立即与支持人员聊天
与支持团队交流

Active Roles 8.2.1 - Administration Guide

Introduction Getting started with Active Roles Configuring rule-based administrative views Configuring role-based administration Configuring rule-based autoprovisioning and deprovisioning
Configuring Provisioning Policy Objects
User Logon Name Generation E-mail Alias Generation Exchange Mailbox AutoProvisioning Group Membership AutoProvisioning Home Folder AutoProvisioning Property Generation and Validation Script Execution O365 and Azure Tenant Selection AutoProvisioning in SaaS products
Configuring Deprovisioning Policy Objects
User Account Deprovisioning Group Membership Removal User Account Relocation Exchange Mailbox Deprovisioning Home Folder Deprovisioning User Account Permanent Deletion Office 365 Licenses Retention Group Object Deprovisioning Group Object Relocation Group Object Permanent Deletion Script Execution Notification Distribution Report Distribution
Configuring entry types Configuring a Container Deletion Prevention policy Configuring picture management rules Managing Policy Objects Checking for policy compliance Deprovisioning users or groups Restoring deprovisioned users or groups Configuring policy extensions
Using rule-based and role-based tools for granular administration Workflows
About workflow processes Workflow processing overview Workflow activities overview Configuring a workflow
Creating a workflow definition for a workflow Configuring workflow start conditions Configuring workflow parameters Adding activities to a workflow Configuring an Approval activity Configuring a Notification activity Configuring a Script activity Configuring an If-Else activity Configuring a Stop/Break activity Configuring an Add Report Section activity Configuring a Search activity Configuring CRUD activities Configuring a Save Object Properties activity Configuring a Modify Requested Changes activity Enabling or disabling an activity Enabling or disabling a workflow Using the initialization script
Approval workflow Email-based approval Automation workflow Activity extensions
Temporal Group Memberships Group Family Dynamic groups Active Roles Reporting Management History Entitlement profile Recycle Bin AD LDS data management One Identity Starling Join and configuration through Active Roles Managing One Identity Starling Connect Configuring linked mailboxes with Exchange Resource Forest Management Configuring remote mailboxes for on-premises users Migrating Active Roles configuration with the Configuration Transfer Wizard Managing Skype for Business Server with Active Roles
About Skype for Business Server User Management Active Directory topologies supported by Skype for Business Server User Management User Management policy for Skype for Business Server User Management Master Account Management policy for Skype for Business Server User Management Access Templates for Skype for Business Server Configuring the Skype for Business Server User Management feature Managing Skype for Business Server users
Exchanging provisioning information with Active Roles SPML Provider Monitoring Active Roles with Management Pack for SCOM Configuring Active Roles for AWS Managed Microsoft AD Azure AD, Microsoft 365, and Exchange Online Management
Azure tenant types and environment types supported by Active Roles Using Active Roles to manage Azure AD objects Unified provisioning policy for Azure M365 Tenant Selection, Microsoft 365 License Selection, Microsoft 365 Roles Selection, and OneDrive provisioning Changes to Active Roles policies for cloud-only Azure objects
Managing the configuration of Active Roles
Connecting to the Administration Service Managed domains Using unmanaged domains Evaluating product usage Creating and using virtual attributes Examining client sessions Monitoring performance Customizing the Console Using Configuration Center Changing the Active Roles Admin account Enabling or disabling diagnostic logs Active Roles Log Viewer
SQL Server replication Using regular expressions Administrative Template Configuring federated authentication Communication ports and URLs used by Active Roles Integrating Active Roles with other products and services Active Roles Language Pack Active Roles Diagnostic Tools Active Roles Add-on Manager

Using the System Checker

To check if a computer and your organization environment supports installing Active Roles, use the Active Roles System Checker tool.

To check system readiness with Active Roles System Checker

  1. From your operating system, launch Active Roles System Checker.

  2. Select Computer > System Readiness Checks.

  3. To check the computer specifications, in the Confirm System Readiness Checks window, select the appropriate components to check for and click Check.

  4. In the System Readiness Checks window, review the summary and confirm that the computer has passed the required checks. Take appropriate action before installing Active Roles. For example, if there is a warning about insufficient memory (RAM), then upgrade the computer's memory to the recommended amount.

  5. To check the SQL Server requirements of Active Roles, in the Active Roles System Checker, select Environment > SQL Server Checks.

  6. Enter the SQL Server name and appropriate credentials for the Active Roles service account, then click Check.

  7. Review the summary to confirm that the SQL Server passed the checks.

  8. To check the Active Directory requirements, in the Active Roles System Checker, select Environment > Active Directory Checks. Enter the domain controller (DC) name and the appropriate credentials for the Active Roles service account, then click Check.

    A progress window appears. Once the check completes, System Checker shows the summary.

  9. Review the summary to confirm the account has adequate permissions in Active Directory.

  10. To learn more about Active Roles. click Additional Resources. To finish the check, click Finish.

Using the Log Viewer tool

You can run the Active Roles Log Viewer application from the Start menu or from the Apps page, depending on the version of your Windows operating system. Alternatively, you can also start the application by navigating to its .exe file in the installation folder:

\Active Roles Diagnostic Tools\Log Viewer\arlogviewer.exe

To open a log in Log Viewer

  1. In the Active Roles Log Viewer application, click Open.

  2. Browse to the diagnostic log file or saved event log file you want to open.

  3. Select the file, and click Open.

By default, Log Viewer displays a list of errors encountered by the Administration Service and recorded in the log file. To analyze these errors further, and look for information about them, right-click an error in the list, then click Look for solution in Knowledge Base. Log Viewer then searches the One Identity Knowledge Base to list the Knowledge Base Articles related to the error you selected.

Additional tasks in Log Viewer

Besides opening and troubleshooting logs, you can also perform the following tasks in Log Viewer:

  • To view a list of requests processed by the Administration Service and traced in the log file, click Requests in the View area on the Log Viewer toolbar.

  • To view all trace records found in the diagnostic log file or all events found in the event log file, click Raw log records in the View area on the Log Viewer toolbar.

  • To search the list for a particular text string, such as an error message, type the text string in the Search box on the Log Viewer toolbar, then press Enter.

  • To narrow the set of list items to those you are interested in, click Filter on the Log Viewer toolbar and specify the desired filter conditions.

  • To view detailed information about an error, request, trace record or event, right-click the corresponding list item, and click Details.

  • To view all trace records that apply to a given request, right-click the corresponding item in the Requests list and click Stack trace.

    NOTE: Stack tracing is not available for event log files.

  • To view the request that caused a given error, right-click the error in the Errors list and click Related request. This task is unavailable in case of an event log file.

    NOTE: Stack tracing is not available for event log files.

  • To view all trace records that apply to the request that caused a given error, right-click the error in the Errors list and click Stack trace for related request. This task is unavailable in case of an event log file.

Log file size

The logs grow in size quickly. Therefore, One Identity recommends to enable logging only when attempting to reproduce an issue, and disable it immediately once reproduction is successful.

The log file captures every activity performed by the service, including the tasks performed by connected users while debug logging is enabled.

TIP: Sometimes, you may need to keep logging enabled for an extended period of time. As the log files are stored on the computer running Active Roles, the logging service requires a substantial amount of free space, which may not be available on the system.

In such cases, to save disk space, set logging to a specific interval and move the logs to another drive or network share. For more information, see Knowledge Base Article How to automate Active Roles debug logging in the One Identity support portal.

Web Interface logs

The Active Roles Web Interface component uses separate log files, named after the configured Web Interface sites. The logs are stored in the following location:

C:\Program Files\One Identity\Active Roles\8.2.1\Web\Public\Log

TIP: Similarly to the ds.log file, the Web Interface log can grow quickly in size. Therefore, One Identity recommends enabling Web Interface logging only when reproducing an issue.

Using the Directory Changes Monitor command-line interface

Active Roles Directory Changes Monitor is a command-line tool.

To run Directory Changes Monitor

  1. Open the Windows command prompt.

  2. Navigate to the folder where Directory Changes Monitor is installed.

  3. Run the tool with the appropriate parameters.

    TIP: To list the available parameters, run the following command:

    dirchangesmon.exe /?

NOTE: Directory Changes Monitor has a single required parameter, /TargetDC, specifying the Domain Controller (DC) of the Active Directory domain from which to get directory change statistics. To retrieve information from a domain, make sure to run Directory Changes Monitor with a domain user account of that domain, or from a trusted domain.

Active Roles Add-on Manager

Active Roles Add-on Manager is an application for installing and managing add-ons for Active Roles. You can also create new addons with the solution's Add-on Editor.

For more information on installing Add-on Manager, see Installing the Add-on Manager in the Active Roles Installation Guide.

相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级