立即与支持人员聊天
与支持团队交流

Identity Manager 9.2.1 - Administration Guide for Connecting to Azure Active Directory

Managing Azure Active Directory environments Synchronizing an Azure Active Directory environment
Setting up initial synchronization with an Azure Active Directory tenant Adjusting the synchronization configuration for Azure Active Directory environments Running synchronization Tasks following synchronization Troubleshooting Ignoring data error in synchronization Pausing handling of target system specific processes (Offline mode)
Managing Azure Active Directory user accounts and identities Managing memberships in Azure Active Directory groups Managing Azure Active Directory administrator roles assignments Managing Azure Active Directory subscription and Azure Active Directory service plan assignments
Displaying enabled and disabled Azure Active Directory service plans forAzure Active Directory user accounts and Azure Active Directory groups Assigning Azure Active Directory subscriptions to Azure Active Directory user accounts Assigning disabled Azure Active Directory service plans to Azure Active Directory user accounts Inheriting Azure Active Directory subscriptions based on categories Inheritance of disabled Azure Active Directory service plans based on categories
Login credentials for Azure Active Directory user accounts Azure Active Directory role management
Azure Active Directory role management tenants Enabling new Azure Active Directory role management features Azure Active Directory role main data Displaying Azure Active Directory scoped role assignments Displaying scoped role eligibilities for Azure Active Directory roles Overview of Azure Active Directory scoped role assignments Main data of Azure Active Directory scoped role assignments Managing Azure Active Directory scoped role assignments Adding Azure Active Directory scoped role assignments Editing Azure Active Directory scoped role assignments Deleting Azure Active Directory scoped role assignments Assigning Azure Active Directory scoped role assignments Assigning Azure Active Directory system roles to scopes through role assignments Assigning Azure Active Directory business roles to scopes though role assignments Assigning Azure Active Directory organizations to scopes through role assignments Overview of Azure Active Directory scoped role eligibilities Main data of Azure Active Directory scoped role assignments Managing Azure Active Directory scoped role eligibilities Adding Azure Active Directory scoped role eligibilities Editing Azure Active Directory scoped role eligibilities Deleting Azure Active Directory scoped role eligibilities Assigning Azure Active Directory scoped role eligibilities Assigning Azure Active Directory system roles to scopes through role eligibilities Assigning Azure Active Directory business roles to scopes though role eligibilities Assigning Azure Active Directory organizations to scopes through role eligibilities
Mapping Azure Active Directory objects in One Identity Manager
Azure Active Directory core directories Azure Active Directory user accounts Azure Active Directory user identities Azure Active Directory groups Azure Active Directory administrator roles Azure Active Directory administrative units Azure Active Directory subscriptions and Azure Active Directory service principals Disabled Azure Active Directory service plans Azure Active Directory app registrations and Azure Active Directory service principals Reports about Azure Active Directory objects
Handling of Azure Active Directory objects in the Web Portal Recommendations for federations Basic configuration data for managing an Azure Active Directory environment Troubleshooting Configuration parameters for managing an Azure Active Directory environment Default project template for Azure Active Directory Editing Azure Active Directory system objects Azure Active Directory connector settings

Deleting account definitions

You can delete account definitions if they are not assigned to target systems, identities, hierarchical roles or any other account definitions.

To delete an account definition

  1. Remove automatic assignments of the account definition from all identities.

    1. In the Manager, select the Azure Active Directory > Basic configuration data > Account definitions > Account definitions category.

    2. Select an account definition in the result list.

    3. Select the Change main data task.

    4. Select the Disable automatic assignment to identities task.

    5. Confirm the security prompt with Yes.

    6. Save the changes.

  2. Remove direct assignments of the account definition to identities.

    1. In the Manager, select the Azure Active Directory > Basic configuration data > Account definitions > Account definitions category.

    2. Select an account definition in the result list.

    3. Select the Assign to identities task.

    4. In the Remove assignments pane, remove identities.

    5. Save the changes.

  3. Remove the account definition's assignments to departments, cost centers, and locations.

    1. In the Manager, select the Azure Active Directory > Basic configuration data > Account definitions > Account definitions category.

    2. Select an account definition in the result list.

    3. Select the Assign organizations task.

    4. In the Remove assignments pane, remove the relevant departments, cost centers, and locations.

    5. Save the changes.

  4. Remove the account definition's assignments to business roles.

    1. In the Manager, select the Azure Active Directory > Basic configuration data > Account definitions > Account definitions category.

    2. Select an account definition in the result list.

    3. Select the Assign business roles task.

    4. In the Remove assignments pane, remove the business roles.

    5. Save the changes.

  5. If the account definition was requested through the IT Shop, it must be canceled and removed from all IT Shop shelves.

    For more detailed information about unsubscribing requests, see the One Identity Manager Web Designer Web Portal User Guide.

    To remove an account definition from all IT Shop shelves (role-based login)

    1. In the Manager, select the Entitlements > Account definitions category.

    2. Select an account definition in the result list.

    3. Select the Remove from all shelves (IT Shop) task.

    4. Confirm the security prompt with Yes.
    5. Click OK.

      The account definition is removed from all shelves by the One Identity Manager Service. At the same time, any requests and assignment requests with this account definition are canceled.

    To remove an account definition from all IT Shop shelves (non role-based login)

    1. In the Manager, select the Azure Active Directory > Basic configuration data > Account definitions > Account definitions category.

    2. Select an account definition in the result list.

    3. Select the Remove from all shelves (IT Shop) task.

    4. Confirm the security prompt with Yes.
    5. Click OK.

      The account definition is removed from all shelves by the One Identity Manager Service. At the same time, any requests and assignment requests with this account definition are canceled.

  6. Remove the required account definition assignment. As long as the account definition is required for another account definition, it cannot be deleted. Check all the account definitions.

    1. In the Manager, select the Azure Active Directory > Basic configuration data > Account definitions > Account definitions category.

    2. Select an account definition in the result list.

    3. Select the Change main data task.

    4. From the Required account definition menu, remove the account definition.

    5. Save the changes.

  7. Remove the account definition's assignments to target systems.

    1. In the Manager, select the Azure Active Directory tenant in the Azure Active Directory > Tenants category.

    2. Select the Change main data task.
    3. On the General tab, remove the assigned account definitions.

    4. Save the changes.

  8. Delete the account definition.

    1. In the Manager, select the Azure Active Directory > Basic configuration data > Account definitions > Account definitions category.

    2. Select an account definition in the result list.

    3. Click to delete an account definition.

Assigning identities automatically to Azure Active Directory user accounts

When you add a user account, an existing identity can automatically be assigned to it. If necessary, a new identity can be created. The identity main data is created on the basis of existing user account main data. This mechanism can be triggered after a new user account is created either manually or through synchronization.

Define criteria for finding identities to apply to automatic identity assignment. If a user account is linked to an identity through the current mode, the user account is given, through an internal process, the default manage level of the account definition entered in the user account's target system. You can customize user account properties depending on how the behavior of the manage level is defined.

If you run this procedure during working hours, automatic assignment of identities to user accounts takes place from that moment onwards. If you disable the procedure again later, the changes only affect user accounts added or updated after this point in time. Existing identity assignments to user accounts remain intact.

NOTE: It is not recommended to assign identities using automatic identity assignment in the case of administrative user accounts. Use Change main data to assign identities to administrative user accounts for the respective user account.

For more information about assigning identities automatically, see the One Identity Manager Target System Base Module Administration Guide.

Run the following tasks to assign identities automatically:

  • If you want identities to be assigned during the synchronization of user accounts, in the Designer, set the TargetSystem | AzureAD | PersonAutoFullsync configuration parameter and select the required mode.

  • If you want identities to be assigned outside synchronization in the Designer, set the TargetSystem | AzureAD | PersonAutoDefault configuration parameter and select the required mode.

  • In the TargetSystem | AzureAD | PersonExcludeList configuration parameter, define the user accounts for which no automatic assignment to identities is to take place.

    Example:

    ADMINISTRATOR|GUEST

    TIP: You can edit the value of the configuration parameter in the Exclude list for automatic identity assignment dialog.

  • Use the TargetSystem | AzureAD | PersonAutoDisabledAccounts configuration parameter to specify whether identities can be automatically assigned to disabled user accounts. User accounts do not obtain an account definition.

  • Assign an account definition to the tenant. Ensure that the manage level to be used is entered as the default manage level.

  • Define the search criteria for identity assignment in the tenant.

NOTE:

The following applies for synchronization:

  • Automatic identity assignment takes effect if user accounts are added or updated.

The following applies outside synchronization:

  • Automatic identity assignment takes effect if user accounts are added.

NOTE:

In the default installation, after synchronizing, identities are automatically created for the user accounts. If an account definition for the tenant is not known at the time of synchronization, user accounts are linked with identities. However, account definitions are not assigned. The user accounts are therefore in a Linked state.

To manage the user accounts using account definitions, assign an account definition and a manage level to these user accounts.

For more information, see Managing Azure Active Directory user accounts through account definitions.

Related topics

Editing search criteria for automatic identity assignment

NOTE: One Identity Manager supplies a default mapping for identity assignment. Only carry out the following steps when you want to customize the default mapping.

The criteria for identity assignments are defined for the tenant. You specify which user account properties must match the identity’s properties such that the identity can be assigned to the user account. You can limit search criteria further by using format definitions.

The search criterion is written in XML notation to the Search criteria for automatic identity assignment column (AccountToPersonMatchingRule) in the AADOrganization table.

Search criteria are evaluated when identities are automatically assigned to user accounts. Furthermore, you can create a suggestion list for assignments of identities to user accounts based on the search criteria and make the assignment directly.

NOTE: Object definitions for user accounts that can have search criteria applied to them are predefined. For example, if you require other objects definitions that limit a preselection of user accounts, set up the respective custom object definitions in the Designer. For more information, see the One Identity Manager Configuration Guide.

To specify criteria for identity assignment

  1. In the Manager, select the Azure Active Directory > Tenants category.

  2. Select the tenant in the result list.

  3. Select the Define search criteria for identity assignment task.

  4. Specify which user account properties must match with which identity so that the identity is linked to the user account.

    Table 12: Default search criteria for user accounts and contacts
    Apply to Column for identity Column for user account
    Azure Active Directory user accounts Central user account (CentralAccount) Alias (MailNickName)
  5. Save the changes.

For more information about defining search criteria, see the One Identity Manager Target System Base Module Administration Guide.

Related topics

Finding identities and directly assigning them to user accounts

Based on the search criteria, you can create a suggestion list for the assignment of identities to user accounts and make the assignment directly. User accounts are grouped in different views for this.

  • Suggested assignments: This view lists all user accounts to which One Identity Manager can assign an identity. All identities are shown that were found using the search criteria and can be assigned.

  • Assigned user accounts: This view lists all user accounts to which an identity is assigned.

  • No identity assignment: This view lists all user accounts to which no identity is assigned and for which no identity was found using the search criteria.

NOTE: To display disabled user accounts or deactivated identities in the view, enable the Even locked accounts are mapped option.

If you assign a deactivated identity to a user account, it might be locked or deleted depending on the configuration.

To apply search criteria to user accounts

  1. In the Manager, select the Azure Active Directory > Tenants category.

  2. Select the tenant in the result list.

  3. Select the Define search criteria for identity assignment task.

  4. At the bottom of the form, click Reload.

    All possible assignments based on the search criteria are found in the target system for all user accounts. The three views are updated.

TIP: By double-clicking on an entry in the view, you can view the user account and identity main data.

The assignment of identities to user accounts creates connected user accounts (Linked state). To create managed user accounts (Linked configured state), you can assign an account definition at the same time.

To assign identities directly to user accounts

  • Click Suggested assignments.

    1. Click the Selection box of all user accounts to which you want to assign the suggested identities. Multi-select is possible.

    2. (Optional) Select an account definition in the Assign this account definition menu, and select a manage level in the Assign this account manage level menu.

    3. Click Assign selected.

    4. Confirm the security prompt with Yes.

      The identities determined using the search criteria are assigned to the selected user accounts. If an account definition was selected, this is assigned to all selected user accounts.

    - OR -

  • Click No identity assignment.

    1. Click Select identity for the user account to which you want to assign an identity. Select an identity from the menu.

    2. Click the Selection box of all user accounts to which you want to assign the selected identities. Multi-select is possible.

    3. (Optional) Select an account definition in the Assign this account definition menu, and select a manage level in the Assign this account manage level menu.

    4. Click Assign selected.

    5. Confirm the security prompt with Yes.

      The identities displayed in the Identity column are assigned to the selected user accounts. If an account definition was selected, this is assigned to all selected user accounts.

To remove assignments

  • Click Assigned user accounts.

    1. Click the Selection box of all the user accounts with the identity assignment you want to delete. Multi-select is possible.

    2. Click Remove selected.

    3. Confirm the security prompt with Yes.

      The assigned identities are removed from the selected user accounts.

相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级