OneIM AzureActiveDirectory Administration
OneIM AzureActiveDirectory Administration
OneIM AzureActiveDirectory Administration
One Identity Manager Administration Guide for Connecting to Azure Active Directory
Updated - November 2017
Version - 8.0
Contents
About us 155
Contacting us 155
Technical support resources 155
Index 156
One Identity Manager offers simplified user account administration for Azure Active
Directory. One Identity Manager concentrates on setting up and editing user accounts and
providing the required permissions. To equip users with the required permissions,
subscriptions, service plans, groups and administration roles are mapped in One Identity
Manager. This makes it possible to use Identity and Access Governance processes such as
attesting, Identity Audit, user account management and system entitlements, IT Shop or
report subscriptions for Azure Active Directory tenants.
One Identity Manager provides company employees with the necessary user accounts. For
this, you can use different mechanisms to connect employees to their user accounts. You
can also manage user accounts independently of employees and therefore set up
administrator user accounts.
Additional information about the Azure Active Directory core directory like tenants and
verified domains is loaded into the One Identity Manager database by data synchronization.
There are only limited possibilities for customizing this information in the One Identity
Manager due to the complex dependencies and far reaching effects of changes.
For more detailed information about the Azure Active Directory structure, see the Azure
Active Directory documentation from Microsoft.
Architecture Overview
To access Azure Active Directory tenant data, the Azure Active Directory connector is
installed on a synchronization server. The synchronization server ensures data is
compared between the One Identity Manager database and Azure Active Directory. The
Azure Active Directory connector uses the Microsoft Graph API for accessing Azure Active
Directory data.
The Azure Active Directory connector must authenticate itself on the Azure Active Directory
tenant to access Azure Active Directory tenant data. Authentication is carried out by a One
Identity Manager application that is integrated in the Azure Active Directory tenant and
equipped with the respective access rights.
Table 1: User
User Task
Product owner for the The product owners must be assigned to the application roles
To load One Identity Manager tenant objects into the Azure Active Directory
database for the first time
1. Prepare a user account in the Azure Active Directory tenant with sufficient
permissions for synchronization.
2. Integrate One Identity Manager in Azure Active Directory as an application for
your tenants.
3. The One Identity Manager components for managing Azure Active Directory tenants
are available if the configuration parameter "TargetSystem\AzureADS" is set.
l Check whether the configuration parameter is set in the Designer. Otherwise,
set the configuration parameter and compile the database.
l Other configuration parameters are installed when the module is installed.
Check the configuration parameters and modify them as necessary to suit your
requirements.
4. Install and configure a synchronization server and declare the server as Job server in
One Identity Manager.
5. Create a synchronization project with the Synchronization Editor.
l Users and Permissions for Synchronizing with Azure Active Directory on page 13
l Integrating One Identity Manager into Azure Active Directory as an Application
on page 14
l Setting Up the Synchronization Server on page 15
l Creating a Synchronization Project for initial Synchronization of an Azure Active
Directory Tenant on page 18
l Deactivating Synchronization on page 32
l Customizing Synchronization Configuration on page 25
User Permissions
User for accessing You must provide a user account with the following authorizations for
Azure Active full synchronization of Azure Active Directory tenant objects with the
Directory supplied One Identity Manager default configuration.
One Identity The user account for the One Identity Manager Service requires
Manager Service access rights to carry out operations at file level (issuing user rights,
user account adding directories and files to be edited).
The user account must belong to the group "Domain Users".
The user account must have the extended access right "Log on as a
service".
The user account requires access rights to the internal web service.
The user account needs full access to the One Identity Manager
Service installation directory in order to automatically update the
One Identity Manager.
In the default installation the One Identity Manager is installed
under:
User for accessing The default system user "Synchronization" is available to run
the One Identity synchronization over an application server.
Manager database
NOTE: A client ID is created when you add One Identity Manager as an application in
Azure Active Directory. You need this client ID for setting up synchronization.
For more detailed information about integrating applications into Azure Active Directory,
see the Azure Active Directory documentation from Microsoft.
l Windows Installer
l One Identity Manager Service, Azure Active Directory connector
l Install One Identity Manager components with the installation wizard.
1. Select the option Select installation modules with existing
database.
2. Select the machine role Server | Job server | Azure Active
Directory.
All One Identity Manager Service actions are executed against the target system
environment on the synchronization server. Entries which are necessary for
synchronization and administration with the One Identity Manager database are processed
by the synchronization server. The synchronization server must be declared as a Job
server in One Identity Manager.
NOTE: If several target system environments of the same type are synchronized
under the same synchronization server, it is useful to set up a job server for each
target system on performance grounds. This avoids unnecessary swapping of connec-
tion to target systems because a job server only has to process tasks of the same
type (re-use of existing connections).
Use the Server Installer to install the One Identity Manager Service. This program
executes the following steps.
NOTE: The program executes remote installation of the One Identity Manager
Service. Local installation of the service is not possible with this program. Remote
installation is only supported within a domain or a trusted domain.
To install and configure the One Identity Manager Service remotely on a server
Property Description
Queue Name of queue to handle the process steps. Each One Identity
Manager Service within the network must have a unique queue
identifier. The process steps are requested by the job queue
using exactly this queue name. The queue identifier is entered in
the One Identity Manager Service configuration file.
NOTE: Use the Advanced option to edit other Job server properties. You
can use the Designer to change properties at a later date.
4. Specify which job server roles to include in One Identity Manager on the Machine
role page. Installation packages to be installed on the Job server are found
depending on the selected machine role.
l Azure Active Directory
11. Enter the service's installation data on the Service access page.
Data Description
To select a server
l Enter the server name.
- OR -
l Select a entry from the list.
Installation Data for the administrative user account to install the service.
account
To enter an administrative user account for installation
Enable Advanced
l .
l Enable the option Current user.
This uses the user account of the current user.
- OR -
l Enter user account, password and password confirmation.
NOTE: The is entered with the name "One Identity Manager Service" in the
server's service administration.
Data Explanation
Client ID Client ID created when One Identity Manager is added as the tenant's
application.
Login domain Name of the domain for logging into Azure Active Directory. You can
use the base domain or your tenant's verified domain.
User account User account and password for authentication on Azure Active Directory
and password using the One Identity Manager application. Make a user account
for logging in available with sufficient permissions. For more information, see Users
and Permissions for Synchronizing with Azure Active Directory on page
13.
Key for authen- If you have registered One Identity Manager as a web application in
ticating as a your tenant, you required the key that is created.
web application
NOTE: The key is only valid for a limited period and must be
renewed when it expired.
Synchronization All One Identity Manager Service actions are executed against the
server for target system environment on the synchronization server. Entries
Azure Active which are necessary for synchronization and administration with the
Directory One Identity Manager database are processed by the synchronization
server.
The One Identity Manager Service with the Azure Active Directory
connector must be installed on the synchronization server.
The synchronization server must be declared as a Job server in One
Identity Manager. Use the following properties when you set up the Job
server.
Property Value
authentication.
Oracle:
Additional settings can be made if the project wizard is run in expert mode or is
started directly from the Synchronization Editor. Follow the project wizard
instructions through these steps.
1. Start the Launchpad and log on to the One Identity Manager database.
2. Select the entry Azure Active Directory target system type. Click Run.
This starts the Synchronization Editor's project wizard.
3. Specify how the One Identity Manager can access the target system on the System
access page.
l If you have access from the workstation from which you started the
Synchronization Editor, do not set anything.
l If you do not have access from the workstation from which you started the
Synchronization Editor, you can set up a remote connection.
In this case, set the option Connect using remote connection server and
select, under Job server, the server you want to use for the connection.
4. Enter the basic data for you tenants on the Azure Active Directory tenant page.
l Enter the client ID that was created when the One Identity Manager was added
to the tenant's application in Client ID.
l Enter the base domain or one of your tenant's verified domains in Login
domain.
5. Select the type of login on the Authentication page and enter the required
login data.
a. If you have integrated One Identity Manager as a native tenant application in
your tenant, select the option Authenticate as native tenant application
and enter the user account and password for logging into the target system,
b. If you have integrated One Identity Manager as a web application in your
tenant, select the option Authenticate as web application and enter the key
that was created when One Identity Manager was added as the tenant's
application.
6. Verify the One Identity Manager database connection data on the One Identity
Manager connection page. The data is loaded from the connected database.
Reenter the password.
7. The wizard loads the target system schema. This may take a few minutes depending
on the type of target system access and the size of the target system.
8. Specify how system access should work on the page Restrict target system
access. You have the following options:
Option Meaning
NOTE: The target system connection data is saved in a variable set, which you
can change in the Synchronization Editor under Configuration | Variables if
necessary.
1. To configure the synchronization log for target system connection, select the
category Configuration | Target system.
2. To configure the synchronization log for the database connection, select the category
Configuration | One Identity Manager connection.
3. Select General view and click Configure....
4. Select the Synchronization log view and set Create synchronization log.
5. Enable the data to be logged.
6. Click OK.
Related Topics
The log is marked in color in the navigation view. This mark shows you the execution status
of the synchronization/provisioning.
Synchronization logs are stored for a fixed length of time. The retention period is set in the
configuration parameter "DPR\Journal\LifeTime" and its sub parameters.
Customizing Synchronization
Configuration
You have used the Synchronization Editor to set up a synchronization project for initial
synchronization of an Azure Active Directory tenant. You can use this synchronization
project to load Azure Active Directory objects into the One Identity Manager database. If
you manage user accounts and their authorizations with One Identity Manager, changes are
provisioned in the Azure Active Directory environment.
l Create a workflow with the direction of synchronization "target system" to use One
Identity Manager as the master system for synchronization.
l You can use variables to create generally applicable synchronization configurations
which contain the necessary information about the synchronization objects when
synchronization starts. Variables can be implemented in base objects, schema
classes or processing methods, for example.
l Use variables to set up a synchronization project which can be used for
several different domains. Store a connection parameter as a variable for
logging in to the domain.
l To specify which Azure Active Directory objects and database object are included in
synchronization, edit the scope of the target system connection and the One Identity
Manager database connection. To prevent data inconsistencies, define the same
scope in both systems. If no scope is defined, all objects will be synchronized.
l Update the schema in the synchronization project, if the One Identity Manager
schema or target system schema has changed. Then you can add the changes to
the mapping.
l The moment another synchronization is started with the same start up config-
uration, the running synchronization process is stopped and given the status,
"Frozen". An error message is written to the One Identity Manager Service log
file.
l If another synchronization is started with another start up configuration, that
addresses same target system, it may lead to synchronization error or loss of
data. Plan your start times carefully. If possible, specify your start times so
that synchronization does not overlap.
For more detailed information about configuring synchronization, see the One Identity
Manager Target System Synchronization Reference Guide.
Related Topics
3. Create a new base object for the other tenants. Use the wizards to attach a
base object.
l Select the Azure Active Directory connector in the wizard and enter the
connection parameters. The connection parameters are saved in a special
variable set.
A start up configuration is created, which uses the new variable set.
4. Change other elements of the synchronization configuration as required.
Related Topics
Updating Schemas
All the schema data (schema types and schema properties) of the target system schema
and the One Identity Manager schema are available when you are editing a
synchronization project. Only a part of this data is really needed for configuring
synchronization. If a synchronization project is finished, the schema is compressed to
remove unnecessary data from the synchronization project. This can speed up loading the
synchronization project. Deleted schema data can be added to the synchronization
configuration again at a later point.
If the target system schema or the One Identity Manager schema has changed, these
changes must also be added to the synchronization configuration. Then the changes can be
added to the schema property mapping.
To include schema data that have been deleted through compressing and schema
modifications in the synchronization project, update each schema in the synchronization
project. This may be necessary if:
1. Select the table whose outstanding objects you want to edit in the navigation view.
This opens the target system synchronization form. All objects are shown here that
are marked as outstanding.
TIP:
Publish The object is added in the target system. The "outstanding" label
is removed from the object.
The method triggers the event "HandleOutstanding". This runs a
target system specific process that triggers the provisioning
process for the object.
Prerequisites:
l The table containing the object can be published.
l The target system connector has write access to the target
system.
NOTE: By default, the selected objects are processed in parallel, which speeds up
execution of the selected method. If an error occurs during processing, the action is
stopped and all changes are discarded.
Bulk processing of objects must be disabled if errors are to be localized, which means
the objects are processed sequentially. Failed objects are named in the error
message. All changes that were made up until the error occurred are saved.
NOTE: The target system connector must have write access to the target system in
order to publish outstanding objects that are being post-processed. That means, the
option Connection is read only must no be set for the target system connection.
l Memberships are saved in the target system as an object property in list form
(Example: List of users accounts in the property Members of an Azure Active
Directory group).
l Memberships can be modified in either of the connected systems.
l A provisioning workflow and provisioning processes are set up.
For each assignment table labeled like this, the changes made in the One Identity Manager
are saved in a separate table. During modification provisioning, the members list in the
target system is compared to the entries in this table. This means that only modified
memberships are provisioned and the members list does not get entirely overwritten.
NOTE: The complete members list is updated by synchronization. During this process,
objects with changes but incomplete provisioning are not handled. These objects are
logged in the synchronization log.
For more detailed information about provisioning memberships, see the One Identity
Manager Target System Synchronization Reference Guide.
Deactivating Synchronization
Regular synchronization cannot be started until the synchronization project and the
schedule are active.
An activated synchronization project can only be edited to a limited extend. The schema in
the synchronization project must be updated if schema modifications are required. The
synchronization project is deactivated in this case and can be edited again.
Furthermore, the synchronization project must be deactivated if synchronization should not
be started by any means (not even manually).
Related Topics
To manage an Azure Active Directory environment in One Identity Manager, the following
data is relevant.
l Configuration parameter
Use configuration parameters to configure the behavior of the system's basic
settings. One Identity Manager provides default settings for different configuration
parameters. Check the configuration parameters and modify them as necessary to
suit your requirements.
Configuration parameters are defined in the One Identity Manager modules. Each
One Identity Manager module can also install configuration parameters. You can find
an overview of all configuration parameters in the category Base data | General |
Configuration parameters in the Designer.
For more information, see Appendix: Configuration Parameters for Managing Azure
Active Directory on page 151.
l Account definitions
One Identity Manager has account definitions for automatically allocating user
accounts to employees during working hours. You can create account definitions for
every target system. If an employee does not have a user account in the target
system, a new user account is created. This is done by assigning account
definitions to an employee using the integrated inheritance mechanism followed by
process handling.
For more information, see Setting Up Account Definitions on page 35.
l Password policies
One Identity Manager provides you with support for creating complex password
policies, for example, for system user passwords, the employees' central password
as well as passwords for individual target systems. Password polices apply not only
when the user enters a password but also when random passwords are generated.
Predefined password policies are supplied with the default installation that you can
user or customize if required. You can also define your own password policies.
For more information, see Password Policies on page 53.
Property Description
User Table in the One Identity Manager schema which maps user accounts.
account
table
Target Target system to which the account definition applies.
System
Manage Manage level to use by default when you add new user accounts.
level
(initial)
Risk index Value for evaluating the risk of account definition assignments to
employees. Enter a value between 0 and 1. This property is only visible
when the configuration parameter QER\CalculateRiskIndex is set.
For more detailed information, see the .One Identity Manager Risk
Assessment Administration Guide
Service item Service item through which you can request the account definition in the IT
Shop. Assign an existing service item or add a new one.
IT Shop Specifies whether the account definition can be requested through the IT
Shop. The account definition can be ordered by an employee over the Web
Portal and distributed using a defined approval process. The account
definition can still be directly assigned to employees and roles outside the
IT Shop.
Only for use Specifies whether the account definition can only be requested through the
in IT Shop IT Shop. The account definition can be ordered by an employee over the
Web Portal and distributed using a defined approval process. This means,
the account definition cannot be directly assigned to roles outside the IT
Shop.
IMPORTANT: Only set this option if you can ensure that all current
internal employees in the database and all pending newly added
internal employees obtain a user account in this target system.
Spare field Additional company specific information. Use the Designer to customize
01 - spare display names, formats and templates for the input fields.
field 10
The One Identity Manager supplies a default configuration for manage levels:
l Unmanaged
User accounts with a manage level of "Unmanaged" become linked to an employee
but do not inherit any other properties. When a new user account is added with this
manage level and an employee is assigned, some of the employee's properties are
transferred initially. If the employee properties are changed at a later date, the
changes are not passed onto the user account.
l Full managed
User accounts with a manage level of "Full managed" inherit specific properties from
the assigned employee.
NOTE: The manage levels "Full managed" and "Unmanaged" are evaluated in the
templates. You can customize the supplied templates in the Designer.
You can define other manage levels depending on your requirements. You need to
amend the templates to include manage level approaches.
Specify the effect of temporarily or permanently disabling, deleting or the security risk of
an employee on its user accounts and group memberships for each manage level. For more
detailed information about manage levels, see the One Identity Manager Target System
Base Module Administration Guide.
l Employee user accounts can be locked when they are disabled, deleted or rated as a
security risk so that permissions are immediately withdrawn. If the employee is
reinstated at a later date, the user accounts are also reactivated.
l You can also define group membership inheritance. Inheritance can be discontinued
if desired when, for example, the employee’s user accounts are disabled and
therefore cannot be members in groups. During this time, no inheritance processes
should be calculated for this employee. Existing group memberships are deleted!
Related Topics
Property Description
Lock user accounts if Specifies whether user accounts of employees marked for
deletion is deferred deletion are locked.
Lock user accounts if Specifies whether user accounts of employees posing a security
security is at risk risk are locked.
Retain groups if user Specifies whether locked user accounts retain their group
account disabled memberships.
Property Description
Source Specifies which roles to use in order to find the user account properties.
You have the following options:
l Primary department
l Primary location
l Primary cost center
l Primary business roles
NOTE: Only use the primary business role if the Business Ro-
les Module is installed.
l Empty
If you select a role, you must specify a default value and set the
option Always use default value.
Default Default value of the property for an employee's user account if the
value value is not determined dynamically from the IT operating data.
Always Specifies whether user account properties are always filled with the
use default value. IT operating data is not determined dynamically from a
default role.
value
Related Topics
Property Description
Prerequisites
4. Mark all the object properties in the selection column that will be given the
new value.
5. Click Apply.
The templates are applied to all selected user accounts and properties.
NOTE: If a user account already exists and is disabled, then it is re-enabled. You
have to alter the user account manage level afterwards in this case.
For detailed information about preparing role classes to be assigned, see the One Identity
Manager Identity Management Base Module Administration Guide.
Related Topics
IMPORTANT: Only set this option if you can ensure that all current internal
employees in the database and all pending newly added internal employees
obtain a user account in this target system.
The account definition is assigned to every employee that is not marked as external. New
employees automatically obtain this account definition as soon as they are added. The
assignment is calculated by the DBQueue Processor.
Related Topics
Related Topics
NOTE: Account definitions with the option Only use in IT Shop can only by assigned
to system roles that also have this option set.
For more detailed information about request from company resources through the IT Shop,
see the One Identity Manager IT Shop Administration Guide.
Related Topics
User accounts are only linked to the employee (state "Linked") if no account definition is
given. This is the case on initial synchronization, for example.
NOTE: If an account definition is deleted, the user accounts arising from this account
definition are deleted.
The password policy "One Identity Manager password policy" is used for logging into One
Identity Manager. This password policy defined the settings for the system user passwords
(DialogUser.Password and Person.DialogUserPassword) as well as the access code for a one
off log in on the Web Portal (Person.Passcode).
The password policy "One Identity Manager password policy" is also labeled as the default
and is used when no other password policy is found.
An employee's central password is formed from the target system specific user accounts
by respective configuration. The password policy "Employee central password policy"
defines the settings for the central password (Person.CentralPassword).
IMPORTANT: Ensure that the password policy "Employee central password policy"
does not violate the target system specific password requirements.
A predefined password that you can apply to the user account password columns, is
provided for every target system.
NOTE: When you update One Identity Manager version 7.x to One Identity Manager
version 8.0, the configuration parameter settings for forming passwords are passed
on to the target system specific password policies.
IMPORTANT: If you are not working with target system specific password policies,
the default policy applies. In this case, ensure that the password policy "One Identity
Manager password policy" does not violate the target system requirements.
The password policy "Azure Active Directory password policy" is predefined for Azure
Active Directory. You can apply this password policy to Azure Active Directory user
accounts (AADUser.Password) of an Azure Active Directory tenant.
If the tenants' password requirements differ, it is recommended that you set up your own
password policies for each tenant.
Property Meaning
Display name Password policy name. Translate the given text using the
button.
Description Spare text box for additional explanation. Translate the given
text using the button.
Error Message Custom error message outputted if the policy is not fulfilled.
Translate the given text using the button.
Owner (Application Role) Application roles whose members can configure the password
policies.
Policy Settings
Define the following settings for a password policy on the Password tab.
Property Meaning
Validity period Maximum age of the password. Enter the length of time a
password can be used before it expires.
Password history Enter the number of passwords to be saved. If the value '5' is
entered, for example, the last 5 passwords of the user are
saved.
Min. password strength Specifies how secure the password must be. The higher the
password strength, the more secure it is. The password
strength is not tested if the value is '0'. The values '1', '2', '3'
and '4' gauge the required complexity of the password. The
value '1' demands the least complex password. The value '4'
demands the highest complexity.
Name properties denied Specifies whether name properties are permitted in the
password.
Property Meaning
Min. number lower case Specifies the minimum number of lowercase letters the
password must contain.
Min. number uppercase Specifies the minimum number of uppercase letters the
password must contain.
Min. number digits Specifies the minimum number of digits the password must
contain.
Min. number special Specifies the minimum number of special characters the
characters password must contain.
TIP: To use a base object, take the property Entity of the PasswordPolicy class.
A password cannot have '?' or '!' at the beginning. The script checks a given password
for validity.
Public Sub CCC_PwdValidate( policy As VI.DB.Passwords.PasswordPolicy, spwd As
System.Security.SecureString)
Dim pwd = spwd.ToInsecureArray()
If pwd.Length>0
If pwd(0)="?" Or pwd(0)="!"
Throw New Exception(#LD("Password can't start with '?' or '!'")#)
End If
End If
If pwd.Length>2
If pwd(0) = pwd(1) AndAlso pwd(1) = pwd(2)
Related Topics
TIP: To use a base object, take the property Entity of the PasswordPolicy class.
The script replaces the invalid characters '?' and '!' in random passwords.
Public Sub CCC_PwdGenerate( policy As VI.DB.Passwords.PasswordPolicy, spwd As
System.Security.SecureString)
Dim pwd = spwd.ToInsecureArray()
Related Topics
Restricted Passwords
You can add words to a list of restricted terms to prohibit them from being used in
passwords.
Property Description
You have the following possible options for issuing an initial password for a new Azure
Active Directory user account.
1. User the employee's central password. The employee’s central password is mapped
to the user account password.
l Set the configuration parameter "QER\Person\UseCentralPassword" in the
Designer.
If the configuration parameter "QER\Person\UseCentralPassword" is set, the
employee's central password is automatically mapped to an employee's user
2. Create user accounts manually and enter a password in their master data.
3. Specify an initial password to be used when user accounts are created automatically.
l Apply the target system specific password policies and enter an initial
password in the password policies.
4. Assign a randomly generated initial password to enter when you create user
accounts.
l Set the configuration parameter
"TargetSystem\AzureAD\Accounts\InitialRandomPassword" in the Designer.
l Apply target system specific password policies and define the character sets
that the password must contain.
l Specify which employee will receive the initial password by email.
Related Topics
"TargetSystem\AzureAD\DefaultAddress".
You can configure the login information for new user accounts to be sent by email to a
specified person. In this case, two messages are sent with the user name and the initial
password. Mail templates are used to generate the messages. The mail text in a mail
template is defined in several languages, which means the recipient’s language can be
taken into account when the email is generated. Mail templates are supplied in the default
installation with which you can configure the notification procedure.
1. Ensure that the email notification system is configured in One Identity Manager. For
more detailed information, see the .One Identity Manager Configuration Guide
2. Enable the configuration parameter "Common\MailNotification\DefaultSender" in the
Designer and enter the email address for sending the notification.
3. Ensure that all employees have a default email address. Notifications are sent to this
address. For more detailed information, see the .One Identity Manager Identity
Management Base Module Administration Guide
4. Ensure that a language culture can be determined for all employees. Only then can
they receive email notifications in their own language. For more detailed
information, see the .One Identity Manager Identity Management Base Module
Administration Guide
When a randomly generated password is issued for the new user account, the initial login
data for a user account is sent by email to a previously specified person.
TIP: Change the value of the configuration parameter in order to use custom mail
templates for these mails.
User Task
Target Target system managers must be assigned to the application role Target
System systems | Azure Active Directory or a sub application role.
Managers
Users with this application role:
or groups.
l Edit password policies for the target system.
l Prepare groups for adding to the IT Shop.
l Configure synchronization in the Synchronization Editor and defines
the mapping for comparing target systems and One Identity
Manager.
l Edit the synchronization's target system types and outstanding
objects.
l Authorize other employees within their area of responsibility as
target system managers and create child application roles if
required.
1. Log in to the Manager as One Identity Manager administrator (application role Base
role | Administrators)
2. Select the category One Identity Manager Administration | Target systems |
Administrators.
3. Select Assign employees in the task view.
4. Assign the employee you want and save the changes.
1. Log yourself into the Manager as target system administrator (application role
Target systems | Administrator).
2. Select the category One Identity Manager Administration | Target systems |
Azure Active Directory.
3. Select Assign employees in the task view.
4. Assign the employees you want and save the changes.
Related Topics
l One Identity Manager Users for Managing an Azure Active Directory System
on page 9
l Azure Active Directory Tenant on page 73
Editing a Server
Servers must know your server functionality in order to handle Azure Active Directory
specific processes in One Identity Manager. For example, the synchronization server.
You have several options for defining a server's functionality:
l Create an entry for the Job server in the category Base Data | Installation | Job
server in the Designer. For detailed information, see the One Identity Manager
Configuration Guide.
l Select an entry for the Job server in the category Manager | Basic configuration
data | Server in the Azure Active Directory and edit the Job server master data.
Use this task if the Job server has already been declared in One Identity Manager and
you want to configure special functions for the Job server.
NOTE: One Identity Manager Service must be installed, configured and started in
order for a server to execute its function in the One Identity Manager network.
Proceed as follows in the One Identity Manager Installation Guide.
NOTE: All editing options are available to you in the Designer, in the category Base
Data | Installation | Job server.
Property Meaning
(IPv6)
Copy Permitted copying methods that can be used when this server is the source of
process a copy action. Only the methods "Robocopy" and "Rsync" are currently
(source supported.
server) If no method is given, the One Identity Manager Service determines the
operating system of the server during runtime. Replication then takes place
between servers with a Windows operating system using "Robocopy" and
between servers with the Linux operating system using "rsync". If the
operating systems of the source and destination servers differ, it is important
that the right copy method is applied for successful replication. A copy
method is chosen that supports both servers.
Copy Permitted copying methods that can be used when this server is the destin-
process ation of a copy action.
(target
server)
Coding Character set coding that is used to write files to the server.
Executing Name of the executing server. The name of the server that exists physically
server and where the processes are handled.
This input is evaluated when One Identity Manager Service is automatically
updated. If the server is handling several queues the process steps are not
supplied until all the queues that are being processed on the same server
have completed their automatic update.
Queue Name of the queue to handle the process steps. Each One Identity Manager
Service within the network must have a unique queue identifier. The process
steps are requested by the job queue using exactly this queue name. The
queue identifier is entered in the One Identity Manager Service configuration
file.
Server Operating system of the server. This input is required to resolve the path
operating name for replicating software profiles. Permitted values are "Win32",
system "Windows", "Linux" and "Unix". If the input is empty, "Win32" is assumed.
Service One Identity Manager Service user account information. In order to replicate
account between non-trusted systems (non-trusted domains, Linux server) the One
data Identity Manager Service user information has to be declared for the servers
in the database. This means that the service account, the service account
domain and the service account password have to be entered for the server.
One Specifies whether a One Identity Manager Service is installed on this server.
Identity This option is enabled by the procedure QBM_PJobQueueLoad the moment the
Manager queue is called for the first time.
Service The option is not automatically removed. If necessary, you can reset this
installed option manually for servers whose queue is no longer enabled.
Stop One Specifies whether the One Identity Manager Service has stopped. If this
Identity option is set for the Job server, the One Identity Manager Service does not
Manager process any more tasks.
Service You can make the service start and stop with the appropriate administrative
permissions in program "Job Queue Info".
Related Topics
NOTE: All editing options are available to you in the Designer, in the category Base
Data | Installation | Job server.
The server function defines the functionality of a server in One Identity Manager. One
Identity Manager processes are handled depending on the server function.
NOTE: More server functions may be available depending on which modules are
installed.
Server Remark
Function
Azure Active Server on which the Azure Active Directory connector is installed. This
Directory server executes synchronization with the target system Azure Active
connector (via Directory.
Microsoft
Graph)
CSV connector Server on which the CSV connector for synchronization is installed.
Domain The Active Directory domain controller. Servers that are not labeled as
controller domain controller are considered to be member servers.
Generic server Server for generic synchronization with a custom target system.
Home server Server for adding home directories for user accounts.
Update Server This server executes automatic software updating of all other servers.
The server requires a direct connection to the database server that the
One Identity Manager database is installed on. The server can execute
SQL tasks.
The server with the installed One Identity Manager database, is labeled
with this functionality during initial installation of the schema.
SQL processing This server can process SQL tasks. Several SQL processing servers can
server be set up to spread the load of SQL processes. The system distributes
the generated SQL processes throughout all the Job servers with this
server function.
One Identity Server on which the One Identity Manager connector is installed. This
Manager server executes synchronization with the target system One Identity
database Manager.
connector
Profile Server Server for setting up profile directories for user accounts.
synchronization
Server
SMTP host Server from which the One Identity Manager Service sends email
notifications. Prerequisite for sending mails using the One Identity
Manager Service is SMTP host configuration.
Windows The server can run Windows PowerShell version 3.0 or later.
PowerShell
connector
Related Topics
For more detailed information about the Azure Active Directory structure, see the Azure
Active Directory documentation from Microsoft.
You must provide details about for organization the first time you register for a Microsoft
cloud service. This detailed information is used to make a new Azure Active Directory
directory partition. The organization represents one Azure Active Directory tenant. You can
edit the master data of each tenant in the One Identity Manager. You cannot create new
tenants in the One Identity Manager.
A base domain is linked to the core directory in the cloud. You can also add other user
defined domains in Azure Active Directory, which you can then allocate to Microsoft cloud
services. One Identity Manager only loads verified domain data into the database. It is not
possible to edit data in One Identity Manager.
Property Description
Account Initial account definition for creating user accounts. This account
definition definition is used if automatic assignment of employees to user accounts
(initial) is used for this tenant and user accounts should be created which are
already managed (state "linked configured"). The account definition's
default manage level is applied.
User accounts are only linked to the employee (state "Linked") if no
account definition is given. This is the case on initial synchronization, for
example.
Target Application role in which target system managers are specified for the
System tenant. Target system managers only edit tenant objects that are
Managers assigned to them. Each tenant can have a different target system
manager assigned to it.
Select the One Identity Manager application role whose members are
responsible for administration of this tenant. Use the button to add a
new application role.
Town City.
Country Country.
Synchronized NOTE: You can only specify the synchronization type when adding a
by new tenant. No changes can be made after saving.
Use "One Identity Manager" when you create a tenant with the
Synchronization Editor.
No none none
synchronization
Related Topics
Property Description
To define a category
NOTE: The Manager is locked for editing throughout. To edit objects in the Manager,
close the Synchronization Editor.
Related Topics
Property Description
Primary Specifies whether this is the primary domain for created new user
domain accounts, for example.
Initial Specifies whether this is the initial domain. The initial domain is create
domain when a tenant is registered in Azure Active Directory.
You manage user account in One Identity Manager with Azure Active Directory. The user
requires a subscription to access a service plan in Azure Active Directory. User accounts
obtain the required access rights to the resources through membership in groups.
l Employees and user accounts can be entered manually and assigned to each other.
l Employees can automatically obtain their account definitions using user account
resources. If an employee does not have a user account in a tenant, a new user
Related Topics
l Entering Master Data for Azure Active Directory User Accounts on page 84
l Setting Up Account Definitions on page 35
l Automatic Assignment of Employees to Azure Active Directory User Accounts
on page 94
l For more detailed information about handling and administration of employees and
user accounts, see the One Identity Manager Target System Base Module
Administration Guide.
identity
Normally, each employee obtains a default user account, which has the permissions they
require for their regular work. The user accounts are linked to the employee. The effect of
the link and the scope of the employee’s inherited properties on the user accounts can be
configured through an account definition and its manage levels.
1. Create an account definition and assign the manage level "Unmanaged" or "Full
managed" to it.
2. Specify the effect of temporarily or permanently disabling, deleting or the
security risk of an employee on its user accounts and group memberships for
each manage level.
3. Create a formatting rule for IT operating data.
An account definition specifies which rules are used to generate the IT operating data
for example, whether the container for a user account is made up of the employee's
department, cost center, location or business role and which default values will be
used if no IT operating data can be found through the employee's primary roles.
Which IT operating data is required, depends on the target system. The following
setting are recommended for default user accounts:
NOTE: You can automatically label administrative user accounts as privileged user
accounts. To do this, set the schedule "Mark selected user accounts as privileged" in
the Designer.
Privileged user accounts are used to provide employees with additional privileges. This
includes administrative user accounts or service accounts, for example. The user accounts
are marked with the property Privileged user account (IsPrivilegedAccount).
NOTE: The criteria used to label user accounts automatically as privileged, are
defined as extensions to the view definition (ViewAddOn) on the table
TSBVAccountIsPrivDetectRule (table type "Union"). The evaluation is done in the script
TSB_SetIsPrivilegedAccount.
1. Create an account definition. Create a new manage level for privileged user accounts
and assign this manage level to the account definition.
2. If you want to prevent properties for privileged user accounts being overwritten, set
the property IT operating data overwrites for the manage level, to the value
"Only initially". In this case, the properties are populated just once when the user
accounts is created.
NOTE: Specify a formatting rule for a naming schema if it is required by the company
for privileged user account login names.
To use a prefix with a login name, set the configuration parameter
"TargetSystem\AzureAD\Accounts\PrivilegedAccount\AccountName_Prefix" in the
Designer. To use a postfix with a login name, set the configuration parameter
"TargetSystem\AzureAD\Accounts\PrivilegedAccount\AccountName_Postfix" in the
Designer.
These configuration parameters are evaluated in the default installation, if a user
account is marked with the property Privileged user account
(IsPrivilegedAccount). The user account login names are renamed according to the
formatting rules. This also takes place if the user accounts are labeled as privileged
by the schedule "Mark selected user accounts as privileged".
NOTE: If employees obtain their user accounts through account definitions, they have
to have a central user account and obtain their company IT data through assignment
to a primary department, primary location or a primary cost center.
TIP: You can combine the account definition for creating the user account and the
subscription that will be used into one system role. in this way, the employee
automatically obtains a user account and a subscription.
An employee can obtain this system role directly, through departments, cost centers,
location or business roles or by IT Shop request.
l General Master Data for a Azure Active Directory User Account on page 85
l Contact Data for a Azure Active Directory User Account on page 88
l Organizational Data for an Azure Active Directory User Account on page 88
l Active Directory User Account Local Data on page 89
Property Description
Employee Employee that uses this user account. An employee is already entered if
the user account was generated by an account definition. If you create the
user account manually, you can select an employee in the menu. If you
use automatic employee assignment, an associated employee is created
and entered into the user account when the user account is saved.
Account Account definition through which the user account was created.
definition
Use the account definition to automatically fill user account master data
and to specify a manage level for the user account. The One Identity
Manager finds the IT operating data of the assigned employee and enters it
in the corresponding fields in the user account.
Manage User account's manage level. Select a manage level from the menu. You
level can only specify the manage level can if you have also entered an account
definition. All manage levels of the selected account definition are
available in the menu.
Tenant User account's tenant.
First name The user’s first name. If you have assigned an account definition, the input
field is automatically filled out with respect to the manage level.
Last name The user’s last name. If you have assigned an account definition, the input
field is automatically filled out with respect to the manage level.
User login User account login name. The user's login name is made up of the alias
name and the domain. User login names that are formatted like this correspond
to the User Principal Name (UPN) in Azure Active Directory.
Password Password for the user account. Depending on the configuration parameter
"Person\UseCentralPassword" the employee’s central password can be
mapped to the user account‘s password. If you use an initial password for
the user accounts, it is automatically entered when a user account is
created.
Change Specifies whether the user must change their password the next time they
password log in.
the next
time you log
in
Password Policies, which only apply to the user account. The available options are:
policies No restrictions, Password never expires and Allow weak
passwords.
Risk index Maximum risk index values for all assigned . This property is only visible if
(calculated) the configuration parameter "QER\CalculateRiskIndex" is set. For more
detailed information, see the .One Identity Manager Risk Assessment
Administration Guide
Category Categories for the inheritance of groups by the user account. Select one or
more categories from the menu. Groups can be selectively inherited by
user accounts. To do this, groups and user accounts or contacts are divided
into categories.
Value Description
Groups can Specifies whether the user account groups can inherit through the
be inherited employee. If this option is set, the user account inherits groups through
hierarchical roles or IT Shop requests.
User Specifies whether the user account is disable. If a user account is not
account is required for a period of time, you can temporarily disable the user account
disabled by using the option <User account is deactivated>.
Related Topics
Property Description
Street Street or road. If you have assigned an account definition, the input field is
automatically filled out with respect to the manage level.
State State. If you have assigned an account definition, the input field is
automatically filled out with respect to the manage level.
Town City. If you have assigned an account definition, the input field is
automatically filled out with respect to the manage level. Locations can be
automatically generated and employees assigned based on the town.
Zip code Zip code. If you have assigned an account definition, the input field is
automatically filled out with respect to the manage level.
Mobile Mobile number. If you have assigned an account definition, the input field is
phone automatically filled out with respect to the manage level.
Proxy Other email addresses for the user. You can also add other mail connectors
addresses (for example, CCMail, MS) in addition to the standard address type (SMTP,
X400).
Use the following syntax to set up other proxy addresses:
Address type: new email address
Property Description
Office Office. If you have assigned an account definition, the input field is
automatically filled out with respect to the manage level.
Company Employee's company. If you have assigned an account definition, the input
field is automatically filled out with respect to the manage level.
Job Job description. If you have assigned an account definition, the input field is
description automatically filled out with respect to the manage level.
Account Manager responsible for the user account.
manager
To specify an account manager
Property Description
Last synchronization Time of the last Azure Active Directory user account
synchronization with the local Active Directory.
SID of the local account. Security ID of the local Active Directory user account.
Related Topics
Related Topics
l Entering Master Data for Azure Active Directory User Accounts on page 84
Related Topics
Related Topics
l Assigning Azure Active Directory Administrator Roles to Azure Active Directory User
Accounts on page 120
Related Topics
Related Topics
l Assigning Disabled Azure Active Directory Service Plans to Azure Active Directory
User Accounts on page 139
When you add a user account, an existing employee can be assigned automatically or
added if necessary. In the process, the employee master data is created based for
existing user master data. This mechanism can follow on after a new user account has
been created manually or through synchronization. Define criteria for finding employees
to apply to automatic employee assignment. If a user account is linked to an employee
through the current mode, the user account is given, through an internal process, the
default manage level of the account definition entered in the user account's target system.
You can customize user account properties depending on how the behavior of the manage
level is defined.
If you run this procedure during working hours, automatic assignment of employees to
user accounts takes place from that moment onwards. If you disable the procedure again
NOTE:
The following applies for synchronization:
For more detailed information about assigning employees automatically, see the One
Identity Manager Target System Base Module Administration Guide.
Related Topics
NOTE: When the employees are assigned to user accounts on the basis of search
criteria, user accounts are given the default manage level of the account definition
entered in the user account's target system. You can customize user account
properties depending on how the behavior of the manage level is defined.
It is not recommended to make assignment to administrative user accounts based on
search criteria. Use the task Change master data to assign employees to
administrative user account for the respective user account.
Table 33: Default Search Criteria for User Accounts and Contacts
You can create a suggestion list in the "Assignments" view for assignments of employees
to user accounts based on the search criteria. User accounts are grouped in different
views for this.
View Description
Suggested This view lists all user accounts to which One Identity Manager can assign
assignments an employee. All employees are shown who were found using the search
criteria and can be assigned.
Assigned This view lists all user accounts to which an employee is assigned.
user
accounts
Without This view lists all user accounts to which no employee is assigned and for
employee which no employee was found using the search criteria.
assignment
TIP: By double-clicking on an entry in the view, you can view the user account and
employee master data.
l Click Reload.
All possible assignments based on the search criteria are found in the target system
for all user accounts. The three views are updated.
To remove assignments
For more detailed information about defining search criteria, see the One Identity Manager
Target System Base Module Administration Guide.
Related Topics
The way you disable user accounts depends on how they are managed.
Scenario:
l The user account is linked to employees and is managed through account definitions.
User accounts managed through account definitions are disabled when the employee is
temporarily or permanently disabled. The behavior depends on the user account manage
level. User accounts with the manage level "Full managed" are disabled depending on the
account definition settings. For user accounts with another manage level, modify the
column template AADUser.AccountDisabled accordingly.
Scenario:
User accounts managed through user account definitions are disabled when the employee
is temporarily or permanently disabled. The behavior depends on the configuration
parameter "QER\Person\TemporaryDeactivation".
l If the configuration parameter is set, the employee’s user accounts are disabled if
the employee is permanently or temporarily disabled.
l If the configuration parameter is not set, the employee’s properties do not have any
effect on the associated user accounts.
Scenario:
Related Topics
NOTE: As long as an account definition for an employee is valid, the employee retains
the user account that was created by it. If the account definition assignment is
removed, the user account created through this account definition, is deleted.
By default, user accounts are finally deleted from the database after 30 days.The user
accounts are initially disabled. You can reenable the user accounts until deferred deletion is
run. After deferred deletion is run, the user account are deleted from the database and
Related Topics
Azure Active Directory recognizes several groups types, in which you can gather users and
groups to, for example, regulate access to resources or email distribution.
Groups are loaded into One Identity Manager by synchronization. You can edit individual
master data of the group and you can create new security groups in One Identity Manager.
You cannot create more groups types in One Identity Manager.
To add users to groups, you assign the groups directly to users. This can be assignments of
groups to departments, cost centers, location, business roles or to the IT Shop.
The group types supported in One Identity Manager are listed below.
Group Description
type
Office 365 Office 365 groups are loaded into One Identity Manager by synchronization.
group You can edit Office 365 groups in One Identity Manager but you cannot
create new them in One Identity Manager.
Distribution Distribution groups are used to send emails to group members. Distribution
group groups are loaded into One Identity Manager by synchronization. You can
edit distribution groups in One Identity Manager but you cannot create them
in One Identity Manager.
Mail- Mail-enabled security groups are security groups that are used as
enabled distribution groups.
security
Mail-enabled security groups are loaded into One Identity Manager by
groups
synchronization. You edit mail-enabled security in One Identity Manager but
you cannot create new mail-enabled security groups in One Identity
Manager.
l General Master Data for an Azure Active Directory Group on page 103
l Information about Local Active Directory Groups on page 105
Property Description
Display The display name is used to display the group in the One Identity Manager
name tools user interface.
Proxy Other email addresses for the group. You can also add other mail connectors
addresses (for example, CCMail, MS) in addition to the standard address type (SMTP,
X400).
Group type Specifies a group's type The value is "unified" for Office 365 group and is
empty for security and distribution groups.
Security Specifies whether the this group is a security group. Resource permissions
group are distributed through security groups. User accounts and other groups are
added to security groups, which makes administration easier.
Mail- Specifies whether the email is enabled for the group. If this option is set for
enabled a security group, it is a mail-enabled security group. Otherwise, it is a
distribution group.
IT Shop Specifies whether the group can be requested through the IT Shop. This
group can be requested by staff through the Web Portal and granted through
a defined approval process. The group can still be assigned directly to
hierarchical roles.
Only for Specifies whether the group can only be requested through the IT Shop. This
use in IT group can be requested by staff through the Web Portal and granted through
Shop a defined approval process. The group may not be assigned directly to
hierarchical roles.
Service Service item data for requesting the group through the IT Shop.
item
Risk index Value for evaluating the risk of assigning the group to user accounts. Enter a
value between 0 and 1. This property is only visible when the configuration
parameter QER\CalculateRiskIndex is set.
For more detailed information about risk assessment, see the One Identity
Manager Risk Assessment Administration Guide.
Related Topics
Property Description
l Assignment of employees and groups is permitted for role classes (department, cost
center, location or business role).
l The user accounts are marked with the option Groups can be inherited.
l Assigning Azure Active Directory Groups to Departments, Cost Centers and Locations
on page 106
Assign the group to business roles so that the group is assigned to user accounts through
these business roles.
l Assigning Azure Active Directory Groups to Departments, Cost Centers and Locations
on page 106
l Assigning Azure Active Directory User Accounts directly to an Azure Active Directory
Group on page 108
l Adding Azure Active Directory Groups to System Roles on page 109
l Adding Azure Active Directory Groups to the IT Shop on page 109
l One Identity Manager Users for Managing an Azure Active Directory System
on page 9
Related Topics
l Assigning Azure Active Directory Groups Directly to Azure Active Directory User
Accounts on page 91
l Assigning Azure Active Directory Groups to Departments, Cost Centers and Locations
on page 106
l Assigning Azure Active Directory Groups to Business Roles on page 107
l Adding Azure Active Directory Groups to System Roles on page 109
l Adding Azure Active Directory Groups to the IT Shop on page 109
Use this task to add a group to system roles. If you assign a system role to employees, all
the employees' user accounts inherit the group.
NOTE: Groups with the option Only use in IT Shop can only be assigned to system
roles that also have this option set. For more detailed information, see the .One
Identity Manager System Roles Administration Guide
Related Topics
l Assigning Azure Active Directory Groups to Departments, Cost Centers and Locations
on page 106
l Assigning Azure Active Directory Groups to Business Roles on page 107
l Assigning Azure Active Directory User Accounts directly to an Azure Active Directory
Group on page 108
l Adding Azure Active Directory Groups to the IT Shop on page 109
NOTE: IT Shop administrators can assign groups to IT Shop shelves in the case of
role-based login. Target system administrators are not authorized to add groups in
the IT Shop.
1. Select the category Azure Active Directory | Groups (non role-based login).
- OR -
Select the category Entitlements | Azure Active Directory groups (role-
based login).
2. Select the group in the result list.
3. Select Add to IT Shop in the task view.
4. Assign the group to the IT Shop shelves in Add assignments.
5. Save the changes.
1. Select the category Azure Active Directory | Groups (non role-based login).
- OR -
Select the category Entitlements | Azure Active Directory groups (role-
based login).
2. Select the group in the result list.
3. Select Add to IT Shop in the task view.
4. Remove the group from the IT Shop shelves in Remove assignments.
5. Save the changes.
1. Select the category Azure Active Directory | Groups (non role-based login).
- OR -
Select the category Entitlements | Azure Active Directory groups (role-
based login).
2. Select the group in the result list.
3. Select Remove from all shelves (IT Shop) in the task view.
4. Confirm the security prompt with Yes.
5. Click OK.
This removes the group from all One Identity Manager Service shelves. All requests
and assignment requests with this group are canceled in the process.
Related Topics
l General Master Data for an Azure Active Directory Group on page 103
l Assigning Azure Active Directory Groups to Departments, Cost Centers and Locations
on page 106
l Assigning Azure Active Directory Groups to Business Roles on page 107
l Assigning Azure Active Directory User Accounts directly to an Azure Active Directory
Group on page 108
l Adding Azure Active Directory Groups to System Roles on page 109
When groups are assigned to user accounts an employee may obtain two or more groups,
which are not permitted in this combination. To prevent this, you can declare mutually
exclusive groups. To do this, you specify which of the two groups should apply to the user
accounts if both are assigned.
It is possible to assign an excluded group directly, indirectly or by IT Shop request at any
time. One Identity Manager determines whether the assignment is effective.
NOTE:
l You cannot define a pair of mutually exclusive groups. That means, the defin-
ition "Group A excludes group B" AND "Group B excludes groups A" is not
permitted.
l You must declare each group to be excluded from a group separately. Exclusion
definitions cannot be inherited.
l One Identity Manager does not check whether membership of an excluded
group is permitted in another group.
Clara Harris has a user account in this tenant. She primarily belongs to the department
"marketing". The business role "Control group" and the department "Finance" are assigned
to her secondarily. Without an exclusion definition, the user account obtains all the
permissions of groups A, B and C.
By using suitable controls, you want to prevent an employee from being able to trigger a
request and to pay invoices. That means, groups A, B and C are mutually exclusive. An
employee that checks invoices may not be able to make invoice payments as well. That
means, groups B and C are mutually exclusive.
Group A
Group B Group A
Group C Group B
Only the group C assignment is in effect for Clara Harris. It is published in the target
system. If Clara Harris leaves the business role "control group" at a later date, group B
also takes effect.
The groups A and C are in effect for Jenny Basset because the groups are not defined as
mutually exclusive. That means that the employee is authorized to trigger request and to
check invoices. If this should not be allowed, define further exclusion for group C.
To exclude a group
NOTE: Inheritance through categories is only taken into account when groups are
assigned indirectly through hierarchical roles. Categories are not taken into account
when groups are directly assigned to user accounts.
Related Topics
For more detailed information about using extended properties, see the One Identity
Manager Identity Management Base Module Administration Guide.
The group is deleted completely from the One Identity Manager database and from Azure
Active Directory.
By using administrator roles, you can assign administrative permissions to users. Azure
Active Directory recognizes several administrator roles, which fulfill different functions.
For more detailed information about administrator roles, see the Azure Active Directory
documentation from Microsoft.
Administrator roles are loaded into One Identity Manager by synchronization. You can edit
individual master data of administrator roles but cannot create new administrator roles in
One Identity Manager.
To add users to administrator roles, assign the administrator roles directly to the user. This
may be administrator role assignments to departments, cost centers, location, business
roles or to the IT Shop.
Property Description
Display The display name is used to display the administrator role in the One
name Identity Manager tool's user interface.
Template ID of the administrator role template on which this administrator role was
ID. based.
IT Shop Specifies whether the administrator role can be requested through the IT
Shop. The administrator role can be ordered by its employees over the Web
Portal and distributed using a defined approval process. The administrator
role can still be assigned directly to user accounts and hierarchical roles.
Only for Specifies whether the administration role can only be requested through the
use in IT IT Shop. The administrator role can be ordered by its employees over the
Shop Web Portal and distributed using a defined approval process. You cannot
assign an administrator role directly to a hierarchical role.
Service Specifies a service item for using to request the administrator role through
item the IT Shop.
Risk index Value for assessing the rich of assigning administrator roles to user
accounts. Enter a value between 0 and 1. This property is only visible if the
configuration parameter "QER\CalculateRiskIndex" is set.
For more detailed information about risk assessment, see the One Identity
Manager Risk Assessment Administration Guide.
Related Topics
Related Topics
l Assigning Azure Active Directory Administrator Roles to Business Roles on page 122
l Assigning Azure Active Directory User Accounts directly to Azure Active Directory
Administrator Roles on page 123
l Adding Azure Active Directory Administrator Roles to System Roles on page 123
l Adding Azure Active Directory Administrator Roles in the IT Shop on page 124
l One Identity Manager Users for Managing an Azure Active Directory System
on page 9
By assigning administrator roles to business roles, the administrator role can be assigned
to user accounts through these business roles.
Related Topics
Related Topics
NOTE: Administrator roles with the option Only use in IT Shop set, can only be
assigned to system roles that also have this option set. For more information, see the
One Identity Manager System Roles Administration Guide.
Related Topics
1. Select the category Azure Active Directory | Administrator roles (non role-
based login).
- OR -
Select the category Entitlements | Azure Active Directory administrator
roles (role-based login).
2. Select the administrator role in the result list.
3. Select Add to IT Shop in the task view.
4. Assign an administration role to the IT Shop shelf in Add assignments.
5. Save the changes.
1. Select the category Azure Active Directory | Administrator roles (non role-
based login).
- OR -
Select the category Entitlements | Azure Active Directory administrator
roles (role-based login).
2. Select the administrator role in the result list.
3. Select Add to IT Shop in the task view.
4. Remove the administrator role from IT Shop shelves in Remove assignments.
5. Save the changes.
1. Select the category Azure Active Directory | Administrator roles (non role-
based login).
- OR -
Select the category Entitlements | Azure Active Directory administrator
roles (role-based login).
2. Select the administrator role in the result list.
3. Select Remove from all shelves (IT Shop) in the task view.
4. Confirm the security prompt with Yes.
5. Click OK.
The administrator role is removed from all shelves by the One Identity Manager
Service. All requests and assignment requests with this administrator role are
canceled in the process.
For more detailed information about request from company resources through the IT Shop,
see the One Identity Manager IT Shop Administration Guide.
l Editing Azure Active Directory Administrator Role Master Data on page 118
l Assigning Azure Active Directory Administration Roles to Departments, Cost Centers
and Locations on page 120
l Assigning Azure Active Directory Administrator Roles to Business Roles on page 122
l Assigning Azure Active Directory User Accounts directly to Azure Active Directory
Administrator Roles on page 123
l Adding Azure Active Directory Administrator Roles to System Roles on page 123
Related Topics
For more detailed information about using extended properties, see the One Identity
Manager Identity Management Base Module Administration Guide.
Users require a subscription to access a service plan in Azure Active Directory. Users
obtain all the service plans that are linked to a subscription. By assigning subscriptions
directly to users, you make the subscriptions available to them. You can assign
subscriptions to departments, cost centers, locations, business roles or the IT Shop.
So called "disabled service plans" are mapped in the One Identity Manager to prevent users
from using single service plans. Disabled service plans are created automatically after
synchronizing the subscription in the One Identity Manager. Disabled service plans are
requested through the IT Shop or assigned to users through departments, cost centers,
locations, business roles or system roles.
The actual service plans available to the user in Azure Active Directory result from the
user's subscription and the service plans associated with it and the assignment of disabled
service plans.
Property Description
SKU display The SKU display name for the subscription, for example "AAD_Premium" or
name "RMSBASIC".
IT Shop Specifies whether the subscription can be requested through the IT Shop.
This subscription can be requested by staff through the Web Portal and
granted through a defined approval procedure. The subscription can still be
assigned directly to user accounts and hierarchical roles.
Only for use Specifies whether the subscription can only be requested through the IT
in IT Shop Shop. This subscription can be requested by staff through the Web Portal
and granted through a defined approval procedure. The subscription may
not be assigned directly to hierarchical roles.
Service Service item data for requesting the subscription through the IT Shop.
item
Risk index Value for evaluating the risk of assigning the subscription to user accounts.
Enter a value between 0 and 1. This property is only visible if the
configuration parameter "QER\CalculateRiskIndex" is set.
For more detailed information about risk assessment, see the One Identity
Manager Risk Assessment Administration Guide.
TIP: You can combine the account definition for creating the user account and the
subscription that will be used into one system role. in this way, the employee
automatically obtains a user account and a subscription.
An employee can obtain this system role directly, through departments, cost centers,
location or business roles or by IT Shop request.
Related Topics
Assign subscriptions to business roles to assign them to user accounts over these
business roles.
Related Topics
Related Topics
Use this task to add a subscription to system roles. When you assign a system role to an
employee, the subscription is inherited by all user accounts owned by these employees.
Related Topics
NOTE: IT Shop administrators can assign subscriptions to IT Shop shelves in the case
of role-based login. Target system administrators are not authorized to add subscrip-
tions in the IT Shop.
For more detailed information about request from company resources through the IT Shop,
see the One Identity Manager IT Shop Administration Guide.
Related Topics
Prerequisites
Related Topics
For more detailed information about using extended properties, see the One Identity
Manager Identity Management Base Module Administration Guide.
Property Description
Only for use Specifies whether the disabled service plan can only be requested through
in IT Shop the IT Shop. The disabled service plan can be requested by your staff
though the Web Portal and granted through a defined approval process. The
disabled service plan may not be assigned directly to hierarchical roles.
Service Service item data for requesting the disabled service plan through the IT
item Shop.
Category Categories for disabled service plan inheritance. User accounts can select-
ively inherit disabled service plans. To do this, disabled service plans and
user accounts are divided into categories. Use this menu to allocate one or
more categories to the disabled service plan.
Related Topics
l Assignment of employees and disabled service plans is permitted for role classes
(department, cost center, location or business role).
l The user accounts are marked with the option Groups can be inherited.
Related Topics
Assign disabled service plans to business roles to assign them to user accounts over these
business roles.
Related Topics
Related Topics
Use this task to add disabled service plans to system roles. If you assign a system role
to an employee, the disabled service plan is inherited by all user accounts owned by
these employees.
NOTE: Disabled service plans with the option Only use in IT Shop set, can only be
assigned to system roles that also have this option set. For more information, see the
One Identity Manager System Roles Administration Guide.
Related Topics
l The disabled service plan must be labeled with the option IT Shop.
l The disabled service plan must be assigned to a service item.
l If the disabled service plan is only assigned to employees using IT Shop requests,
you must also set the option Only for use in IT Shop. Direct assignment to
hierarchical roles may not be possible.
NOTE: IT Shop administrators can assign disabled service plans to IT Shop shelves in
the case of role-based login. Target system administrators are not authorized to add
disabled service plans in the IT Shop.
1. Select the category Azure Active Directory | Disabled service plan (non role-
based login).
- OR -
Select the category Entitlements | Disabled Azure Active Directory service
plans (role-based subscription).
2. Select the service plan in the result list.
3. Select Add to IT Shop in the task view.
4. Assign the disabled service plan to the IT Shop in Add assignments.
5. Save the changes.
1. Select the category Azure Active Directory | Disabled service plan (non role-
based login).
- OR -
Select the category Entitlements | Disabled Azure Active Directory service
plans (role-based subscription).
2. Select the service plan in the result list.
3. Select Add to IT Shop in the task view.
4. Remove the disabled service plan from the IT Shop shelves in Remove
assignments.
5. Save the changes.
1. Select the category Azure Active Directory | Disabled service plan (non role-
based login).
- OR -
Select the category Entitlements | Disabled Azure Active Directory service
plans (role-based subscription).
2. Select the service plan in the result list.
3. Select Remove from all shelves (IT Shop) in the task view.
4. Confirm the security prompt with Yes.
5. Click OK.
The disabled service plan is removed from all shelves by the One Identity Manager
Service. All requests and assignment requests with this disabled service plan are
canceled in the process.
For more detailed information about request from company resources through the IT Shop,
see the One Identity Manager IT Shop Administration Guide.
Related Topics
Prerequisites
To exclude subscriptions
Related Topics
For more detailed information about using extended properties, see the One Identity
Manager Identity Management Base Module Administration Guide.
One Identity Manager makes various reports available containing information about the
selected base object and its relations to other One Identity Manager database objects. The
following reports are available for Azure Active Directory.
NOTE: Other sections may be available depending on the which modules are
installed.
Report Description
Overview of all This report finds all roles containing employees with at least
Assignments one user account in the selected tenant.
Show orphaned user This report shows all user accounts in the tenant, which are
accounts not assigned to an employee. The report contains group
memberships and risk assessment.
Show employees with This report shows all employees with more than one user
multiple user accounts account in the tenant. The report is a risk assessment.
Show unused user This report shows all the tenant's user accounts that have
accounts not been used in the last few months. The report contains
group memberships and risk assessment.
Show entitlement drifts This report shows all the groups in the tenant, which are the
result of manual operations in the target system rather than
provisioned through One Identity Manager.
Show user accounts with This report contains all user accounts in the tenant with an
an above average number above average number of group memberships.
of system entitlements
Azure Active Directory This report contains a summary of user account and group
user account and group distribution in all tenants. You can find this report in the
administration category My One Identity Manager.
Data quality summary for This report contains different evaluations of user account
Azure Active Directory data quality in all tenants. You can find this report in the
user accounts category My One Identity Manager.
Example
l If the report is created for a resource, all roles are determined in which there are
employees with this resource.
l If the report is created for a group, all roles are determined in which there are
employees with this group.
l If the report is created for a compliance rule, all roles are determined in which there
are employees with this compliance rule.
l If the report is created for a department, all roles are determined in which
employees of the selected department are also members.
l If the report is created for a business role, all roles are determined in which
employees of the selected business role are also members.
l To display the report, select the base object from the navigation or the result list and
select the report Overview of all assignments.
l Use the Used by button in the report's toolbar to select the role class
(department, location, business role or IT Shop structure) for which you determine if
roles exist in which there are employees with the selected base object.
All the roles of the selected role class are shown. The color coding of elements
identifies the role in which there are employees with the selected base object. The
meaning of the report control elements is explained in a separate legend. In the
report's toolbar, click to open the legend.
l Double-click a control to show all child roles belonging to the selected role.
l By clicking the button in a role's control, you display all employees in the role with
the base object.
Icon Meaning
Show the legend with the meaning of the report control elements
The following configuration parameters are additionally available in One Identity Manager
after the module has been installed.
A default project template ensures that all required information is added in the One
Identity Manager. This includes mappings, workflows and the synchronization base object.
If you do not use a default project template you must declare the synchronization base
object in One Identity Manager yourself.
Use a default project template for initially setting up the synchronization project. For
custom implementations, you can extend the synchronization project with the
.Synchronization Editor
The template uses mappings for the following schema types.
Table 50: Mapping Azure Active Directory schema types to tables in the One
Identity Manager schema.
DirectoryRole AADDirectoryRole
Group AADGroup
LicenseAssignments AADUserHasSubSku
Organization AADOrganization
ServicePlans AADServicePlan
SubscribedSku AADSubSku
User AADUser
About us
Contacting us
For sales or other inquiries, visit https://www.oneidentity.com/company/contact-us.aspx
or call +1-800-306-9329.
A edit 118
set up 84 edit 15
SID 89
tenant 85 L
town 88 login data 63
type 80
M
C
membership
calculation schedule modify provisioning 31
disable 32
configuration parameter 151
N
notification 63
D
direction of synchronization
O
direction target system 18, 27
object
in the Manager 18
delete immediately 29
outstanding 29
E
publish 29
email notification 63 One Identity Manager
employee assignment administrator 9
automatic 94 register as application 14
manual 97 target system administrator 9
remove 97 target system manager 9
search criteria 96 Target System Managersr 65
table column 96
exclusion definition 112, 136, 146
P base object
create 27
password
configure 18, 25
initial 63
connection parameter 18, 25, 27
password policy 53
different domains 27
assign 60
extended schema 27
character sets 56
prevent 32
check password 60
scope 25
conversion script 57-58
set up 12
default policy 54, 60
start 18
display name 54
synchronization project
edit 54
create 18
error message 54
target system schema 27
excluded list 59
user 13
failed logins 55
variable 25
generate password 60
variable set 27
initial password 55
workflow 18, 27
name components 55
synchronization analysis report 32
password age 55
synchronization configuration
password cycle 55
customize 25, 27
password length 55
synchronization log 24
password strength 55
synchronization project
predefined 53
create 18
test script 57
disable 32
project template 154
edit 77
provisioning
project template 154
members list 31
synchronization server
configure 15
S install 15
schema Job server 15
changes 28 synchronization workflow
shrink 28 create 18, 27
U
user account
administrative user account 80
apply template 44
default user accounts 80
identity 80
password
notification 63
privileged user account 80
type 80