Azure security group, as described in Adding or removing owners from an Azure security group with the Web Interface.

    • Changing the Membership type from Dynamic Members to Assigned later will keep the last set of members that were dynamically assigned to the group.

  8. (Optional) If you set the Membership type to Dynamic Members, specify the Dynamic membership rule syntax. Active Roles will send the logic configured in this field to Azure to automatically assign or remove members to or from the group later. For more information on how to specify a membership rule, see Dynamic membership rules for groups in Azure AD in the Microsoft 365 documentation.

  9. To apply your changes, click Save.

Adding or removing owners from an Azure security group with the Web Interface

You can use the Active Roles Web Interface to specify owners for an Azure security group. Using the applicable options, you can either add or remove owners to or from the selected Azure security group.

NOTE: Consider the following when configuring group ownership:

  • You cannot specify a group as an owner of another group.

  • Although Active Roles and Azure AD support specifying Azure guest users as group owners, One Identity recommends doing so only if assigning the ownership of a specific group to a guest user is in line with the security policies of your organization.

To add owners to an Azure security group

  1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> > Security Groups.

    The list of existing Azure security groups in the selected Azure tenant appears.

  2. Select the group that you want to configure.

  3. In the right-side pane, click Azure Properties.

  4. To list the owners of the selected group, click the Owners tab of the Azure Properties window.

  5. Click Add to add a new owner (or owners) to the selected group.

  6. In the Select Object page, use the search field to find the users or guest users in the Azure tenant that you want to specify as owners.

    The users and guest users meeting the search criteria will appear in the Display Name column.

  7. Select the check boxes of the users or guest users you want to specify as owners of the group. The selected users will be listed in the lower pane of the Select Object page.

  8. (Optional) To search for additional users or guest users, enter another search string. After that, select the users or guest users you want to add from the updated list.

  9. To apply your changes, click OK. The Owners page will be updated with the new settings.

To remove owners from an Azure security group

  1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> > Security Groups.

    The list of existing Azure security groups in the selected Azure tenant appears.

  2. Select the group that you want to configure.

  3. In the right-side pane, click Azure Properties.

  4. To list the owners of the selected group, click the Owners tab of the Azure Properties window.

  5. Select the owners whose ownership you want to revoke, and click Remove. The selected owners are removed from the list of owners.

  6. To apply your changes, click OK. The Owners page will be updated with the new settings.

Adding or removing members from an Azure security group with the Web Interface

You can use the Active Roles Web Interface to add members to an existing Azure security group with an Assigned membership setting.

NOTE: Consider the following when managing the members of an Azure security group in Active Roles :

  • In the Active Roles Web Interface, you can only specify Azure users, Azure guest users, other Azure security groups and external users as group members for Azure security groups with an Assigned membership setting. You cannot specify devices and applications. However, you can:

    • Configure Azure security groups in the Active Roles Web Interface to have dynamic device membership by using the appropriate dynamic membership rules (such as device.displayName). For more information on the applicable membership rule syntax, see Dynamic membership rules for groups in Azure AD in the Microsoft 365 documentation.

    • Configure device and application memberships later in Azure Portal for Azure security groups created in Active Roles.

  • You cannot add or remove members manually to or from an Azure security group with dynamic membership. To change the members of a dynamic group manually, first modify its membership type from Dynamic Members to Assigned membership. For more information, see Modifying an Azure security group with the Web Interface.

  • Although you can use the Active Roles Web Interface to manage Azure security groups that also contain devices and applications, the Active Roles Web Interface cannot display the member devices and applications of such groups.

To add members to an Azure security group

  1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> > Security Groups.

    The list of existing Azure security groups in the selected Azure tenant appears.

  2. Select the group that you want to configure.

  3. In the right-side pane, click Members.

    The Members page then appears with the list of members in the selected group.

  4. Click Add to add a new member (or members) to the group.

  5. In the Select Object page, use the search field to find the users, guest users or Azure security groups in the Azure tenant that you want to add.

    The users, guest users and Azure security groups that meet the search criteria will appear in the Display Name column.

  6. Select the check boxes of the users, guest users or Azure security groups that you want to add to the group. The selected objects will appear in the lower pane of the Select Object page.

  7. (Optional) To search for additional users, guest users or Azure security groups, enter another search string. After that, select the objects you want to add from the updated list.

  8. To apply your changes, click OK. The Members page will be updated with the new membership settings.

To remove members from an Azure security group

  1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> > Security Groups.

    The list of existing Azure security groups in the selected Azure tenant appears.

  2. Select the group that you want to configure.

  3. In the right-side pane, click Members.

    The Members page then appears with the list of members in the selected group.

  4. To remove a member (or members) from the selected group, select the members from the Members Name list, and click Remove.

    The selected members are removed from the Members Name list.

  5. To apply your changes, click OK. The Members page will be updated with the new membership settings.

Viewing the members of a dynamic Azure security group with the Web Interface

You can check the member users, guest users and Azure security groups of an Azure security group with dynamic membership via the Active Roles Web Interface. This is useful if you want to get a quick update on the current membership status of the dynamic Azure security group.

NOTE: Consider the following when using dynamic Azure security groups in Active Roles:

  • You cannot add or remove members manually to or from an Azure security group with dynamic membership. To change the members of a dynamic group manually, first modify its membership type from Dynamic Members to Assigned membership. For more information, see Modifying an Azure security group with the Web Interface.

  • Although you can use the Active Roles Web Interface to manage Azure security groups that also contain devices and applications, the Active Roles Web Interface cannot display the member devices and applications of such groups.

To view the members of an Azure security group with dynamic membership

  1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> > Security Groups.

    The list of existing Azure security groups in the selected Azure tenant appears.

  2. Select the group whose members you want to check.

  3. In the right-side pane, click Dynamic Members.

    The Dynamic Members page then appears with the list of members in the selected group.

  4. To exit the Dynamic Members window, click Close.

相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级