ActiveRoles_WebInterfaceUserGuide
ActiveRoles_WebInterfaceUserGuide
Getting Started 1
Configuring the web browser 2
Configuring Google Chrome 2
Configuring Mozilla Firefox 2
Connecting to the Web Interface 2
Changing personal settings in the Web Interface 3
Logging out of the Web Interface 4
About us 189
Contacting us 190
Glossary 192
Index 194
Getting Started
Active Roles offers a convenient, easy-to-use, customizable Web Interface that enables
authorized users to perform day-to-day administrative tasks, including user management
tasks such as modifying personal data or adding users to groups. Via the Web Interface, an
intranet user can connect to Active Roles using a web browser. A user sees only the
commands, directory objects, and object properties to which the user’s role provides
administrative access.
By default, the Web Interface includes three different sites: the Administration Site, the
Helpdesk Site, and the Self-Service Site. The Administration Site supports a rich variety of
administrative tasks, while the Helpdesk Site supports a simplified set of tasks, mostly
aimed for resolving support tickets. Finally, the Self-Service Site is intented for users to
manage their own personal accounts.
The Web Interface also allows setting the user interface language according to your
preferences. The language setting has effect on all menus, commands, and forms that
come with the Web Interface, as well as the tooltips. As such, users can work with the Web
Interface in their own language.
The Web Interface delivers a reliable, comprehensive solution for users who have
administrative access to Active Roles to modify commands that the Web Interface provides
for without writing a single line of code, and enables such users to add and remove
commands on menus, and modify command pages by adding and removing fields that
display property values. For information on how to customize the Web Interface, refer to
the Active Roles Web Interface Configuration Guide.
This document is for personnel who are responsible for performing day-to-day
administrative tasks. As such, the document provides a brief overview of the Web
Interface, and includes step-by-step instructions on how to perform administrative tasks.
The following topics describe the procedures for connecting to the Web Interface. First,
configure your web browser to display the Web Interface pages properly. Then, connect to
the Web Interface. Finally, you may specify personal settings for the Web Interface.
l Configuring the web browser
l Connecting to the Web Interface
l Changing personal settings in the Web Interface
l Logging out of the Web Interface
For more information on how to enable JavaScript and cookies in your browser, see the
applicable topic:
l Configuring Google Chrome
l Configuring Mozilla Firefox
The following sections provide an overview on the components and usage of the Active
Roles Web Interface.
l Administrative tasks overview
l User interface overview
l Managing the list of objects
l Locating directory objects
l Using personal views
NOTE: Consider the following additional features when using the Web Interface:
l For more information on extending the Active Roles provisioning and account
administration capabilities to your cloud applications, check the Active Roles
8.1.3 > What's New page.
l To provide product feedback on the Web Interface Administration Site, use the
Feedback button.
l To enable the Feedback button on the Web Interface Helpdesk Site,
navigate to Customization > Global Settings, and select Enable user
feedback link.
l The Feedback button is not available on the Web Interface Self-Service Site.
Directory Management
Directory Management allows you to browse for, and administer, directory objects in
your organization. Your Active Roles permissions determine which tasks you can perform.
Directory Management provides the following views:
l Active Directory: Lists Active Directory domains managed by Active Roles,
allowing you to navigate through containers in those domains. You can view, filter
and select objects held in the container, and apply commands to the selected object
or container.
l Managed Units Lists Managed Units defined in Active Roles, allowing you to view
objects, and navigate through containers, held in Managed Units. You can filter and
select objects, and apply commands to the selected object or container.
For information on how to administer Active Directory objects, see Managing Active
Directory objects.
Search
Search provides a flexible, query-based mechanism that helps locate directory objects
quickly and without browsing through the directory tree. You can select containers in the
directory, and build a query by specifying search criteria. The Web Interface searches in the
selected containers and all of their subcontainers, and lists the objects that match your
search criteria. When the objects you target are returned as the results of a search query,
you can then perform the necessary administrative tasks.
You can also save the queries that you build and use them again at a later time. The Web
Interface saves queries as your personal views, with each view consisting of the containers
and search criteria that you select, as well as the customized sorting and column
information that you specify.
For instructions on how to perform a search, see Searching for directory objects.
Settings
By using Settings, you can specify:
l The language of the Web Interface pages.
l The maximum number of objects displayed in single-page lists.
l The maximum number of list items displayed on a single page in multi-page lists.
l The maximum number of links to pages displayed for multi-page lists.
l Maximum time in minutes, for which the notification is to be visible.
l Maximum number of notifications to be stored in Active Roles.
You can also enable Show objects owned by inheritance or secondary ownership.
Selecting this check box allows Self-Administration Web Interface users to view objects in
My Managed Resources even if the user is not assigned to the objects as the primary
owner (manager), but as a secondary or inherited owner.
Settings are saved on a per-user basis in the configuration of the Web Interface site.
For more information on changing these settings, see Changing personal settings in the
Web Interface.
Customization
Customization allows you to tailor the Web Interface to suit the specific needs of your
organization. The Customization menu appears only if you are logged in as an Active
Roles Admin. The default Active Roles Admin account is created during the configuration of
the Active Roles Administration Service.
Customization includes the following tasks:
l Directory Objects: Modify menus, commands, and forms for administering
directory objects. View or change global settings, such as the logo image and
color scheme.
l Restore Default: Restore the original (default) menus, commands, and forms,
discarding all previous customizations.
l Reload: Reload the menus, commands, and forms that you have customized.
The customization settings determine the configuration of the Web Interface site for
all users.
Navigation bar
Located on the left side of the page, the Navigation bar provides the first level of navigation
for most of the tasks you can perform in the Web Interface. The Navigation bar is organized
by Web Interface areas, and includes the following items:
l Home: Go to the Web Interface home page.
l Directory Management: Browse for and administer directory objects in your
organization.
l Search: Search for and administer directory objects in your organization.
l Customization: Customize the currently opened Web Interface site.
NOTE: The Customization menu is available for Active Roles administrators only.
l Approval: Perform tasks related to the approval of administrative operations.
l Settings: View or change your personal settings that control the display of the
Web Interface.
l Help: Open useful resources about the usage of the Web Interface.
For more information about the usage of the Navigation Bar, see Administrative
tasks overview.
Browse pane
Located next to the Navigation bar, the Browse pane lists the built-in views and personal
views, and allows you to access the tree view:
l Built-in views provide entry points to browsing for objects in the directory. Personal
views are filter or search queries you build and save to use them again at a later
time. To see built-in views and personal views, click the Views tab at the top of the
Browse Pane.
l The tree view helps you browse for directory objects by using the directory tree to
List of objects
When you select a container or view in the Browse pane, you will see a list of objects. If you
select a container, the list includes the objects held in that container. If you select a view,
the list includes the objects that match the view settings. It is also possible to customize
the list by sorting and filtering, and by adding or removing list columns.
You can select objects from the list and apply commands to the selected object or objects.
When you click the name of a container object, such as a domain or an Organizational Unit,
the list changes to display the objects held in that container, thereby enabling you to
browse through containers in the directory.
Toolbar
The Toolbar contains a number of controls allowing you to manage the current list
of objects:
l To save the current list as a personal view, add or remove list columns, or export the
list to a text file, click the Menu button on the left side of the Toolbar.
l To filter the list, enter filtering terms in the Filter field, then click the button next
to the field.
l To configure filtering criteria based on object properties, click the Expand/Collapse
button on the right side of the Toolbar. To have the list include only the objects that
match your filtering criteria, click the button next to the Filter field.
Current container
The area above the Toolbar displays the name of the current container, the container
that holds the objects shown in the list, and identifies the hierarchical path to the
current container in the directory. To view a list of objects held in the container, click its
name in the path.
Command pane
Located to the right of the list of objects, the Command pane provides commands you
can apply to objects you select from the list as well as commands you can apply to the
current container:
Summary pane
When you select an object from the list, information about that object is displayed in the
Summary pane under the list of objects. The information includes some commonly used
properties of the object, and depends upon the object type. For example, user properties
provide more detailed information about a user account, such as the logon name, e-mail
address, description, job title, department, expiration date, and the date and time that the
account was last changed. If you do not see the Summary pane, click in the area beneath
the list of objects.
The property page consists of several tabs. Each tab provides a number of data entries
allowing you to view or change certain properties of the directory object. Click a tab to
access the data entries on that tab. To apply the changes you have made in the data
entries, click the Save button.
An Active Roles Admin can use the Customize link in the upper right corner of the page to
add or remove data entries or entire tabs from the property page. The Customize link is
not displayed unless you are logged on as a member of the Active Roles Admin account,
which specified in the configuration settings of the Active Roles Administration Service.
You can also sort the list by other columns. Click a column heading to change the sort
order. For more information on how to add or remove columns, see Adding or removing
columns from the list of objects.
After you have applied a filter, the list includes only the objects that match the filter. For
example, you can type a few characters in the Filter field on the Toolbar, then press Enter
to view only the objects whose name starts with the characters you typed.
1. On the left side of the Toolbar, click Menu > Choose columns.
2. To add a column for a certain property, click the name of the property in the Hidden
columns list, then click the right arrow button to move the property to the
Displayed columns list.
3. To remove a column for a certain property, click the name of the property in the
Displayed columns list, then click the left arrow button to move the property to the
Hidden columns list.
TIP: You can reorder list columns by moving list items up and down in the Displayed
columns list. To do so, click the name of the property in the list, then click the applicable
arrow button next to the list.
1. Click the Search in box on the Toolbar, then select the container that you want to
search. You can select more than one container.
The Web Interface will search in the selected container and all of its subcontainers.
2. Specify criteria for the objects that you want to find:
l To search by naming properties, type in the Search field on the Toolbar. The
Web Interface will search for objects whose naming properties match what you
typed. The naming properties include name, first name, last name, display
name, and logon name.
l To search by other properties, click the button on the right side of the Toolbar
to expand the Toolbar, click Add criteria, choose the properties by which you
want to search, click Add, then configure the criteria as appropriate. The Web
Interface will search for objects that match the criteria that you configured.
3. Press Enter to start the search.
The search results are listed on the Search page. You can customize the list by adding or
removing list columns and sorting the list by column data. To add or remove list columns,
click the Menu button on the left side of the Toolbar and then click Choose columns (see
also Adding or removing columns from the list of objects). To sort the list by column data,
click column headings.
1. Navigate to the container in the Web Interface. To navigate to a container, you can:
l Search for the container object (see Searching for directory objects), then click
its name in the list of search results on the Search page.
l Browse for the container objects by using the Browse pane and the List
of objects.
IMPORTANT: The scope of filtering is always set to the current container, and
does not include any subcontainers of that container. Filtering is essentially a
search for objects held in a given container only. If you want to search the
current container and all of its subcontainers, click Search under this
container in the Command pane, then configure and perform a search as
described in Searching for directory objects.
2. Specify how you want to filter the objects held in the container:
l To filter objects by naming properties, enter them in the Filter field on the
Toolbar, then press Enter or click the button next to the Filter field. The list of
objects will include only the objects whose naming properties match what you
entered. The naming properties include name, first name, last name, display
name, and login name.
l To filter objects by other properties, expand the Toolbar with the button on the
right side of the Toolbar, and click Add criteria. Then, choose the properties
by which you want to filter, click Add, and configure the criteria as appropriate.
The list of objects will include only the objects that match the criteria you
configured.
3. To apply the filter, press Enter or click the button next to the Filter field on
the Toolbar.
When a filter is applied to a container, the Web Interface lists a subset of all objects held
in that container. Once you no longer need it, you can remove the filter to view all
objects again:
l If you did not add any criteria, clear the Filter field on the Toolbar and press Enter.
l If you specified any criteria, expand the Toolbar, click Clear all, then press Enter.
Batch operations are available in the list of objects on the following Web Interface pages:
l Search: This page lists the search results when you perform a search.
l View Contents: This page displays the objects held in a given Organizational Unit,
Managed Unit, or container.
To perform a batch operation, select the check box next to the name of each of the desired
objects in the list, then click a command in the top area of the Command pane. This runs
the command on each object within your selection.
NOTE: Active Roles administrators can customize Web Interface by adding and removing
commands, and modifying pages associated with commands. For more information, see
Customizing the Web Interface in the Active Roles Web Interface Configuration Guide.
NOTE:
l The bulk operation does not complete and an error is displayed if no attributes are
selected or if no changes are made to the values of the attributes selected for the
bulk operation.
l The bulk operation cannot be performed beyond 1500 users. However, you can
configure the limit to increase the number of users. For more information on
configuring the limit, see Not able to query or update groups with more than
1500 members.
The password reset gets completed and the changes can be viewed on the selected user's
Change History tab.
The Active Roles Web Interface provides the following management tasks for
administrators and helpdesk personnel.
l Managing your personal account
l Managing Active Directory objects
l Running an automation workflow
l Managing temporal group memberships
l Managing AD LDS data
l Managing computer resources
l Restoring deleted objects
1. In your web browser, open the Self-Service Site of the Web Interface.
By default, the address is http://<server>/ARWebSelfService where <server> is the
name of the machine running the Web Interface component.
2. On the home page of the Self-Service Site, click User Profile Editor.
3. Use the available options to view or modify your account as needed.
NOTE: The number and type of fields you can edit depend on your organizational
policies, and are configured accordingly by Active Roles administrators. The User
Profile Editor also shows the fields that you cannot edit: those fields are indicated
1. On the machine(s) running the Administration Service and the Web Interface,
launch the Windows Registry Editor.
2. In the Registry Editor, navigate to the following registry path:
HKEY_LOCAL_ MACHINE\SOFTWARE\One Identity\Active Roles\Configuration
3. Create a new DWORD (32-bit) Value named PerformanceFlag.
4. Double-click the new PerformanceFlag DWORD, and set its Value data to 1.
5. To apply the fix, restart the Active Roles Administration Service and IIS. If the fix is
enabled successfully, the following Active Roles event log with Event ID 2508 will
appear in the Event Viewer:
6. (Optional) To deactivate the fix later, set the Value data of the PerformanceFlag
DWORD to 0.
The PerformanceFlag registry key accepts only a value of 1 (to activate the fix) or 0 (to
deactivate it).
When you perform a management tasks, the Web Interface supplements and restricts your
input based on policies and permissions defined in Active Roles. The Web Interface displays
the data generated by policies, and prevents the input of data that would cause policy
violations. The following rules apply:
l If a policy requires that a value be specified for a particular property, the name of the
field for that property is marked with an asterisk (*).
l If a policy imposes any restrictions on a property, an information icon is displayed
next to the name of the field for that property. Click the icon to view policy
information, which you can use to enter an acceptable value.
l When you specify a property value that violates a policy, and click Save, the
Web Interface displays an error message. Review the error message and
correct your input.
l Pages for object creation must include the entries for all required properties.
Otherwise, the Web Interface fails to create the object. For information on how to
configure forms, see Configuring forms in the Active Roles Web Interface
Configuration Guide.
l Object property pages display the values of the properties for which you have the
Read permission. You can modify only those properties for which you have the Write
permission. The properties for which you only have the Read permission are
displayed as read-only.
l The Command pane includes only the commands that you are permitted to use.
l The list of objects includes only the objects that you are permitted to view.
Batch operations are available in the list of objects on the following Web Interface pages:
l Search This page lists the search results when you perform a search.
l View Contents This page displays the objects held in a given Organizational Unit,
Managed Unit, or container.
To perform a batch operation, select the check box next to the name of each of the desired
objects in the list, then click one of the available commands in the Command pane. This
runs the command on each object within your selection.
NOTE: Active Roles administrators can customize Web Interface by adding and
removing commands, and modifying pages associated with commands. For more
information, see Customizing the Web Interface in the Active Roles Web Interface
Configuration Guide Guide.
1. Locate the user account you want to enable. For instructions on how to locate objects
in the Web Interface, see Locating directory objects.
2. In the list of objects, select the user account you want to enable.
3. In the Command pane, click Enable Account.
NOTE: If the user account is not disabled, the Command pane includes the Disable
Account command instead of the Enable Account command.
1. In the Web Interface, locate and select the user account. For more information on
locating objects in the Web Interface, see Locating directory objects.
2. In the Command pane, click Member Of.
3. On the Member Of page that appears, click Add.
4. On the Select Object page that appears, perform a search to locate the group. For
more information on how to search in the Web Interface, see Searching for
directory objects.
5. In the list of search results on the Select Object page, select the group to which you
want to add the selected user account, then click Add.
The Web Interface prompts you for parameter values if the workflow has any parameters
that need to be supplied by the user running the workflow on demand. If the workflow has
no parameters that require user input, then the Web Interface starts the workflow without
prompting you for parameter values.
Once you have started an automation workflow, the Web Interface opens a run history
report allowing you to examine the progress of the workflow run. The report displays the
workflow run status along with information about the activities performed during the run.
For a workflow that is in progress, you can cancel its run by clicking Terminate.
1. In the Web Interface, select the group, and then choose the Members command.
2. On the Members page, click Add.
3. In the Select Object dialog, find and select the objects that you want to make
temporal members of the group, then click Temporary Access.
4. In the Temporal Membership Settings dialog, select the appropriate options,
then click OK:
l To have the temporal members added to the group on a certain date in the
future, select On this date under Add to the group, and choose the date and
time you want.
l To have the temporal members added to the group at once, select Now under
Add to the group.
l To have the temporal members removed from the group on a certain date,
select On this date under Remove from the group, and choose the date
and time you want.
1. In the Web Interface, select the group, and then choose the Members command.
2. Review the list on the Members page:
l An icon of a small clock overlays the icon for the temporal members.
l If the Show pending members check box is selected, the list also includes
the temporal members that are not yet added to the group.
The list of group memberships for a particular object makes it possible to distinguish
between the groups in which the object is a regular member and the groups in which the
object is a temporal member. It is also possible to hide or display so-called pending group
memberships, the groups to which the object is scheduled to be added in the future.
1. In the Web Interface, select the object, then choose the Member Of command.
2. Review the list on the Member Of page:
l An icon of a small clock overlays the icon for the groups in which the object is a
temporal member.
l If the Show pending group memberships check box is selected, the
list also includes the groups to which the object is scheduled to be added
in the future.
To view or modify the start or end time setting for a member of a group
1. In the Web Interface, select the group, then choose the Members command.
2. In the list on the Members page, select the member, then click the Temporary
Access button.
3. To view or modify the start or end time settings, use the Temporal Membership
Settings dialog.
The Temporal Membership Settings dialog box provides the following options:
l Add to the group > Now: Adds the object to the group immediately.
l Add to the group > On this date: Adds the object to the group on the specified
date and time.
l Remove from the group > Never: Specifies that the object will not be removed
from the group automatically.
l Remove from the group > On this date: Removes the object from the group on
the specified date and time.
Regular members have the Add to group and Remove from group options set to
Already added and Never, respectively. To convert a regular member to a temporal
member, set a specific date with these options for the member.
NOTE: Consider the following when configuring temporal group memberships:
l You can view or modify the start time and end time settings by managing an object
rather than the groups in which that object has memberships. To do so, select the
object, then choose the Member Of command. On the Member Of page, select
the group for which you want to manage the object’s start or end time setting and
click Temporary Access.
l On the Members or Member Of page, you can change the start or end time
setting for multiple members or groups at a time. On the page, select multiple list
items, click Temporary Access, then, in the Temporal Membership Settings
dialog, make the changes you want.
NOTE: You can remove an object that is a temporal member of a group by managing the
object rather than the group. Select the object, then choose the Member Of command.
On the Member Of page, select the group from the list and click Remove.
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Active Directory.
The list of Active Directory domains is displayed.
3. Click the domain in which you want to create a new contact.
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Active Directory.
The list of Active Directory domains is displayed.
3. Click the specific domain, Container or the Organizational Unit, and then select the
check box corresponding to the specific contact for which you want to view or update
the Manager information.
4. In the Command pane, click Azure properties.
The Azure Properties dialog for the contact is displayed.
5. To view or modify properties of the Microsoft 365 contact, use the tabs in the Azure
Properties dialog.
6. After setting all the required properties, click Save.
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Active Directory.
The list of Active Directory domains is displayed.
3. Click the specific domain, Container or the Organizational Unit, and then the
specific contact.
4. In the Command pane, click Change History.
Change History displays the information on changes that were made to the contact
through Active Roles.
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Active Directory.
The list of Active Directory domains is displayed.
3. Click the specific domain, Container or the Organizational Unit, and then the specific
contact that you want to delete.
4. In the Command pane, click Delete.
The contact is deleted.
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Active Directory.
The list of Active Directory domains is displayed.
3. Click the domain in which you want to create a new user.
4. In the list of objects, click the required Container or the Organizational Unit.
5. In the Command pane, click New User.
6. In the New User in <OU name> > General wizard, enter the user details, for
example, First Name, Last Name, Initials, and User logon name.
7. Click Next.
8. In the Account properties wizard, to generate a password for the Account, click
Generate , select the required Account options and then click Next.
Alternatively, you can set the password manually and re-enter in the Confirm
Password field to confirm the entered password.
9. In the Create Azure Account wizard, select the option Create Azure Account.
The Azure AD account details for the new user are generated automatically and
populated in the respective fields.
NOTE: The Temporary Password field is populated with the default password
set for the Active Roles user. You can reset the password for the Azure AD account
if required.
10. Select the Tenant name from the Tenant list drop down. From the User
Principal Name drop-down list, select the AD domain to which you want to
associate the Azure AD user.
11. In Usage Location, select the geographical location where Active Roles will be used.
NOTE: Local rules and regulations for using products and services associated with
the configured user can vary by user location. As a result, the Usage Location
field is mandatory: if you do not select a country, Active Roles cannot assign
Microsoft licenses to the hybrid Azure user.
12. Click Next.
The Licenses wizard displays the Microsoft 365 licenses, for example the Microsoft
365 Business Essentials and Business Premium licenses, and the number of licenses
that are available to assign to the user.
You can view the assigned licenses on the user's Azure Properties > Licenses wizard.
You can view the assigned Microsoft 365 roles on the user's Azure Properties > O365
Roles wizard.
The results can also be viewed on the Azure portal's Licenses and Directory role tabs.
To view or modify the Azure AD user properties with the Web Interface
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Tree tab in the Browse pane, click Active Directory > <Domain> >
<Organizational Unit>.
The list of existing AD users are displayed.
3. Select the specific Azure AD user for which you want to view or modify the Azure
properties.
4. In the Command pane, click Azure Properties.
The Azure Properties wizard for the Azure AD user is displayed.
5. Use the fields in the Azure Properties wizard to view or modify the properties of the
Azure AD user.
6. After setting all the required properties, click Save.
You can view the modified settings on the Azure Portal.
1. In the Active Roles Web Interface, navigate to Directory Management > Tree
View > Active Directory.
The list of Active Directory (AD) domains configured in your organization appears.
2. Click the specific domain, container or Organizational Unit (OU) where the hybrid
Azure user is managed.
3. To view the management properties of the user, select the user, then click General
properties > Managed by.
4. To modify the management properties of the user, in the Managed by tab, click
Change. Then, use the Select Objects dialog to locate and select the manager to
assign to the user. To apply your selection, click OK.
The new manager then appears in the Manager field.
5. To apply your changes, click Save.
The Azure Properties > Manager ID field will then display the new manager
information.
TIP: To verify the changes in Microsoft Azure, check the Work Info > Manager ID value
of the Azure Portal.
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Active Directory.
The list of Active Directory domains is displayed.
3. Click the specific domain, container or the Organizational Unit, and then the specific
user that you want to disable.
4. In the Command pane, click Disable.
The account is disabled and marked with a disabled icon.
If you want to enable a previously disabled Azure AD user, see Enabling an Azure AD user.
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Active Directory.
The list of Active Directory domains is displayed.
3. Click the specific domain, container or the Organizational Unit, and then the specific
user that you want to disable.
4. To enable a disabled account, select the disabled account and in the Command pane
click Enable.
NOTE: The Enable command only appears for a disabled account.
The account is enabled again.
If you want to disable a previously enabled Azure AD user, see Disabling an Azure AD user.
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Active Directory.
The list of Active Directory domains is displayed.
3. Select the user, and in the Command pane, click Deprovision.
A message is displayed prompting you to confirm the account deprovision.
4. Click Yes, to continue.
Wait while Active Roles updates the user.
If you want to undo the deprovisioning of an Azure AD user, see Undo deprovisioning of an
Azure AD user.
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Active Directory.
The list of Active Directory domains is displayed.
3. Select the user, and in the Command pane, click Undo Deprovisioning.
The Password Options dialog is displayed.
4. Select the option to Leave the Password unchanged or Reset the password,
and click OK.
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Active Directory.
The list of Active Directory domains is displayed.
3. Click the specific domain, container or the Organizational Unit, and then the specific
user that you want to add to a group.
4. Select the user and in the Command pane click Member Of.
The existing Group information for the user is displayed.
5. To add the user to another group, in the <User> (objects found) wizard,
click Add.
6. In the Select Object wizard, search and select the group to which you want to
add the user.
7. In details pane, right-click the user, and then click Add to a Group.
The <User> (objects found) wizard displays all the groups to which the account
has been added as a member.
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Active Directory.
The list of Active Directory domains is displayed.
3. Click the specific domain, container or the Organizational Unit, and then the specific
user that you want to remove from a group.
4. Select the user and in the Command pane click Member Of.
The existing Group information for the user is displayed.
5. In the <User> (objects found) wizard, select the group from which you want to
remove the user and click Remove.
A message prompts you to confirm the action.
6. Click Yes to continue.
The group information is removed from the <User> (objects found) wizard.
If you want to add an existing Azure AD user to a group, see Adding an Azure AD
user to a group.
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Active Directory.
The list of Active Directory domains is displayed.
3. Click the specific domain, container or the Organizational Unit, and then the
specific user.
4. In the Command pane, click Change History or User Activity.
Prerequisites
Only Global Admins can delete Azure users with any roles assigned to them.
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Active Directory.
The list of Active Directory domains is displayed.
3. Click the specific domain, container or the Organizational Unit, and then the specific
user that you want to delete.
4. In the Command pane, click Delete.
The account is deleted.
NOTE: In a hybrid environment, the user must be deleted in the on-premises AD first and
then the changes must be synchronized with Azure AD. In case, the user is deleted in
Azure AD first, the Active Roles Web Interface still displays the Azure properties link for
the deleted user but with no information. Further modification of the Azure properties for
the deleted user will not be valid.
To create new hybrid Azure users, your organization must meet the following
requirements:
l To enable remote mailboxes, the Exchange management tools of an on-premises
Microsoft Exchange installation must be available. For more information on the
Microsoft Exchange Server versions supported by Active Roles, see System
requirements in the Active Roles Release Notes.
l The Active Roles service account must be a part of the Recipient Management
management role group to run Exchange hybrid commands.
1. In the Active Roles Web Interface, under Directory Management > Tree > Active
Directory, navigate to the OU where you want to create the new hybrid Azure user.
2. In the list of actions available for the selected OU, click New User.
3. In the General step, specify the following information as required by your
organization:
l First name: The first name of the user.
l Last name: The last name of the user.
l (Optional) Initials: The initials of the user.
l Name: The fully-qualified user name of the user. By default, Active Roles
automatically fills this property based on the specified First name, Last
name, and Initials.
l Display name: The name of the user as it will appear in Active Directory.
By default, Active Roles automatically fills this property based on the
specified Name.
l User logon name: The user name used to log in to the domain. The User
logon name also contains a user principal name (UPN) suffix. To configure the
appropriate UPN suffix, use the drop-down button and select the appropriate
l Account options: Use these options to specify additional security settings for
the user (for example, to have them change the configured password during
their next login attempt, or have the configured password expire after some
1. In the Active Roles Web Interface, under Directory Management > Tree > Active
Directory, navigate to the OU where you want to license the on-premises user.
2. Select the user that you want to license, then in the list of actions, click Azure
Properties.
3. In the Licenses step, select Exchange Online (Plan 2), and click Finish.
1. In the Active Roles Web Interface, under Directory Management > Tree > Active
Directory, navigate to the OU of the hybrid user whose Exchange Online properties
you want to view or modify.
2. Select the user whose Exchange Online properties you want to check, then in the list
of actions, click Exchange Online Properties.
3. In the available Exchange Online Properties tabs, configure the Exchange Online
mailbox settings as you need.
Page Description
Mail Flow Settings View and configure rules for the emails that the mailbox sends
or receives via the Exchange Online service.
General View and configure the email addresses associated with the
mailbox.
Mailbox Features View and configure various Exchange Online mailbox features,
for example mobile access, additional mailbox protocols, or
archival settings.
Such mail flow settings are typically configured if the organization enforces specific email
messaging policies for users and guest users.
1. On the Active Roles Web Interface, navigate to Directory Management > Tree
View > Azure > <azure-tenant> > Azure Users (or Azure Guest Users).
2. From the list in the middle pane, select the Azure user or Azure guest user that you
want to update.
3. To open the Exchange Online properties of the selected Azure user or guest user,
click Exchange Online Properties on the right pane.
4. To open the mail flow settings, click the Mail Flow Settings tab.
1. On the Active Roles Web Interface, navigate to Directory Management > Tree
View > Azure > <azure-tenant> > Azure Users (or Azure Guest Users).
2. From the list in the middle pane, select the Azure user or Azure guest user that you
want to update.
3. To open the Exchange Online properties of the selected Azure user or guest user,
click Exchange Online Properties on the right pane.
4. To open the delegation settings, click the Delegation tab.
5. To delegate Send as permission to a user (or users), click Add... under the
Send As list.
6. Select the user(s) you want to grant Send as rights for the email address,
then click OK.
7. To delegate Full Access permission to a user (or users) click Add... under the Full
Access list.
8. Select the user(s) you wish to grant Full access rights for the email address,
then click OK.
9. To remove a delegated user either from the Send As or Full Access list, click
Remove and select the user(s) you want to revoke the permission from.
10. To apply your changes, click Save, then Close.
1. On the Active Roles Web Interface, navigate to Directory Management > Tree
View > Azure > <azure-tenant> > Azure Users (or Azure Guest Users).
2. From the list in the middle pane, select the Azure user or Azure guest user that you
want to update.
6. From the E-mail address type list, select the email account type applicable to your
organization.
7. In the E-mail address text box, specify the address of the new account.
1. On the Active Roles Web Interface, navigate to Directory Management > Tree
View > Azure > <azure-tenant> > Azure Users (or Azure Guest Users).
2. From the list in the middle pane, select the Azure user or Azure guest user that you
want to update.
3. To open the Exchange Online properties of the selected Azure user or guest user,
click Exchange Online Properties on the right pane.
4. To open the email address settings, click the General tab.
5. To open the settings of an email address, select the email address, then click Edit....
6. In the E-mail address text box, modify the current email address.
NOTE: You cannot modify the E-mail address type of an existing email account.
You can only change the name of the existing address.
7. To apply your changes, click OK.
8. To close the Exchange Online Properties window, click Close.
1. On the Active Roles Web Interface, navigate to Directory Management > Tree
View > Azure > <azure-tenant> > Azure Users (or Azure Guest Users).
2. From the list in the middle pane, select the Azure user or Azure guest user that you
want to update.
3. To open the Exchange Online properties of the selected Azure user or guest user,
click Exchange Online Properties on the right pane.
4. To open the email address settings, click the General tab.
5. In the E-mail addresses list, select the address you want to remove.
6. Click Remove and confirm the deletion of the email address.
7. To close the Exchange Online Properties window, click Close.
1. On the Active Roles Web Interface, navigate to Directory Management > Tree
View > Azure > <azure-tenant> > Azure Users (or Azure Guest Users).
2. From the list in the middle pane, select the Azure user or Azure guest user that you
want to update.
3. To open the Exchange Online properties of the selected Azure user or guest user,
click Exchange Online Properties on the right pane.
4. To open the mailbox feature settings, click the Mailbox Features tab.
5. Select the Exchange Online mailbox feature that you want to enable or disable:
l Outlook Mobile Access: Enables or disables the Outlook Mobile Access
(OMA) mobile browsing service for the mailbox. Enabling this settings allows
the mailbox user use OMA on their mobile device to access their account.
l Exchange ActiveSync: Enables or disables the Exchange ActiveSync
synchronization protocol for the mailbox. Enabling this setting allows the
mailbox user synchronize their configured mobile device with their mailbox.
l Up-to-Date Notifications: Enables or disables the Up-to-date (UTD) feature
notifications for the mailbox.
l Outlook Web App: Enables or disables access to the browser-based Outlook
Web App for the mailbox user.
1. On the Active Roles Web Interface, navigate to Directory Management > Tree
View > Azure > <azure-tenant> > Azure Users (or Azure Guest Users).
2. From the list in the middle pane, select the Azure user or Azure guest user that you
want to update.
3. To open the Exchange Online properties of the selected Azure user or guest user,
click Exchange Online Properties on the right pane.
4. To open the MRM settings, click the Mailbox Settings tab.
Figure 10: Exchange Online Properties > Mailbox Settings — Accessing the
MRM settings of an Exchange Online mailbox
6. To enable placing the entire contents of the user mailbox on hold, enable the Enable
litigation hold check box. For more information on the Litigation Hold feature of
Exchange Online, see the In-Place Hold and Litigation Hold page of the official
Microsoft documentation.
7. (Optional) If your organization has an internal resource on the litigation hold
practices, specify its URL in the Messaging records management description
URL text box.
8. (Optional) If you want to display a customized message in Outlook for the mailbox
user on the litigation hold, write the message in the Comments text box.
9. Click Save to apply your changes and close the Messaging Records
Management dialog.
10. To close the Exchange Online Properties window, click Close.
For more information on creating a new Azure AD user using the Management Shell
interface, see the Active Roles Management Shell Help.
For more information on modifying an Azure AD user using the Management Shell
interface, see the Active Roles Management Shell Help.
NOTE: The Set-QADUser cmdlet does not work for Azure attributes in Synchronized
Identity and Federated environment.
For more information on viewing the Azure AD users using the Management Shell interface,
see the Active Roles Management Shell Help.
For more information on deleting a user from Azure using the Management Shell interface,
see the Active Roles Management Shell Help.
NOTE: In Synchronized or Federated environment, remove-QADObject removes the
user from AD and then gets synchronized to the Azure portal.
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Active Directory.
The list of Active Directory domains is displayed.
3. Click the specific domain, container or the Organizational Unit, and then select the
specific user for which you want to view or update the properties.
4. In the Command pane, click Azure properties.
The Azure Properties dialog for the user is displayed.
5. In the Azure Properties dialog, click Settings.
6. If the usage location is not entered in the Usage Location field, select the location
where the product will be used, and click Save.
NOTE: Local rules and regulations for using products and services associated with
the configured user can vary by user location. As a result, the Usage Location
field is mandatory: if you do not select a country, Active Roles cannot assign
Microsoft licenses to the hybrid Azure user.
Alternatively, to assign the Microsoft 365 license to the user if the product usage
location has been entered for the user earlier, navigate to the Licenses wizard.
7. Re-open the Azure Properties dialog for the user, and click Licenses.
The Licenses wizard displays the Microsoft 365 licenses, for example Microsoft 365
Business Essentials and Business Premium licenses, that are available for assigning
to the user.
8. Select the license that you want to assign to the user.
To modify or remove the Microsoft 365 license assigned to existing hybrid users
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Active Directory.
The list of Active Directory domains is displayed.
3. Click the specific domain, container or the Organizational Unit, and then select the
specific user for which you want to view or update the properties.
4. In the Command pane, click Azure Properties.
5. In the Azure Properties dialog, click Licenses.
The Licenses wizard displays the Microsoft 365 licenses, for example, Microsoft 365
Business Essentials and Business Premium licenses, that are available and assigned
to the user.
6. Click the drop-down arrow next to the available licenses.
The products that are included and assigned to the user in the license are displayed.
7. Select or clear the check box next to the product included in the license that you want
to enable or remove for the user.
8. Click Save.
NOTE: Consider the following when modifying or removing Microsoft 365 licenses
assigned to hybrid users:
l When you deprovision or delete a user, all the licenses that were assigned to the
user are removed. You can assign these licenses to other hybrid users.
l When you undo deprovision a hybrid user, the license assignment gets restored to
this user when the undo deprovision operation is completed successfully.
l For information on Azure AD user deprovisioning policy for Microsoft 365 licenses
management see Office 365 Licenses Retention in the Active Roles
Administration Guide.
IMPORTANT: The Active Roles Web Interface only displays Azure roles that have
been enabled. To list the Microsoft 365 Roles on the Web Interface, run the
following commands.
l To get the guest inviter directory role template, run $roleTemplate = Get-
AzureADDirectoryRoleTemplate | ? { $_.DisplayName -eq "Guest Inviter" }.
l To enable an instance of the DirectoryRole template, run Enable-
AzureADDirectoryRole -RoleTemplateId $roleTemplate.ObjectId.
For more information on allowing the Azure roles to be listed on the Web Interface, see
Enabling Azure Roles in the Active Roles Administration Guide.
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Active Directory.
To check the Microsoft 365 roles assigned to the user, select the user, then navigate to
Azure Properties > O365 wizard.
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Active Directory.
The list of Active Directory domains is displayed.
3. Click the specific domain, Container or the Organizational Unit, and then select the
specific user for which you want to view or update the properties.
4. In the Command pane, click Azure properties.
5. In the Azure Properties dialog, click O365 Roles tab.
6. Click the specific domain, Container or the Organizational Unit, and then select the
specific user for which you want to view or update the properties.
NOTE: When a user is deprovisioned, all the roles that were assigned to the user
are retained.
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Active Directory.
The list of Active Directory domains is displayed.
3. Click the domain in which you want to create a new group.
4. In the list, click the required Container or the Organizational Unit.
5. In the Command pane, click New Group.
6. In the General Properties > New Group > <OU name> wizard, enter the group
details such as group name, pre-Windows 2000 group name, description, group
scope, and group type.
Group scope provides the option to create a Global or Universal group, and
Group type enables you to create a Security or Distribution group.
7. Click Next.
8. In the Create Azure Group wizard, select Create Azure Group.
Select the Tenant name from the Tenant list drop down. The Azure AD details for
the new group are generated automatically and populated in the respective fields.
NOTE: To set values for additional properties in the General Properties wizard,
select the check-box corresponding to Open properties for this object when I
click Finish.
9. Click Finish.
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Active Directory.
The list of Active Directory domains is displayed.
3. Click the specific domain, Container or the Organizational Unit, and then the specific
group for which you want to view or update the Azure AD group properties.
4. In the Command pane, click Azure properties.
The Azure Properties wizard for the group account is displayed.
5. To view or modify properties of the Azure AD group, use the tabs in the Azure
Properties wizard.
6. After setting all the required properties, click Save.
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Active Directory.
The list of Active Directory domains is displayed.
3. Click the specific domain, Container or the Organizational Unit, and then the specific
group to which you want to add members.
4. Select the Azure AD group and in the Command pane click Members.
The existing member information for the group is displayed.
5. To add a user to the group, in the <Group> (objects found) wizard, click Add.
6. In the Select Object wizard, search and select the members that you want to add
to the group.
NOTE: To specify the date and time when the selected members should be added
or removed from the group, click Temporal Membership Settings.
7. Click OK.
The <Group> (objects found) wizard displays all the members that are added
to the group.
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Active Directory.
To view the change history of an Azure AD group with the Web Interface
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Active Directory.
The list of Active Directory domains is displayed.
3. Click the specific domain, Container or the Organizational Unit, and then the
specific user.
4. In the Command pane, click Change History.
The information on changes that were made to the group properties through Active
Roles is displayed.
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Active Directory.
For more information on creating a newAzure AD group using the Management Shell
interface, see the Active Roles Management Shell Help.
For more information on modifying an Azure AD user using the Management Shell
interface, see the Active Roles Management Shell Help.
For more information on adding or removing a member from an Azure AD group using the
Management Shell interface, see the Active Roles Management Shell Help.
For more information on deleting a group from Azure AD using the Management Shell
interface, see the Active Roles Management Shell Help.
NOTE: You cannot use the Active Roles Web Interface to synchronize existing M365
groups. To synchronize M365 groups, configure an M365 synchronization schedule task
with the Active Roles Console (also known as the MMC Interface). For more information,
see Scheduling an Azure object synchronization task.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Microsoft 365 Groups.
The list of existing M365 groups in the selected Azure tenant appears.
NOTE: When opening the list of Microsoft 365 Groups the first time, Active Roles
checks and fetches all existing M365 groups that may exist in the Azure cloud. This
action is performed automatically and may take a few minutes to complete.
2. In the right-side pane, click New Group.
The New Group in Microsoft 365 Groups window appears.
NOTE: You cannot change the Exchange Online alias of an existing M365 group.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Microsoft 365 Groups.
The list of existing M365 groups in the selected Azure tenant appears.
NOTE: When opening the list of Microsoft 365 Groups the first time, Active Roles
checks and fetches all existing M365 groups that may exist in the Azure cloud. This
action is performed automatically and may take a few minutes to complete.
2. Select the group that you want to configure.
3. In the right-side pane, click Azure Properties.
4. In the left-side pane of the Azure Properties window, click Properties.
5. (Optional) Specify the Group Azure Display Name of the configured group.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Microsoft 365 Groups.
The list of existing M365 groups in the selected Azure tenant appears.
NOTE: When opening the list of Microsoft 365 Groups the first time, Active Roles
checks and fetches all existing M365 groups that may exist in the Azure cloud. This
action is performed automatically and may take a few minutes to complete.
2. Select the group that you want to configure.
3. In the right-side pane, click Azure Properties.
4. To list the owners of the selected group, click the Owners tab of the Azure
Properties window.
5. Click Add to add a new owner (or owners) to the selected group.
6. In the Select Object page, use the search field to find the users or guest users in the
Azure tenant that you want to specify as owners.
The users and guest users meeting the search criteria will appear in the Display
Name column.
7. Select the check boxes of the users or guest users you want to specify as owners
of the group. The selected users will be listed in the lower pane of the Select
Object page.
8. (Optional) To search for additional users or guest users, enter another search string.
After that, select the users or guest users you want to add from the updated list.
9. To apply your changes, click OK. The Owners page will be updated with the
new settings.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Microsoft 365 Groups.
The list of existing M365 groups in the selected Azure tenant appears.
NOTE: When opening the list of Microsoft 365 Groups the first time, Active Roles
checks and fetches all existing M365 groups that may exist in the Azure cloud. This
action is performed automatically and may take a few minutes to complete.
2. Select the group that you want to configure.
3. In the right-side pane, click Azure Properties.
4. To list the owners of the selected group, click the Owners tab of the Azure
Properties window.
5. Select the owners whose ownership you want to revoke, and click Remove. The
selected owners are removed from the list of owners.
6. To apply your changes, click OK. The Owners page will be updated with the
new settings.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Microsoft 365 Groups.
The list of existing M365 groups in the selected Azure tenant appears.
NOTE: When opening the list of Microsoft 365 Groups the first time, Active Roles
checks and fetches all existing M365 groups that may exist in the Azure cloud. This
action is performed automatically and may take a few minutes to complete.
2. Select the group that you want to configure.
3. In the right-side pane, click Members.
The Members page then appears with the list of members in the selected group.
4. Click Add to add a new member (or members) to the group.
5. In the Select Object page, use the search field to find the users or guest users in the
Azure tenant that you want to add as members.
The users and guest users that meet the search criteria will appear in the Display
Name column.
6. Select the check boxes of the users or guest users you want to add as members to
the group. The selected users or guest users will be listed in the lower pane of the
Select Object page.
7. (Optional) To search for additional users or guest users, enter another search string.
After that, select the users or guest users you want to add as members from the
updated list.
8. To apply your changes, click OK. The Members page will be updated with the new
membership settings.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Microsoft 365 Groups.
The list of existing M365 groups in the selected Azure tenant appears.
NOTE: When opening the list of Microsoft 365 Groups the first time, Active Roles
checks and fetches all existing M365 groups that may exist in the Azure cloud. This
action is performed automatically and may take a few minutes to complete.
2. Select the group that you want to configure.
3. In the right-side pane, click Members.
The Members page then appears with the list of members in the selected group.
4. To remove a member (or members) from the selected group, select the members
from the Members Name list, and click Remove.
The selected members are removed from the Members Name list.
5. To apply your changes, click OK. The Members page will be updated with the new
membership settings.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Microsoft 365 Groups.
The list of existing M365 groups in the selected Azure tenant appears.
NOTE: When opening the list of Microsoft 365 Groups the first time, Active Roles
checks and fetches all existing M365 groups that may exist in the Azure cloud. This
action is performed automatically and may take a few minutes to complete.
2. Select the group whose members you want to check.
3. In the right-side pane, click Dynamic Members.
The Dynamic Members page then appears with the list of members in the
selected group.
NOTE: The Change History option of the Active Roles Web Interface lists only group
modifications that were performed in Active Roles. It does not list the changes of the
group that were performed outside Active Roles, for example in Azure Portal.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Microsoft 365 Groups.
The list of existing M365 groups in the selected Azure tenant appears.
NOTE: When opening the list of Microsoft 365 Groups the first time, Active Roles
checks and fetches all existing M365 groups that may exist in the Azure cloud. This
action is performed automatically and may take a few minutes to complete.
2. Select the group whose change history you want to check.
3. In the right-side pane, click Change History.
The Change History page then appears, with the newest change of the group listed
at the top of the page.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Microsoft 365 Groups.
The Microsoft 365 Groups page then opens with the available Azure M365 Groups
in the Azure tenant.
2. Select the group that you want to delete.
The selected M365 group is then deleted from the Azure tenant.
1. In the Active Roles Console, in the Active Directory (AD) tree, navigate to
Configuration > Server Configuration > Scheduled Task > Builtin.
2. Open the scheduling properties of the Sync Azure O365 Objects built-in scheduled
task. To do so, either:
l Double-click Sync Azure O365 Objects, then in the Properties window,
open the Schedule tab.
l Right-click Sync Azure O365 Objects, then click Properties > Schedule.
3. To customize the scheduling settings of the task, open the Properties >
Schedule tab.
4. To change the default scheduling settings of the task for your needs, modify the
options of the Schedule tab accordingly:
TIP: If the contents of the Members and/or Azure Properties actions in the Active
Roles Web Interface for an Azure object differ from the object information available on
the Azure Portal, One Identity recommends running the scheduled Sync Azure O365
Objects task manually to synchronize the Azure objects and Azure tenant information.
1. In the Active Roles Web Interface, navigate to Directory Management > Tree >
Azure > <azure-tenant-name> > Distribution Groups.
1. In the Active Roles Web Interface, navigate to Directory Management > Tree >
Azure > <azure-tenant-name> > Distribution Groups.
2. Select the distribution group whose properties you want to view or modify.
3. Click Distribution Group Properties.
4. In General, set the following general properties of the distribution group:
l (Optional) Enter the Display name of the distribution group.
NOTE: This window also shows the Name of the distribution group, specify-
ing its unique Exchange Online identity. To change the Name of the distri-
bution group, use the Rename action.
For more information, see Renaming a distribution group.
l (Optional) Enter a Description for the distribution group.
l Primary SMTP address: The primary Simple Mail Transfer Protocol (SMTP)
address of a user account to be used for server-to-server authorization or
access delegation. You cannot modify this value because it is filled
1. In the Active Roles Web Interface, navigate to Directory Management > Tree >
Azure > <azure-tenant-name> > Distribution Groups.
2. Select the distribution group whose members you want to view or modify.
3. Click Members.
4. In Members, specify the members of the distribution group.
NOTE: In the Active Roles Web Interface, adding Azure guest users to a distribution
group as members right after assigning them the Exchange Online Plan 2 license
will fail because it may take several minutes for the user object(s) to be created in
Exchange Online. To add guest users with newly assigned Exchange Online Plan 2
licenses to a distribution group, wait several minutes.
l To add members to the distribution group, select the users, contacts or
distribution groups and click OK.
l To remove members from the distribution group, select the users, contacts or
distribution groups and click OK.
5. To apply your changes, click Save.
1. In the Active Roles Web Interface, navigate to Directory Management > Tree >
Azure > <azure-tenant-name> > Distribution Groups.
1. In the Active Roles Web Interface, navigate to Directory Management > Tree >
Azure > <azure-tenant-name> > Distribution Groups.
2. Select the distribution group whose message approval settings you want to
view or modify.
3. Click Message Approval.
4. In Message Approval, set the following message approval settings of the
distribution group:
l Require moderator approval for messages sent to this group: Select
this check box if group moderators must approve messages to appear.
(default: selected)
l Group moderators: If Require moderator approval for
message sent to this group is selected, add moderators to
approve or reject messages.
l To add users to the list of Group moderators, click Add, select
the user and click OK.
l To remove users from the list of Group moderators, select the
user and click Remove.
l (Optional) Add senders who don't require message approval: If Require
moderator approval for message sent to this group is selected,
add users whose messages can appear without moderator approval.
l To add users to the list of Senders who don't require message
approval, click Add, select the users and click OK.
l To remove users from the list of Senders who don't require
message approval, select the users and click Remove.
l Notify a sender if their message isn't approved: If Require
moderator approval for message sent to this group is
selected, specify whether senders receive a notification if their
messages get rejected.
l Only sender
1. In the Active Roles Web Interface, navigate to Directory Management > Tree >
Azure > <azure-tenant-name> > Distribution Groups.
2. Select the distribution group whose delivery management settings you want to
view or modify.
3. Click Delivery Management.
4. In Delivery Management, set the following delivery management settings of the
distribution group.
l Only allow messages from people inside my organization: Clear this
check box to allow people outside your organization to send messages to this
group. (default: selected)
l Accept messages only from these designated senders: To restrict
receiving messages from certain users only, specify the allowed senders in
this setting.
l To add users to the list of Accept messages only from these
designated senders, click Add, select the users and click OK.
1. In the Active Roles Web Interface, navigate to Directory Management > Tree >
Azure > <azure-tenant-name> > Distribution Groups.
2. Select the distribution group whose delegates you want to view or modify.
3. Click Delegates.
4. In Delegates, set the following delegate settings of the distribution group:
l Send on behalf to
Only delegates in the Send on behalf to list can send messages on behalf of
this group.
l To add delegates to the Send on behalf to list, click Add, select the
users and click OK.
l To remove delegates from the Send on behalf to list, select the users
and click Remove.
l Send as
Only delegates in the Send as list can send messages from this group. To the
recipient, the message will appear as a message sent by this group.
1. In the Active Roles Web Interface, navigate to Directory Management > Tree >
Azure > <azure-tenant-name> > Distribution Groups.
2. Select the distribution group whose change history you want to view.
3. Click Change History.
1. In the Active Roles Web Interface, navigate to Directory Management > Tree >
Azure > <azure-tenant-name> > Distribution Groups.
2. Click Delete.
3. To confirm, click Yes.
1. In the Active Roles Web Interface, navigate to Directory Management > Tree >
Azure > <azure-tenant-name> > Dynamic Distribution Groups.
1. In the Active Roles Web Interface, navigate to Directory Management > Tree >
Azure > <azure-tenant-name> > Dynamic Distribution Groups.
2. Select the dynamic distribution group whose properties you want to view or modify.
3. Click Dynamic Distribution Group Properties.
4. In General, set the following general properties of the dynamic distribution group:
l Enter the Name of the dynamic distribution group.
l (Optional) Enter the Display name of the dynamic distribution group.
l (Optional) Enter a Description for the dynamic distribution group.
l Primary SMTP address: The primary Simple Mail Transfer Protocol (SMTP)
address of a user account to be used for server-to-server authorization or
access delegation. You cannot modify this value because it is filled
automatically.
l (Optional) Hide this group from the global address list (default: selected)
Select this check box if you do not want the group to appear in the address
book and other address lists defined in your Exchange organization.
5. In Owners, set the owner of the dynamic distribution group.
NOTE: You can only set one owner for a dynamic distribution group.
l To add or change the owner of the dynamic distribution group, click Modify,
select the user and click OK.
l To view the Azure AD properties of the owner, click Properties.
l To remove the owner of the dynamic distribution group, select the users and
click Remove.
6. In Members, set the type of recipients that will be members of the dynamic
distribution group.
1. In the Active Roles Web Interface, navigate to Directory Management > Tree >
Azure > <azure-tenant-name> > Dynamic Distribution Groups.
Figure 23: Directory Management > Tree > Azure > <azure-tenant-name>
> Dynamic Distribution Groups — Listing the Azure dynamic distribution
groups in the Azure tenant.
2. Select the dynamic distribution group whose members you want to view or modify.
3. Click Members.
1. In the Active Roles Web Interface, navigate to Directory Management > Tree >
Azure > <azure-tenant-name> > Dynamic Distribution Groups.
Figure 24: Directory Management > Tree > Azure > <azure-tenant-name>
> Dynamic Distribution Groups — Listing the Azure dynamic distribution
groups in the Azure tenant.
1. In the Active Roles Web Interface, navigate to Directory Management > Tree >
Azure > <azure-tenant-name> > Dynamic Distribution Groups.
Figure 25: Directory Management > Tree > Azure > <azure-tenant-name>
> Dynamic Distribution Groups — Listing the Azure dynamic distribution
groups in the Azure tenant.
2. Select the dynamic distribution group whose delivery management settings you want
to view or modify.
3. Click Delivery Management.
4. In Delivery Management, set the following delivery management settings of the
distribution group.
l Only allow messages from people inside my organization: To allow
people outside your organization to send messages to this group, clear this
check box. (default: selected)
l Accept messages only from these designated senders: To restrict
receiving messages from certain users only, specify the allowed senders in
this setting.
NOTE: You can only add users to the list with an Exchange Online Plan 2
license assigned to them.
l To add users to the list of Accept messages only from these
designated senders, click Add, select the users and click OK.
l To remove users from the list of Accept messages only from these
designated senders, select the users and click Remove.
5. To apply your changes, click Save.
1. In the Active Roles Web Interface, navigate to Directory Management > Tree >
Azure > <azure-tenant-name> > Dynamic Distribution Groups.
Figure 26: Directory Management > Tree > Azure > <azure-tenant-name>
> Dynamic Distribution Groups — Listing the Azure dynamic distribution
groups in the Azure tenant.
2. Select the dynamic distribution group whose delegates you want to view or modify.
3. Click Delegates.
4. In Delegates, set the following delegate settings of the distribution group:
l Send on behalf to
Only delegates in the Send on behalf to list can send messages on behalf of
this group.
NOTE: You can only add users to the list with an Exchange Online Plan 2
license assigned to them.
l To add delegates to the Send on behalf to list, click Add, select the
users and click OK.
l To remove delegates from the Send on behalf to list, select the users
and click Remove.
l Send as
NOTE: In the Active Roles Web Interface, you can add Azure dynamic distribution groups
to Azure distribution groups only, but you cannot add them to Azure O365 groups or
Azure security groups. You can add a dynamic distribution group to an Azure O365 group
or Azure security group in the Microsoft 365 admin center.
1. In the Active Roles Web Interface, navigate to Directory Management > Tree >
Azure > <azure-tenant-name> > Dynamic Distribution Groups.
2. Select the dynamic distribution group whose membership you want to view or
configure.
3. Click Azure Member Of. The list of Azure distribution groups where the dynamic
distribution group has a membership appears.
l To add the dynamic distribution group to a new Azure distribution group of the
Azure tenant, click Add, select the distribution group(s) you want the dynamic
distribution group to be a member of, and click OK.
l To remove the dynamic distribution group from any distribution group(s),
in Azure Member Of, select the distribution group(s), click Remove,
and click OK.
1. In the Active Roles Web Interface, navigate to Directory Management > Tree >
Azure > <azure-tenant-name> > Dynamic Distribution Groups.
2. Select the dynamic distribution group whose change history you want to view.
3. Click Change History.
1. In the Active Roles Web Interface, navigate to Directory Management > Tree >
Azure > <azure-tenant-name> > Dynamic Distribution Groups.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Security Groups.
The list of existing Azure security groups in the selected Azure tenant appears.
2. In the right-side pane, click New Group.
The New Group in Security Groups window appears.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Security Groups.
The list of existing Azure security groups in the selected Azure tenant appears.
2. Select the group that you want to configure.
3. In the right-side pane, click Azure Properties.
4. In the left-side pane of the Azure Properties window, click Properties.
5. (Optional) Specify the Group Azure Display Name of the configured group.
TIP: You can configure multiple groups with the same Group Azure Display
Name in the same Azure tenant.
6. (Optional) Provide a short Description for the group.
7. (Optional) Configure the Membership type of the group:
l Assigned: When selected, you can add or remove members to or from the
group manually later. For more information, see Adding or removing members
from an Azure security group with the Web Interface.
l Dynamic Members: When selected, Active Roles sets up the group as a
dynamic membership group, and will automatically update group membership
based on the configured Dynamic membership rule syntax.
TIP: Consider the following when configuring the Membership type:
l Select Dynamic Members to quickly configure a group based on a certain
membership logic. For example, if you need to set up a group for employees
from the same geographical location, business unit, or functional area, One
Identity recommends configuring the group with Dynamic Members.
l If you select Dynamic Members, you will not be able to manually add
or remove members to or from the Azure security group, unless you
change its Membership type to Assigned later. However, you can still
manually configure the owner(s) for a dynamic Azure security group, as
described in Adding or removing owners from an Azure security group
with the Web Interface.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Security Groups.
The list of existing Azure security groups in the selected Azure tenant appears.
2. Select the group that you want to configure.
3. In the right-side pane, click Azure Properties.
4. To list the owners of the selected group, click the Owners tab of the Azure
Properties window.
5. Click Add to add a new owner (or owners) to the selected group.
6. In the Select Object page, use the search field to find the users or guest users in the
Azure tenant that you want to specify as owners.
The users and guest users meeting the search criteria will appear in the Display
Name column.
7. Select the check boxes of the users or guest users you want to specify as owners
of the group. The selected users will be listed in the lower pane of the Select
Object page.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Security Groups.
The list of existing Azure security groups in the selected Azure tenant appears.
2. Select the group that you want to configure.
3. In the right-side pane, click Azure Properties.
4. To list the owners of the selected group, click the Owners tab of the Azure
Properties window.
5. Select the owners whose ownership you want to revoke, and click Remove. The
selected owners are removed from the list of owners.
6. To apply your changes, click OK. The Owners page will be updated with the
new settings.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Security Groups.
The list of existing Azure security groups in the selected Azure tenant appears.
2. Select the group that you want to configure.
3. In the right-side pane, click Members.
The Members page then appears with the list of members in the selected group.
4. Click Add to add a new member (or members) to the group.
5. In the Select Object page, use the search field to find the users, guest users or
Azure security groups in the Azure tenant that you want to add.
The users, guest users and Azure security groups that meet the search criteria will
appear in the Display Name column.
6. Select the check boxes of the users, guest users or Azure security groups that you
want to add to the group. The selected objects will appear in the lower pane of the
Select Object page.
7. (Optional) To search for additional users, guest users or Azure security groups, enter
another search string. After that, select the objects you want to add from the
updated list.
8. To apply your changes, click OK. The Members page will be updated with the new
membership settings.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Security Groups.
The list of existing Azure security groups in the selected Azure tenant appears.
2. Select the group that you want to configure.
3. In the right-side pane, click Members.
The Members page then appears with the list of members in the selected group.
4. To remove a member (or members) from the selected group, select the members
from the Members Name list, and click Remove.
The selected members are removed from the Members Name list.
5. To apply your changes, click OK. The Members page will be updated with the new
membership settings.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Security Groups.
The list of existing Azure security groups in the selected Azure tenant appears.
2. Select the group whose members you want to check.
3. In the right-side pane, click Dynamic Members.
The Dynamic Members page then appears with the list of members in the
selected group.
NOTE: The Change History option of the Active Roles Web Interface lists only group
modifications that were performed in Active Roles. It does not list the changes of the
group that were performed outside Active Roles, for example in Azure Portal.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Security Groups.
The list of existing Azure security groups in the selected Azure tenant appears.
2. Select the group whose change history you want to check.
3. In the right-side pane, click Change History.
The Change History page then appears, with the newest change of the group listed
at the top of the page.
4. To close the Change History window, click any Tree node, or any option listed in
the right-side pane.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Security Groups.
The list of existing Azure security groups in the selected Azure tenant appears.
2. Select the group that you want to delete.
3. In the right-side pane, click Delete.
4. A confirmation dialog appears. To confirm the deletion of the group, click Yes.
The selected Azure security group is then deleted from the Azure tenant.
When you create a new cloud-only Azure user for your organization, you must:
1. Specify a User Principal Name (UPN) and password for the Azure user.
2. Select the organization domain where the Azure user will be located within the
Azure tenant.
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Azure > <Azure tenant> >
Azure Users.
The Azure Users page is displayed and lists the Azure users that are
available in Azure.
NOTE: Active Roles lists the available cloud-only Azure users, Azure guest
users, and Azure contacts on the Active Roles Web Interface with the following
restrictions:
l Active Roles can initially list 999 items.
l The items listed in the list have a sliding expiry of 8 hours, after which the
objects that have not been accessed will be flushed.
l Whenever you perform a search in the list, Active Roles will always fetch the
list of objects from Azure to update the cache.
1. On the Active Roles Web Interface, navigate to Directory Management > Tree >
Azure > <azure-tenant-name> > Azure Users.
The list of cloud-only Azure users in your Azure tenant then appears.
2. To start creating a new Azure user, in the right-side pane, click New User.
3. In the New User window, on the General tab, specify the details of the new Azure
user (First name, Last name, Display name, User principal name, Alias, and
Description).
NOTE: In accordance with Microsoft 365, Azure users may share the same name.
However, their aliases must be different.
4. To apply your changes and create the new Azure user, click Finish.
The new cloud-only user then appears in the Azure Users list of the Active Roles
Web Interface.
1. On the Active Roles Web Interface, navigate to Directory Management > Tree >
Azure > <azure-tenant-name> > Azure Users.
The list of cloud-only Azure users in your Azure tenant then appears.
2. From the list of Azure Users, select the user you want to modify.
3. To open the properties dialog of the Azure user, in the right-side pane, click Azure
properties.
4. Use the tabs of the Azure Properties wizard to view or modify properties of the
cloud-only Azure user.
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab, click Azure Users > Azure > Azure Configuration >
<Azure tenant>.
3. Select the tenant and then click OneDrive Configuration available on the
Command pane.
4. Provide the details in the OneDrive Configurationwizard and click Save.
IMPORTANT: The OneDrive configuration here is applicable for cloud-only users. For
OneDrive configuration for hybrid users, see Configuring Active Roles to manage Hybrid
AD objects in the Active Roles Administration Guide.
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Azure > <Azure tenant> >
Azure Users.
The Azure Users page is displayed and lists the Azure users that are
available in Azure.
3. Select the Azure user that you want to block.
4. In the Command pane, click Disable.
The account is blocked and marked with a blocked icon.
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Azure > <Azure tenant> >
Azure Users.
The Azure Users page is displayed and lists the Azure users that are
available in Azure.
3. Select the Azure user that you want to unblock.
4. To unblock a blocked account, select the blocked account and in the Command pane
click Enable.
NOTE: The Enable command only appears for a blocked account.
The account is unblocked again.
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Azure > <Azure tenant> >
Azure Users.
The Azure Users page is displayed and lists the Azure users that are
available in Azure.
3. Select the check box corresponding to the specific cloud-only Azure user with
Exchange Online license for which you want to view the properties.
4. In the Command pane, click Exchange Online Properties.
The Exchange Online Properties wizard displays the following Exchange Online
properties for the cloud-only Azure user:
l Mail Flow Settings
l Delegation
l E-mail Addresses
l Mailbox Features
l Mailbox Settings
5. To view the following Exchange Online properties of the cloud-only Azure user, use
the tabs in the Exchange Online Properties dialog:
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Azure > <Azure tenant> >
Azure Users.
The Azure Users page is displayed and lists the Azure users that are
available in Azure.
3. In the Command pane, under Azure Users, click Reset Password.
4. In the Password field, provide the new password.
5. Reenter the password in the Confirm password field.
1. On the Active Roles Web Interface, navigate to Directory Management > Tree >
Azure > <azure-tenant-name> > Azure Users.
The list of cloud-only Azure users in your Azure tenant then appears.
2. From the list of Azure Users, select the user you want to rename.
3. To open the Rename dialog, in the right-side pane, click Rename.
4. Enter the new name of the Azure user.
5. To apply your changes, click Finish. The Azure Users list is then updated with the
new name of the user.
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Azure > <Azure tenant> >
Azure Users.
The Azure Users page is displayed and lists the Azure users that are
available in Azure.
3. In the Command pane, click Azure member of.
You can view the Azure group to which the cloud-only Azure user is associated.
To view the Change History and User Activity of a cloud-only Azure user
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Azure > <Azure tenant> >
Azure Users.
The Azure Users page is displayed and lists the Azure users that are
available in Azure.
3. To view the history, select the Azure user.
4. In the Command pane, click Change History or User Activity.
Selecting Change History displays the information on changes that were made to
the user through Active Roles.
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Azure > <Azure tenant> >
Azure Users.
The Azure Users page is displayed and lists the Azure users that are
available in Azure.
3. Select the Azure user that you want to delete.
4. In the Command pane, click Delete.
A message prompts you to confirm the action.
5. Click Yes to continue.
The Azure user that are selected are deleted.
However, when you create an Azure guest user, no domains are assigned to the user within
the Azure tenant. Instead, the procedure has the following main steps:
1. You specify the basic permissions of the guest user, along with an email address to
which Active Roles will send an invitation.
2. Using the link in the invitation email, the guest user can gain the configured access
with their account upon joining the organization.
3. Once the guest accepted the invitation, you can assign additional permissions (like
roles, licenses, storage space, and so on) to the user, similarly to a regular cloud-only
Azure user.
NOTE: Active Roles does not restrict the type of permissions that you can assign to Azure
guest users. However, for security reasons, One Identity recommends that you assign
only the rights and resources to guest users that external contractors typically receive in
your organization.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Azure Guest Users.
The list of Azure guest users of the selected tenant is displayed.
Figure 30: Directory Management > Tree View > Azure > <azure-tenant-
name> > Azure Guest Users — Listing the Azure guest users in the tenant
Figure 31: Azure Guest Users > Invite Guest > Identity – Configuring basic
user account settings for the Azure guest user
d. Enter the Email address where Active Roles will send out the invitation. This
field is mandatory and must be unique.
e. (Optional) Enter the Azure Tenant ID of the Azure tenant that will contain the
guest user.
Figure 32: Azure Guest Users > Invite Guest > Licenses – Assigning
application licenses to the Azure guest user
NOTE: You can assign roles to the Azure guest user in Active Roles without any
limitation. However, One Identity recommends that you assign Azure guest
users only the admin roles that external contractors typically receive in your
organization.
6. (Optional) Job Info
Enter the Job Title and the assigned Department of the guest user, if needed.
Figure 34: Azure Guest Users > Invite Guest > Job Info – Specifying
organizational information for the Azure guest user
7. To save your changes and send the invite email to the guest user, click Finish.
NOTE: Consider the following when administering cloud-only Azure guest users:
l You can resend the invitation later for the guest user, if needed. For more
information, see Resending the invitation to an Azure guest user.
Figure 35: Directory Management > Tree View > Azure > <azure-tenant-name>
> Azure Guest Users — Listing the Azure guest users in the tenant
NOTE: Active Roles lists the available cloud-only Azure users, Azure guest users, and
Azure contacts on the Active Roles Web Interface with the following restrictions:
l Active Roles can initially list 999 items.
l The items listed in the list have a sliding expiry of 8 hours, after which the objects
that have not been accessed will be flushed.
l Whenever you perform a search in the list, Active Roles will always fetch the list of
objects from Azure to update the cache.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Azure Guest Users.
The list of Azure guest users of the selected tenant is displayed.
Figure 36: Directory Management > Tree View > Azure > <azure-tenant-
name> > Azure Guest Users — Listing the Azure guest users in the tenant
2. Select the Azure guest user that you want to enable or disable from the list.
3. Click the applicable option:
l If the selected Azure guest user is enabled, click Disable Account.
l If the selected Azure guest user is disabled, click Enable Account.
NOTE: The available option changes depending on the state of the selected guest
user account.
4. To confirm disabling/enabling the selected Azure guest user, click Save.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Azure Guest Users.
The list of Azure guest users of the selected tenant is displayed.
2. Select the Azure guest user whose session you want to revoke.
3. Click Revoke Session.
4. To confirm revoking the session of the selected Azure guest user, click Save.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Azure Guest Users.
The list of Azure guest users of the selected tenant is displayed.
Figure 38: Directory Management > Tree View > Azure > <azure-tenant-
name> > Azure Guest Users — Listing the Azure guest users in the tenant
2. Select the Azure guest user for which you want to resend the invitation.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Azure Guest Users.
The list of Azure guest users of the selected tenant is displayed.
Figure 39: Directory Management > Tree View > Azure > <azure-tenant-
name> > Azure Guest Users — Listing the Azure guest users in the tenant
4. Update the First Name, Last Name or Display Name of the guest user as needed.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Azure Guest Users.
The list of Azure guest users of the selected tenant is displayed.
2. From the list in the middle pane, select the Azure guest user that you want to update.
3. To open the properties of the selected Azure guest user, click Azure Properties on
the right pane.
4. In the available Azure Properties pages, configure the Azure guest user settings
that you want to change.
Page Description
Identity View and configure user identity settings and information in this tab.
Job Info View and configure job and organizational information in this tab.
Contact View and configure contact and location information in this tab.
Info
NOTE: You can only update certain Contact Info properties (such as
phone numbers or email addresses) for non-administrator Azure
guest users, or for Azure guest users with a specific set of limited
administrator roles. For more information on these roles, see the
Update User page of the official Microsoft documentation.
Attempting to update these properties for an Azure guest user with
different administrative roles assigned to it will result in failure, and
the following error log message appearing in the Windows Event Log:
Licenses View and configure the Microsoft application resources available in the
organization to the Azure guest user.
O365 View and configure the O365 roles in the organization granted for the
Admin guest user.
Roles
NOTE: Active Roles lists the available cloud-only Azure users, Azure guest users, and
Azure contacts on the Active Roles Web Interface with the following restrictions:
l Active Roles can initially list 999 items.
l The items listed in the list have a sliding expiry of 8 hours, after which the objects
that have not been accessed will be flushed.
l Whenever you perform a search in the list, Active Roles will always fetch the list of
objects from Azure to update the cache.
1. On the Active Roles Web Interface, navigate to Directory Management > Tree
View > Azure > <azure-tenant> > Azure Guest Users.
2. From the list in the middle pane, select the Azure guest user that you want to update.
3. To open the properties of the selected Azure guest user, click Azure Properties on
the right pane.
4. To open the name settings, click the Identity tab.
5. Enter the First Name of the Azure guest user. If no first name has been specified in
this field when inviting the Azure guest user, this text box contains the local-part of
the email address where the invite has been sent.
6. Enter the Last Name of the Azure guest user.
7. To apply your changes, click Save.
NOTE: You can also view the following identity properties of the selected Azure guest user
on this page:
l Display Name: Shows the display name of the Azure guest user. By default, the
display name consists of the specified First Name and Last Name.
TIP: You cannot directly modify the Display Name of the guest user on this tab.
To do that, use the Rename action. For more information, see Renaming an
Azure guest user.
l User Principal Name: Displays the User Principal Name (UPN) of the Azure guest
user. The UPN has the following syntax:
1. On the Active Roles Web Interface, navigate to Directory Management > Tree
View > Azure > <azure-tenant> > Azure Guest Users.
2. From the list in the middle pane, select the Azure guest user that you want to update.
3. To open the properties of the selected Azure guest user, click Azure Properties on
the right pane.
4. To open the user authentication settings, click the Identity tab.
Figure 43: Directory Management > Tree View > Azure > <azure-tenant>
> Azure Guest Users > <azure-guest-user> > Azure Properties > Settings
— Accessing the authentication settings of an Azure Guest user
5. To restrict the login attemps with the configured Azure guest user account to a
specific geographical location, enter the corresponding ISO 3166 country code in the
Usage Location field. Active Roles will then only allow the guest user to log in, if the
login attempt occurs from the country that you specified.
6. (Optional) To grant the Azure guest user access to the configured licenses and admin
roles, select Allow user to sign in and access services. If access has been
granted previously, and must be revoked, then deselect this option.
TIP: Leaving this setting clear is useful if the account of the Azure guest user is
created in advance, and they require access to the assigned resources only later
(for example, because their contract project starts only at a later date).
7. To apply your changes, click Save.
1. On the Active Roles Web Interface, navigate to Directory Management > Tree
View > Azure > <azure-tenant> > Azure Guest Users.
2. From the list in the middle pane, select the Azure guest user that you want to update.
3. To open the properties of the selected Azure guest user, click Azure Properties on
the right pane.
4. To open the job information settings, click the Job Info tab.
NOTE: The Job Info also has a Direct reports field that lists the employees or other
guest users reporting to the selected guest user, if there are any.
1. On the Active Roles Web Interface, navigate to Directory Management > Tree
View > Azure > <azure-tenant> > Azure Guest Users.
2. From the list in the middle pane, select the Azure guest user that you want to update.
3. To open the properties of the selected Azure guest user, click Azure Properties on
the right pane.
4. To open the contact information settings, click the Contact Info tab.
1. On the Active Roles Web Interface, navigate to Directory Management > Tree
View > Azure > <azure-tenant> > Azure Guest Users.
2. From the list in the middle pane, select the Azure guest user that you want to update.
3. To open the properties of the selected Azure guest user, click Azure Properties on
the right pane.
4. To open the application license settings, click the Licenses tab.
Figure 46: Directory Management > Tree View > Azure > <azure-tenant>
> Azure Guest Users > <azure-guest-user> > Azure Properties > Licenses
— Accessing the application license settings of an Azure Guest user
5. (Optional) If the available licenses are categorized into various headings, expand the
list of the license(s) you want to add or remove from the guest user.
6. Select the license(s) you want to assign to the guest user, or deselect the one(s) you
want to remove from them.
7. To apply your changes, click Save.
1. On the Active Roles Web Interface, navigate to Directory Management > Tree
View > Azure > <azure-tenant> > Azure Guest Users.
2. From the list in the middle pane, select the Azure guest user that you want to update.
3. To open the properties of the selected Azure guest user, click Azure Properties on
the right pane.
4. To open the administration role settings, click the O365 Admin Roles tab.
Figure 47: Directory Management > Tree View > Azure > <azure-
tenant> > Azure Guest Users > <azure-guest-user> > Azure Properties
> O365 Admin Roles — Accessing the administrator role settings of an
Azure Guest user
5. Select the administrator role(s) you want to grant for the guest user, or deselect the
role(s) you want to revoke.
NOTE: You can assign roles to the Azure guest user in Active Roles without any
limitation. However, One Identity recommends that you assign Azure guest
users only the admin roles that external contractors typically receive in your
organization.
6. To apply your changes, click Save.
To view and update the Exchange Online properties of an Azure guest user
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Azure Guest Users.
The list of Azure guest users of the selected tenant is displayed.
Figure 48: Directory Management > Tree View > Azure > <azure-tenant-
name> > Azure Guest Users — Listing the Azure guest users in the tenant
2. Select the guest user whose Exchange Online properties you want to check or
update.
3. To access the Exchange Online-specific mailbox settings, click Exchange Online
Properties.
4. In the available Exchange Online Properties tabs, configure the Exchange Online
Page Description
Mail Flow Settings View and configure rules for the emails that the mailbox sends
or receives via the Exchange Online service.
General View and configure the email addresses associated with the
mailbox.
Mailbox Features View and configure various Exchange Online mailbox features,
for example mobile access, additional mailbox protocols, or
archival settings.
Such mail flow settings are typically configured if the organization enforces specific email
messaging policies for users and guest users.
1. On the Active Roles Web Interface, navigate to Directory Management > Tree
View > Azure > <azure-tenant> > Azure Users (or Azure Guest Users).
2. From the list in the middle pane, select the Azure user or Azure guest user that you
want to update.
3. To open the Exchange Online properties of the selected Azure user or guest user,
click Exchange Online Properties on the right pane.
4. To open the mail flow settings, click the Mail Flow Settings tab.
1. On the Active Roles Web Interface, navigate to Directory Management > Tree
View > Azure > <azure-tenant> > Azure Users (or Azure Guest Users).
2. From the list in the middle pane, select the Azure user or Azure guest user that you
want to update.
3. To open the Exchange Online properties of the selected Azure user or guest user,
click Exchange Online Properties on the right pane.
4. To open the delegation settings, click the Delegation tab.
Figure 50: Exchange Online Properties > Delegation — Accessing the email
account delegation settings of an Exchange Online mailbox
5. To delegate Send as permission to a user (or users), click Add... under the
Send As list.
6. Select the user(s) you want to grant Send as rights for the email address,
then click OK.
7. To delegate Full Access permission to a user (or users) click Add... under the Full
Access list.
8. Select the user(s) you wish to grant Full access rights for the email address,
then click OK.
9. To remove a delegated user either from the Send As or Full Access list, click
Remove and select the user(s) you want to revoke the permission from.
10. To apply your changes, click Save, then Close.
1. On the Active Roles Web Interface, navigate to Directory Management > Tree
View > Azure > <azure-tenant> > Azure Users (or Azure Guest Users).
2. From the list in the middle pane, select the Azure user or Azure guest user that you
want to update.
3. To open the Exchange Online properties of the selected Azure user or guest user,
click Exchange Online Properties on the right pane.
4. To open the email address settings, click the General tab.
Figure 51: Exchange Online Properties > General — Accessing the email
account settings of an Exchange Online mailbox
1. On the Active Roles Web Interface, navigate to Directory Management > Tree
View > Azure > <azure-tenant> > Azure Users (or Azure Guest Users).
2. From the list in the middle pane, select the Azure user or Azure guest user that you
want to update.
3. To open the Exchange Online properties of the selected Azure user or guest user,
click Exchange Online Properties on the right pane.
4. To open the email address settings, click the General tab.
5. To open the settings of an email address, select the email address, then click Edit....
6. In the E-mail address text box, modify the current email address.
NOTE: You cannot modify the E-mail address type of an existing email account.
You can only change the name of the existing address.
1. On the Active Roles Web Interface, navigate to Directory Management > Tree
View > Azure > <azure-tenant> > Azure Users (or Azure Guest Users).
2. From the list in the middle pane, select the Azure user or Azure guest user that you
want to update.
3. To open the Exchange Online properties of the selected Azure user or guest user,
click Exchange Online Properties on the right pane.
4. To open the email address settings, click the General tab.
5. In the E-mail addresses list, select the address you want to remove.
6. Click Remove and confirm the deletion of the email address.
7. To close the Exchange Online Properties window, click Close.
1. On the Active Roles Web Interface, navigate to Directory Management > Tree
View > Azure > <azure-tenant> > Azure Users (or Azure Guest Users).
2. From the list in the middle pane, select the Azure user or Azure guest user that you
want to update.
3. To open the Exchange Online properties of the selected Azure user or guest user,
click Exchange Online Properties on the right pane.
4. To open the mailbox feature settings, click the Mailbox Features tab.
5. Select the Exchange Online mailbox feature that you want to enable or disable:
l Outlook Mobile Access: Enables or disables the Outlook Mobile Access
(OMA) mobile browsing service for the mailbox. Enabling this settings allows
the mailbox user use OMA on their mobile device to access their account.
l Exchange ActiveSync: Enables or disables the Exchange ActiveSync
synchronization protocol for the mailbox. Enabling this setting allows the
mailbox user synchronize their configured mobile device with their mailbox.
l Up-to-Date Notifications: Enables or disables the Up-to-date (UTD) feature
notifications for the mailbox.
l Outlook Web App: Enables or disables access to the browser-based Outlook
Web App for the mailbox user.
l MAPI, IMAP4, POP3: Enables or disables support for the MAPI, IMAP4 or
POP3 protocols for the mailbox user. If MAPI is enabled, the mailbox user can
access their mailbox through the Outlook desktop app (or other MAPI clients).
If IMAP4 or POP3 is enabled, they are also able to access their mailbox with any
IMAP4 or POP3 email client.
l Archive: Enables or disables the archive mailbox feature for the mailbox.
6. Click Enable to enable the selected mailbox feature, or Disable to disable it.
7. Once you are done with the configuration, click Close.
8. To close the Exchange Online Properties window, click Close.
1. On the Active Roles Web Interface, navigate to Directory Management > Tree
View > Azure > <azure-tenant> > Azure Users (or Azure Guest Users).
2. From the list in the middle pane, select the Azure user or Azure guest user that you
want to update.
3. To open the Exchange Online properties of the selected Azure user or guest user,
click Exchange Online Properties on the right pane.
4. To open the MRM settings, click the Mailbox Settings tab.
Figure 53: Exchange Online Properties > Mailbox Settings — Accessing the
MRM settings of an Exchange Online mailbox
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Azure Guest Users.
The list of Azure guest users of the selected tenant is displayed.
2. Select the Azure guest user whose password you want to reset.
3. Click Reset Password.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Azure Guest Users.
The list of Azure guest users of the selected tenant is displayed.
Figure 55: Directory Management > Tree View > Azure > <azure-tenant-
name> > Azure Guest Users — Listing the Azure guest users in the tenant
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Azure Guest Users.
The list of Azure guest users of the selected tenant is displayed.
2. In the middle pane, select the Azure guest user whose membership you want to view
or configure.
3. In the right pane, click Azure Member Of. The list of Azure O365 groups where the
guest user has a membership then appears.
Figure 57: Directory Management > Tree View > Azure > <azure-tenant>
> Azure Guest Users > Azure Member Of – Listing the Azure groups of the
selected Azure Guest user
4. To add the Azure guest user to a new Azure O365 group of the Azure tenant,
click Add.
5. In the Select Object page, select the O365 Group(s) you want the Azure guest user
to be a member of, then click OK to apply your changes and return to the Azure
Member Of page. The list is then updated with the new groups that you selected
previously.
6. To remove the Azure guest user from any O365 Group(s), select the group(s) in the
Azure Member Of page, and then click Remove. Click OK to confirm the removal
from the group.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Azure Guest Users.
The list of Azure guest users of the selected tenant is displayed.
Figure 58: Directory Management > Tree View > Azure > <azure-tenant-
name> > Azure Guest Users — Listing the Azure guest users in the tenant
2. Select the Azure guest user whose change history you want to check.
3. Click Change History.
The change history of the Azure guest user then appears.
Figure 59: Directory Management > Tree View > Azure > <azure-tenant>
> Azure Guest Users > Change History – Viewing the change history of the
selected Azure guest user
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Azure > <Azure tenant> >
Azure Contacts.
The Azure Contacts page is displayed and lists the Azure cloud-only contacts
available in Azure.
NOTE: Active Roles lists the available cloud-only Azure users, Azure guest
users, and Azure contacts on the Active Roles Web Interface with the following
restrictions:
l Active Roles can initially list 999 items.
l The items listed in the list have a sliding expiry of 8 hours, after which the
objects that have not been accessed will be flushed.
l Whenever you perform a search in the list, Active Roles will always fetch the
list of objects from Azure to update the cache.
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Azure > <Azure tenant> >
Azure Contacts.
NOTE: When creating a new cloud-only Azure contact or updating an existing one, it may
take up to 15 minutes for the changes to appear on the Active Roles Web Interface. This
is due to a replication delay present between PowerShell and the Microsoft Graph API.
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Azure > <Azure tenant> >
Azure Users.
The Azure Users page is displayed and lists the Azure users that are
available in Azure.
3. Select the Azure contact for which you want to view or modify the properties.
4. In the Command pane, click Azure properties.
The Azure Properties wizard for the contact is displayed.
5. To view or modify properties of the Azure cloud-only contact, use the tabs in the
Azure Properties wizard.
6. After setting all the required properties, click Save.
NOTE: When creating a new cloud-only Azure contact or updating an existing one, it may
take up to 15 minutes for the changes to appear on the Active Roles Web Interface. This
is due to a replication delay present between PowerShell and the Microsoft Graph API.
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Azure > <Azure tenant> >
Azure Contacts.
The Azure Contacts page is displayed and lists the Azure cloud-only contacts
available in Azure.
3. Select the Azure contact that you want to rename.
4. In the Command pane, click Rename.
5. Enter the required name.
6. Click Yes to continue.
The Azure cloud contacts that you have selected are renamed.
NOTE: When creating a new cloud-only Azure contact or updating an existing one, it may
take up to 15 minutes for the changes to appear on the Active Roles Web Interface. This
is due to a replication delay present between PowerShell and the Microsoft Graph API.
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Azure > <Azure tenant> >
Azure Contacts.
The Azure Contacts page is displayed and lists the Azure cloud-only contacts
available in Azure.
3. Select the specific cloud-only Azure contacts for which you want to view the
properties.
4. In the Command pane, click Exchange Online Properties.
The Exchange Online Properties wizard displays the following Exchange Online
properties for the cloud-only Azure contact.
l General
l Mail tip
5. Use the tabs in the Exchange Online Properties dialog to view the following
Exchange Online properties of the cloud-only Azure contact:
NOTE: When creating a new cloud-only Azure contact or updating an existing one, it may
take up to 15 minutes for the changes to appear on the Active Roles Web Interface. This is
due to a replication delay present between PowerShell and the Microsoft Graph API.
To view the change history and user activity of cloud only Azure contacts
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Active Directory.
The list of Active Directory domains is displayed.
3. To view the history, select the Azure contact.
4. In the Command pane, click Change History or User Activity.
The information on changes that were made to the contact through Active Roles
is displayed.
1. On the Active Roles Web Interface navigation bar, click Directory Management.
2. On the Views tab in the Browse pane, click Azure > <Azure tenant> >
Azure Contacts.
The Azure Contacts page is displayed and lists the Azure cloud-only contacts
available in Azure.
3. Select the Azure contact that you want to delete.
4. In the Command pane, click Delete.
A message prompts you to confirm the action.
1. In the Active Roles Web Interface, under Directory Management > Tree > Active
Directory, navigate to Azure > <azure-tenant-name> > Azure Users.
NOTE: <azure-tenant-name> is the Azure tenant storing the remote mailbox.
2. Select the Azure user entry of the remote mailbox you want to view or modify, then
click Exchange Online Properties.
3. In the available Exchange Online Properties tabs, configure the Exchange Online
mailbox settings as you need.
Page Description
Mail Flow Settings View and configure rules for the emails that the mailbox sends
or receives via the Exchange Online service.
General View and configure the email addresses associated with the
mailbox.
Mailbox Features View and configure various Exchange Online mailbox features,
for example mobile access, additional mailbox protocols, or
archival settings.
1. In the Active Roles Web Interface, navigate to Directory Management > Tree>
Azure > Resource Mailboxes.
The list of resource mailboxes of the selected tenant is displayed.
If the operation is successful, the newly-created room mailbox appears in the list of
Resource Mailboxes.
The newly-created room mailbox also appears in the Exchange admin center, in Home
> Resources.
1. In the Active Roles Web Interface, navigate to Directory Management > Tree>
Azure > Resource Mailboxes.
The list of resource mailboxes of the selected tenant is displayed.
1. In the Active Roles Web Interface, navigate to Directory Management > Tree>
Azure > Resource Mailboxes.
The list of resource mailboxes of the selected tenant is displayed.
4. Click Yes.
If the operation has been successful, the room mailbox is deleted and it disappears both
from the Resource Mailboxes list in the Active Roles Web Interface, and from the
Resources list in the Exchange admin center.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Shared Mailboxes.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Shared Mailboxes.
2. Select the shared mailbox whose general properties you want to view or modify.
3. In General, set the following general properties of the shared mailbox:
l Enter the Display name of the shared mailbox.
l Enter the Name of the shared mailbox.
l Primary SMTP address: The primary Simple Mail Transfer Protocol (SMTP)
address of a user account to be used for server-to-server authorization or
access delegation. You cannot modify this value because it is filled
automatically.
l External directory ID: The Azure Active Directory (Azure AD) object of the
user object connected to the mailbox object in Azure AD. You cannot modify
this value because it is filled automatically.
l (Optional) Enter an Exchange Online Alias for the shared mailbox.
l (Optional) Hide from global address lists (default: selected)
Select this check box if you do not want the mailbox to appear in the address
book and other address lists defined in your Exchange organization.
4. To apply your changes, click Save.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Shared Mailboxes.
2. Select the shared mailbox whose contact settings you want to view or modify.
3. Click Contact Settings.
4. In Contact Settings, set the following contact settings of the shared mailbox:
l (Optional) Office
l (Optional) Office phone
l (Optional) Mobile phone
l (Optional) Home phone
l (Optional) Fax number
l (Optional) Street address
l (Optional) City
l (Optional) Country: You must enter a valid country code or country name, for
example: US or United States of America (the).
l (Optional) State or province
l (Optional) ZIP or postal code
l (Optional) Notes: Enter a customized message about the contact settings of
the shared mailbox for users that will appear in Outlook.
5. To apply your changes, click Save.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Shared Mailboxes.
2. Select the shared mailbox whose organization settings you want to view or modify.
3. In Organization Settings, set the following organization settings of the
shared mailbox:
l (Optional) Job title
l (Optional) Department
l (Optional) Company name
l (Optional) Manager:
l To add or change the manager of the shared mailbox, click Modify,
select the user and click OK.
l To view or modify the Azure properties of the user, click Properties.
l To delete the manager of the shared mailbox, click Remove.
4. To apply your changes, click Save.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Shared Mailboxes.
2. Select the shared mailbox whose email settings you want to view or modify.
3. In Email Settings, set the following email settings of the shared mailbox:
l Primary SMTP address: The primary Simple Mail Transfer Protocol (SMTP)
address of a user account to be used for server-to-server authorization or
access delegation. You cannot modify this value because it is filled
automatically.
l Email addresses:
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Shared Mailboxes.
2. Select the shared mailbox whose automatic reply settings you want to view or
modify.
3. In Auto-Reply, set the following automatic reply settings of the shared mailbox:
l Automatic replies (default: not selected)
To send an automatic reply to all senders inside your organization from the
shared mailbox, select this check box and enter an automatic reply.
l Send automatic replies to senders outside this organization (default:
not selected)
To send an automatic reply to all senders outside of your organization from the
shared mailbox, select this check box and enter an automatic reply.
To specify the senders outside of your organization, you can set one of
the following:
l Only reply to senders in this mailbox's contact list
l Reply to all senders
4. To apply your changes, click Save.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Shared Mailboxes.
2. Select the shared mailbox whose protocol settings you want to view or modify.
3. In Protocol Settings, set the following protocol settings of the shared mailbox:
l Outlook Web (default: selected)
l Outlook Desktop (default: selected)
l Exchange Web Services (default: selected)
l Mobile Exchange (default: selected)
l IMAP (default: selected)
l POP3 (default: selected)
4. To apply your changes, click Finish.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Shared Mailboxes.
2. Select the shared mailbox whose advanced email settings you want to view or
modify.
3. Click Advanced Email Settings.
4. In Advanced Email Settings, set the following advanced email settings of the
shared mailbox:
l Send as
Only the users in the Send as list have permission to send emails from this
shared mailbox that will appear as emails sent by the owner of the mailbox.
l To add users to the Send as list, click Add, select the users and
click OK.
l To remove users from the Send as list, select the users and click
Remove.
l Read and manage (Full control)
Only the users in the Read and manage list have full administrator access to
the shared mailbox.
l To add users to the Read and manage list, click Add, select the users
and click OK.
l To remove users from the Read and manage list, select the users and
click Remove.
l Mailbox archive (default: selected)
l Convert mailbox from shared to regular (default: not selected)
NOTE: After you convert a mailbox from shared to regular, you can only
convert it back to shared in the Exchange admin center.
l Litigation hold (default: not selected)
Litigation hold places all contents of the shared mailbox on hold. For more
information on litigation hold, see In-Place Hold and Litigation Hold in the
Microsoft Exchange Online documentation.
Prerequisites
NOTE: To modify the default policy settings, you must run PowerShell command Enable-
OrganizationCustomization for the Azure tenant of the shared mailbox. It can take up to
10-15 minutes for the command to take effect before you can save the policy changes.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Shared Mailboxes.
2. Select the shared mailbox whose policy settings you want to view or modify.
3. In Policy Settings, select the following policies available in your Azure AD
environment for the shared mailbox:
l Sharing policy: Sets how users can share information with other users in your
organization.
l Role assignment policy: Sets the permissions assigned to the users of the
shared mailbox.
l Retention policy: Sets the time period in which users can manage email in
the shared mailbox.
l Address book policy: Sets the default address book in your organization.
4. To apply your changes, click Save.
NOTE: In the Active Roles Web Interface, you can add shared mailboxes to Azure distri-
bution groups only, but you cannot add them to Azure O365 groups or Azure security
groups. You can add a shared mailbox to an Azure O365 group or Azure security group in
the Microsoft 365 admin center.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Shared Mailboxes.
2. Select the shared mailbox whose membership you want to view or configure.
3. Click Azure Member Of. The list of Azure distribution groups where the shared
mailbox has a membership appears.
4. To add the shared mailbox to a new Azure distribution group of the Azure
tenant, click Add.
5. Select the distribution group(s) you want the shared mailbox to be a member of,
and click OK.
6. To remove the shared mailbox from any distribution group(s), in Azure Member Of,
select the group(s), click Remove, and click OK.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Shared Mailboxes.
2. Select the shared mailbox whose change history you want to view.
3. Click Change History.
1. Navigate to Directory Management > Tree > Azure > <azure-tenant-name> >
Shared Mailboxes.
1. In the Active Roles Web Interface, under Directory Management > Tree > Active
Directory, navigate to the OU of the on-premises user whose remote mailbox you
want to delete.
Figure 75: Active Roles Web Interface – Navigating to the OU of the user
1. In the Active Roles Web Interface, delete the current remote mailbox of the on-
premises user as described in the To delete the remote mailbox of an on-premises
user procedure.
2. Open the Advanced Properties of the on-premises user. In the Active Roles
Console, in the Active Directory (AD) tree, navigate to the Organizational Unit (OU)
where the user is located, double-click the user, then in the Properties window, click
Object > Advanced Properties.
3. Search for the edsvaMsExchEnableRemoteMailRoutingAddress property.
TIP: To find the property faster, enter its name (or part of its name) in the Look
for property field. If you cannot find the property, select Show all possible
NOTE: In the list of objects, clicking the name of a leaf object, such as a user or group will
display the properties page of the object. Clicking a container object, such as a partition
or an organizational unit, will display a list of objects held in that container.
1. In the Web Interface, locate the computer that hosts resources you want to manage.
For more information on how to locate objects in the Web Interface, see Locating
directory objects.
2. Select the computer in the list of objects, then click Manage in the Command pane.
3. In the list of resource types, click the type of resource you want to manage.
4. In the list of objects that appears, select the resource you want to manage.
5. Use commands in the Command pane to perform management tasks on the
selected resource.
1. On the Tree tab in the Browse pane, click the Deleted Objects container.
2. In the Command pane, click Search under this container.
3. Specify criteria for the deleted objects that you want to find:
l To search by naming properties, type in the Search field on the Toolbar. The
Web Interface will search for objects whose naming properties match what you
typed. The naming properties include name, first name, last name, display
name, and logon name.
l To search by other properties, click the button on the right side of the Toolbar
to expand the Toolbar, click Add criteria, choose the properties by which you
want to search, click Add, and then configure the criteria as appropriate. The
Web Interface will search for objects that match the criteria that you
configured.
4. To start the search, press Enter.
The Web Interface lists the objects that were deleted from the OU or MU you selected. The
list can be sorted or filtered as appropriate to locate particular objects (see Managing the
list of objects earlier in this document).
NOTE: The View or Restore Deleted Objects command is also available on domain
and container objects.
1. In a list of deleted objects, select the object you want to undelete. For more
information on how to prepare a list of deleted objects, see Locating deleted objects.
2. In the Command pane, click Restore.
3. Review and, if necessary, change the settings in the Restore Object dialog box,
then click OK to start the restore process.
The Restore Object dialog box prompts you to choose whether the deleted child objects
(descendants) of the deleted object should also be restored. The Restore child objects
check box is selected by default, which ensures that the Restore command applied on a
deleted container restores the entire contents of the container.
NOTE: When restoring a deleted object, ensure that its parent object is not deleted. You
can identify the parent object by viewing properties of the deleted object: the canonical
name of the parent object, preceded by the Deleted from: label, is displayed beneath
the name of the deleted object on the property page for that object. If the parent object
is deleted, you need to restore it prior to restoring its children because deleted objects
must be restored to a live parent.
The Active Roles Web Interface supports approval operations, allowing your organization to
control changes to directory data that require monitoring (and therefore, manual approval
by organization personnel). For more information, see the following sections.
l Understanding approval workflow
l Locating approval items
l Using “My Tasks”
l Using “My Operations”
The Approval area provides a way to perform change approval actions, allowing you to
control changes to directory data that require your approval and monitor your operations
that require approval by other persons. You can use the Approval area to:
l Perform approval tasks—approve or reject operations so as to allow or deny the
requested changes to directory data. Examples of operations include (but not limited
to) creation and modification of user accounts or groups.
When a Web Interface user makes changes to directory data that require permission from
other individuals in an organization, the changes are not applied immediately. Instead, an
operation is initiated and submitted for approval. This starts a workflow that coordinates
the approvals needed to complete the operation. The operation is performed and the
requested changes are applied only after approval. An operation may require approval from
one person or from multiple persons.
When an operation is submitted for approval, Active Roles tracks the initiator and the
approver or approvers. The initiator is the person who requested the changes. Approvers
are those who are authorized to allow or deny the changes. An operation that requires
approval generates one or more approval tasks, with each approval task assigned to the
appropriate approver. Active Roles administrators configure approval workflow by creating
approval rules to specify what changes require approval and who is authorized to approve
or deny change requests.
In the Approval area, you can work with the operations for which you are assigned to the
approver role. As an approver, you are expected to take appropriate actions on your
approval tasks.
In addition to using the predefined views, you can locate operations and tasks by using the
search function.
1. In the right pane of the Web Interface page, under the Search label, type the ID
number of the operation or task in the Search by ID box.
2. Click the button next to the Search by ID box to start the search.
The task’s header area contains the Examine task button allowing you to get detailed
information about the task, review the object properties submitted for approval, and supply
You can also complete a task by clicking the appropriate action button in the task’s header
area. However, if the current policy and approval rules require the approver to supply some
additional information, the Web Interface would open the Object properties page,
prompting you to configure the required properties.
About us
One Identity solutions eliminate the complexities and time-consuming processes often
required to govern identities, manage privileged accounts and control access. Our solutions
enhance business agility while addressing your IAM challenges with on-premises, cloud and
hybrid environments.
For sales and other inquiries, such as licensing, support, and renewals, visit
https://www.oneidentity.com/company/contact-us.aspx.
Technical support is available to One Identity customers with a valid maintenance contract
and customers who have trial versions. You can access the Support Portal at
https://support.oneidentity.com/.
The Support Portal provides self-help tools you can use to solve problems quickly and
independently, 24 hours a day, 365 days a year. The Support Portal enables you to:
l Submit and manage a Service Request
l View Knowledge Base articles
l Sign up for product notifications
l Download software and technical documentation
l View how-to videos at www.YouTube.com/OneIdentity
l Engage in community discussions
l Chat with support engineers online
l View services to assist you with your product
Glossary
C
Cadence icons
One Identity font that contains standard icons used in the user interfaces for
various One Identity products.
Channel Policy
The channel policy lists the SSH channels (for example terminal session, SCP, and
so on) that can be used in a connection. The channel policy can further restrict
access to each channel based on the IP address of the client or the server, a user
list, or a time policy.
D
Drop-down
Flare default style that can be used to group content within a topic. It is a resource
to structure and collapse content especially in non-print outputs.
G
Glossary
List of short definitions of product-specific terms.
N
Note
Circumstance that needs special attention.
S
SaaS
Software-as-a-Service.
Skin
Used to design the online output window.
Snippet
Flare file type that can be used to reuse content. The One Identity Active Roles
contains various default snippets.
T
Tip
Additional, useful information.