ActiveRoles 7.3 Feature Guide
ActiveRoles 7.3 Feature Guide
One Identity Active Roles 7.3
Feature Guide
Copyright 2018 One Identity LLC.
ALL RIGHTS RESERVED.
This guide contains proprietary information protected by copyright. The software described in this guide
is furnished under a software license or nondisclosure agreement. This software may be used or copied
only in accordance with the terms of the applicable agreement. No part of this guide may be reproduced
or transmitted in any form or by any means, electronic or mechanical, including photocopying and
recording for any purpose other than the purchaser’s personal use without the written permission of
One Identity LLC .
The information in this document is provided in connection with One Identity products. No license,
express or implied, by estoppel or otherwise, to any intellectual property right is granted by this
document or in connection with the sale of One Identity LLC products. EXCEPT AS SET FORTH IN THE
TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT,
ONE IDENTITY ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR
STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-
INFRINGEMENT. IN NO EVENT SHALL ONE IDENTITY BE LIABLE FOR ANY DIRECT, INDIRECT,
CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT
LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF
INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF
ONE IDENTITY HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. One Identity make no
representations or warranties with respect to the accuracy or completeness of the contents of this
document and reserves the right to make changes to specifications and product descriptions at any
time without notice. One Identity do not make any commitment to update the information contained
in this document.
If you have any questions regarding your potential use of this material, contact:
One Identity LLC.
Attn: LEGAL Dept
4 Polaris Way
Aliso Viejo, CA 92656
Refer to our Web site (http://www.OneIdentity.com) for regional and international office information.
Patents
One Identity is proud of our advanced technology. Patents and pending patents may apply to this
product. For the most current information about applicable patents for this product, please visit our
website at http://www.OneIdentity.com/legal/patents.aspx.
Trademarks
One Identity and the One Identity logo are trademarks and registered trademarks of One Identity
LLC. in the U.S.A. and other countries. For a complete list of One Identity trademarks, please visit
our website at www.OneIdentity.com/legal. All other trademarks are the property of their
respective owners.
Legend
IMPORTANT, NOTE, TIP, MOBILE, or VIDEO: An information icon indicates supporting
information.
Active Roles Feature Guide
Updated - June 2018
Version - 7.3
Contents
Introduction 5
About us 48
Contacting us 48
Technical support resources 48
Introduction
This document provides an overview of the Active Roles (formerly known as
ActiveRoles®) features.
Each feature is presented in a separate section containing the following elements:
l Feature Name The title of the section.
l Description An explanation of the feature.
l How to Start Instructions on how to find or start using the feature (if applicable).
Unless otherwise noted, the How to Start instructions assume that you are logged on as
an Active Roles Admin. By default, an Active Roles Admin is any member of the
Administrators local group on the computer running the Active Roles Administration
Service. Additionally, you should verify that the Active Roles console is in Advanced view
mode: on the View menu, click Mode, and then click Advanced Mode.
This section provides an overview of features and enhancements relating to Active Roles’
workflow capabilities, policies (administrative rules) and delegation model
(administrative roles).
Synchronization Service
Identity information can be stored in various data systems, such as directories, databases,
or even formatted text files. Management and synchronization of identity information
among different data systems may require considerable time and effort. On top of that,
performing data synchronization tasks manually is error-prone and can lead to duplication
of information and incompatibility of data formats.
With Synchronization Service, you can automate the process of identity data
synchronization among various data systems used in your enterprise environment.
Synchronization Service increases the efficiency of identity data management by allowing
you to automate the creation, deprovisioning, and update operations between the data
systems you use. For example, when an employee joins or leaves the organization, the
identity information managed by Synchronization Service is automatically updated in the
managed data systems, thereby reducing administrative workload and getting the new
users up and running faster.
The use of scripting capabilities provides a flexible way to automate administrative tasks
and integrate the administration of managed data systems with other business processes.
By automating conventional tasks, Synchronization Service helps administrators to
concentrate on strategic issues, such as planning the directory, increasing enterprise
security, and supporting business-critical applications.
Synchronization Service offers the following major features.
Bidirectional synchronization
Bidirectional synchronization allows you to synchronize all changes to identity information
between your data systems. Using this type of synchronization, you can prevent potential
l Direct synchronization Assigns the value of a source object attribute to the target
object attribute you specify.
l Script-based synchronization Allows you to use a Windows PowerShell script to
generate the target object attribute value.
l Rule-based synchronization Allows you to create and use rules to generate the
target object attribute value you want.
Scheduling capabilities
You can schedule the execution of data synchronization tasks and automatically perform
them on a regular basis to satisfy your company’s policy and save your time and effort.
Extensibility
To access external data systems, Synchronization Service employs so-called connectors. A
connector enables Synchronization Service to read and synchronize the identity data
contained in a particular data system. Out of the box, Synchronization Service includes
connectors that allow you to connect to the following data systems:
l Microsoft Active Directory Domain Services
l Microsoft Active Directory Lightweight Directory Services
l Microsoft Exchange Server
l Microsoft Skype for Business Server
l Microsoft Windows Azure Active Directory
l Microsoft Office 365
l Microsoft SQL Server
l Microsoft SharePoint
l Active Roles version 7.3, 7.2, 7.1, 7.0, and 6.9
l One Identity Manager version 6.1 or 6.0
l Data sources accessible through an OLE DB provider
l Delimited text files
How to start
For instructions on how to install, configure and user Synchronization Service, see the
Synchronization Service Administration Guide document for Active Roles 7.3.
l At least one Active Directory forest containing logon-enabled user accounts for your
organization, referred to as an accounts forest. The accounts forest does not have
Exchange Server installed, nor does it need to have the Active Directory schema
extended with the Exchange Server attributes.
l An Active Directory forest with Exchange Server, referred to as the Exchange forest,
to hold mailboxes for user accounts from the accounts forest.
l Trust relationships configured so that the Exchange forest trusts the accounts forest.
With Exchange Resource Forest Management, you can use Active Roles to:
l Create a mailbox for a user account from the accounts forest.
You can create a mailbox when creating a user account in the accounts forest. It is
also possible to create a mailbox for a user account that already exists in the
accounts forest. As a result, Active Roles creates a disabled user account (shadow
account) with a linked mailbox in the Exchange forest, and associates the shadow
account and the mailbox with the user account (master account) held in the
accounts forest.
l View or change mailbox properties, and perform Exchange tasks, on a user account
from the accounts forest (master account) that has a linked mailbox in the
Exchange forest.
The pages for managing the master account include all Exchange properties and tasks
that are normally available when the mailbox resides in the same forest as the
managed user account. With Exchange Resource Forest Management, Active Roles
synchronizes the Exchange properties displayed or changed on the pages for
managing the master account with the properties of the linked mailbox.
l View or change the personal or organization-related properties of the master account
while having them synchronized to the respective properties of the shadow account.
When you use Active Roles to change the personal or organization-related properties
of the master account, Exchange Resource Forest Management causes Active Roles to
apply the changes to those properties of the shadow account as well. This function
ensures correct information about the master account in the Exchange address lists.
l Deprovision a master account while having Active Roles deprovision the master
account’s mailbox in the Exchange forest.
l Delegate Exchange mailbox management tasks by applying Access Templates to
containers that hold master accounts.
For example, you can apply the “Exchange - Recipients Full Control” Access Template
to a container in the accounts forest, which enables the delegated administrator to
create, view or change linked mailboxes in the Exchange forest by managing master
accounts held in that container.
l Enable a master account to update membership list of a distribution group held in the
Exchange forest.
When you make a shadow account the manager or a secondary owner of a
distribution group and allow the manager or secondary owners to update membership
list, Exchange Resource Forest Management ensures that the corresponding master
account has sufficient rights to add or remove members from that group using
Exchange clients such as Microsoft Outlook or Outlook Web App.
Exchange Resource Forest Management also enables Active Roles to provide all these
administrative capabilities for linked mailboxes created by Active Roles with an earlier
version of Exchange Resource Forest Management or without Exchange Resource Forest
Management, or created by tools other than Active Roles. Exchange Resource Forest
Management schedules Active Roles to search the managed domains for linked mailboxes
whose master account:
l Is in the scope of the Exchange Resource Forest Management policy for
mailbox management
l Does not have a reference to the shadow account expected by Exchange Resource
Forest Management
For each master account that meets these conditions, Active Roles updates the master
account with a reference to the shadow account, thereby extending the capabilities of
Exchange Resource Forest Management to that master account and its linked mailbox. As a
result, the linked mailbox falls under the control of Exchange Resource Forest
Management.
How to start
For instructions on how to install, configure and user Exchange Resource Forest
Management, see the Exchange Resource Forest Management Administration Guide
document for Active Roles 7.3.
l Add and enable new Skype for Business Server users
l View or change Skype for Business Server user properties and policy assignments
l Move Skype for Business Server users from one Skype for Business Server
pool to another
l Disable or re-enable user accounts for Skype for Business Server
l Remove users from Skype for Business Server
Skype for Business Server User Management adds the following elements to Active Roles:
l Built-in Policy Object containing a policy that enables Active Roles to perform user
management tasks on Skype for Business Server.
l Built-in Policy Object containing a supplementary policy that enables Active Roles to
administer Skype for Business Server users in environments that involve multiple
Active Directory forests.
l Commands and pages for managing Skype for Business Server users in the Active
Roles Web Interface.
l Access Templates to delegate Skype for Business Server user management tasks.
The Skype for Business Server User Management policy allows you to control the following
factors of Skype for Business Server user creation and administration:
l Rule for generating the SIP user name. When adding and enabling a new Skype for
Business Server user, Active Roles can generate a SIP user name based on other
properties of the user account.
l Rule for selecting a SIP domain. When configuring the SIP address for a Skype for
Business Server user, Active Roles can restrict the list of selectable SIP domains and
suggest which SIP domain to select by default.
l Rule for selecting a Telephony option. When configuring Telephony for a Skype for
Business Server user, Active Roles can restrict the list of selectable Telephony
options and suggest which option to select by default.
Skype for Business Server User Management provides a number of Access Templates
allowing you to delegate the following tasks in Active Roles:
l Add and enable new Skype for Business Server users
l View existing Skype for Business Server users
l View or change the SIP address for Skype for Business Server users
l View or change the Telephony option and related settings for Skype for Business
Server users
l View or change Skype for Business Server user policy assignments
l Disable or re-enable user accounts for Skype for Business Server
l Move users from one Skype for Business Server pool to another
l Remove users from Skype for Business Server
l Single forest with a single tree or multiple trees
l Multiple forests in a resource forest topology
l Multiple forests in a central forest topology
Single forest
The single forest topology assumes that the logon-enabled user accounts managed by
Active Roles are defined in the Active Directory forest in which Skype for Business Server
is deployed. To perform Skype for Business Server user management tasks on a given user
account, Active Roles makes changes to the attributes of that use account, and then, based
on the attribute changes, the Skype for Business Server User Management policy requests
the Skype for Business Server remote shell to update the user account accordingly. For
example, when creating a new Skype for Business Server user, Active Roles sets a virtual
attribute on that user’s account directing the policy to invoke the remote shell command for
enabling the new user for Skype for Business Server. When making changes to an existing
Skype for Business Server user, Active Roles populates the attributes of the user’s account
with the desired changes, causing the policy to apply those changes via the remote shell.
How to start
For instructions on how to install, configure and user Skype for Business Server User
Management, see the Skype for Business Server User Management Administration Guide
document for Active Roles 7.3.
l Activity target This option lets you specify the object whose properties you want
the activity to save. You can choose to specify:
l Workflow target object In a change workflow, the target object of the
request that started the workflow. For example, in a workflow that starts upon
a deletion request, this choice causes the activity to save the properties of the
object whose deletion is requested.
l Fixed object in directory A particular object you select from Active
Directory.
l Object identified by workflow parameter The object specified by the
value of a certain parameter of the workflow. You can choose the desired
parameter from the workflow definition.
l Object from workflow data context The object will be selected by the
activity on the basis of the data found in the workflow environment at the time
of executing the workflow. You can specify which object you want the activity
to select at workflow execution time.
l Object identified by DN-value rule expression The object whose
Distinguished Name (DN) is specified by the string value of a certain rule
expression. By using a rule expression you can compose a string value based
on properties of various objects found in the workflow environment at the time
of executing the workflow. You can create the desired rule expression when
you configure the activity.
l Target properties This option lets you specify the object properties you want the
activity to save. The workflow designer proposes the default list of properties, and
allows you to change the list as needed. By default, the activity saves all single-value
non-constructed attributes found in the directory schema for the target object,
including custom virtual attributes added to the directory schema by Active Roles.
l Notification You can configure the activity to subscribe recipients to the
notifications of the following events:
The notification settings specify the event to notify of, and notification recipients.
When executed by the workflow, the activity prepares a notification message
appropriate to the specified event. Active Roles retains the message prepared by
the activity, and sends the message to the specified recipients upon occurrence
of that event.
l Error handling You can choose whether to suppress errors encountered by the
activity. The following option is available: Continue workflow even if this
activity encounters an error. If this option is not selected (default setting), then
an error condition encountered by the activity causes Active Roles to terminate the
workflow. If you select this option, the workflow continues regardless of whether or
not the encounters an error condition.
l By using the following expression in a Script activity:
$workflow.SavedObjectProperties("activityName").get("attributeName")
In this expression, activityName stands for the name of the Save Object Properties
activity and attributeName is the LDAP display name of the attribute representing the
property you want the script to retrieve. You should specify an attribute listed in the
Target properties setting of the “Save Object Properties” activity; otherwise, this
expression returns no property value at workflow execution time.
To add the token:
You should select a property listed in the Target properties setting of the
Save Object Properties activity; otherwise, the token you have configured
returns no property value at workflow execution time.
If you choose this option, then you need to perform the following configuration steps:
You should select a property listed in the Target properties setting of the
Save Object Properties activity; otherwise, the entry you have configured
returns no property value at workflow execution time.
How to start
For configuration instructions, see the “Configuring a Save Object Properties activity”
section in the Active Roles 7.3 Administration Guide.
l Target changes You can define the property changes to add or remove from the
change request. When you configure this activity, you can choose the properties you
want the activity to change and, for each property, choose to remove the property
from the request, clear the property value in the request, or specify the new value to
be assigned to that property. For a multi-value property, you can choose to add or
remove a value from that property. The following options are available:
l Text string Use the given string of characters as the value of the property. You can
type the desired string.
l Property of workflow target object Use the value of a certain property of the
target object of the request that started the workflow. You can select the desired
property from a list of object properties.
The notification settings specify the event to notify of, and notification recipients.
When executed by the workflow, the activity prepares a notification message
appropriate to the specified event. Active Roles retains the message prepared by the
activity, and sends the message to the specified recipients upon occurrence of that
event. The notification settings are similar to the notification settings of a
Notification activity.
l Error handling You can choose whether to suppress errors encountered by the
activity. The following option is available: Continue workflow even if this
activity encounters an error. If this option is not selected (default setting), then
an error condition encountered by the activity causes Active Roles to terminate the
workflow. If you select this option, the workflow continues regardless of whether or
not the encounters an error condition.
l Additional settings You can configure the activity to:
l Change the container where to create new objects while ensuring that the
policies and workflows are applied from the container where the object will
actually be created rather than from the container that was originally specified
in the object creation request.
l Add or remove Active Roles controls from the request.
NOTE: The Modify Requested Changes activity type is unavailable in case of an
automation workflow. You can add activities of this type to a change workflow only.
How to start
For configuration instructions, see the “Configuring a Modify Requested Changes activity”
section in the Active Roles 7.3 Administration Guide.
l Load PowerShell modules and snap-ins. All activity scripts can use the modules and
snap-ins loaded in the initialization script, without having to load the prerequisite
modules or snap-ins on a per-activity basis.
The modules and snap-ins loaded in the initialization script are available to all script
activities at workflow run time. For example, the Import-Module 'SmbShare' command
added to the initialization script makes the Server Message Block (SMB) Share-
specific cmdlets available to all script activities within the workflow.
l Initialize environment-specific variables, referred to as global variables. All activity
script can retrieve and update global variables, which makes it possible to exchange
data between different activity scripts.
The global variables are visible to all script activities at workflow run time. For
example, the $rGuid = [Guid]::NewGuid() command added to the initialization script
makes the $rGuid variable available to all script activities within the workflow. To
How to start
This opens the Workflow Designer window in the details pane, representing the
workflow definition as a process diagram.
The Initialization script tab displays the current script. You can add or modify the script
by typing in the edit box on that tab.
How to start
When configuring a Search activity to search for users, click the option Retrieve only
expiring user accounts to restrict your search to user accounts that will expire within a
certain number of days. In the dialog box that opens, specify the desired number of days.
How to start
When configuring notification message settings for a Notification activity or an Approval
activity, select the Format notification message as plain text check box on the
Notification Message page.
This section summarizes the features and enhancements that improve the user experience
of those who use Active Roles to perform day-to-day administrative tasks.
l Single-page lists You no longer need to page through search results. All results are
now listed on a single page. The single-page list starts displaying search results
much faster, and makes it easier to sort, filter, locate and select the objects you
want to find.
l Enhanced search tools Unified toolbar for configuring search conditions or filter
conditions includes a flexible condition builder allowing you to choose predefined
conditions, configure a wide variety of property-based conditions, or specify complex
conditions using LDAP syntax.
l Pop-up property pages Pages for creating, viewing or changing objects are now
displayed on top of the list of objects, which allows you not to lose the entire list
while selecting and managing individual objects.
l Views You can create, save and reuse your personal views of containers. Each view
is essentially a search query for objects held in a particular container that returns the
list of objects matching the specified search conditions, with the specified set of list
columns and list sorting order.
The new Web Interface retains and improves upon all the enterprise-class features of its
predecessor, including individually customizable Web Interface sites, user permission-
Figure 1: UI Elements
Navigation bar
Located on the left side of the page, the Navigation bar provides the first level of navigation
for most of the tasks you can perform in the Web Interface. The Navigation bar is
organized by Web Interface areas, and includes the following items:
Browse pane
Located next to the Navigation bar, the Browse pane lists the built-in views and personal
views, and allows you to access the tree view:
l Built-in views provide entry points to browsing for objects in the directory.
Personal views are filter or search queries you build and save to use them again at
a later time.
l The tree view helps you browse for directory objects by using the directory tree to
navigate through the hierarchical structure of containers.
List of objects
When you select a container or view in the Browse pane, you’ll see a list of objects. If you
select a container, the list includes the objects held in that container. If you select a view,
the list includes the objects that match the view settings.
The list of objects is no longer divided into multiple pages. Instead, the Web Interface now
loads all objects on a single page. This allows you to see the entire contents of an OU or all
results of a search operation at a time.
You can use various built-in conditions or create custom conditions to filter the list of
objects. It is also possible to customize the list by sorting and filtering, and by adding or
removing list columns.
You can select objects from the list and apply commands to the selected object or objects.
When you click the name of a container object, such as a domain or an organizational unit,
the list changes to display the objects held in that container, thereby enabling you to
browse through containers in the directory.
l Click the Menu button on the left side of the Toolbar to save the current list as a
personal view, add or remove list columns, or export the list to a text file.
l Type in the Filter field and then click the button next to that field to have the list
include only those objects whose naming properties match what you typed.
l Click the Expand/Collapse button on the right side of the Toolbar to configure filtering
criteria based on object properties. To have the list include only the objects that
match your filtering criteria, click the button next to the Filter field.
Command pane
Located to the right of the list of objects, the Command pane provides commands you
can apply to objects you select from the list as well as commands you can apply to the
current container:
l If no objects are selected in the list, the menu includes only the commands that apply
to the current container. These commands are grouped under a heading that shows
the name of the current container.
l If a single object is selected in the list, the commands that apply to the selected
object are added in the top of the menu, under a heading that shows the name of the
selected object.
l If multiple objects are selected from the list, the commands that apply to all of the
selected objects are added in the top of the menu, under a heading that shows the
number of the selected objects.
Summary pane
When you select an object from the list, information about that object is displayed in the
Summary pane under the list of objects. The information includes some commonly used
properties of the object, and depends upon the object type. For example, user properties
provide more detailed information about a user account, such as the logon name, e-mail
address, description, job title, department, expiration date, and the date and time that the
account was last changed. If you don’t see the Summary pane, click in the area beneath
the list of objects.
l Type in the Search field located in the upper right corner of the Web Interface
window, and then press Enter or click the magnifying glass icon in the Search field.
In this case, the Web Interface searches all managed Active Directory domains for
objects whose naming properties match what you typed and the Search page lists
the search results. The naming properties include name, first name, last name,
display name, and logon name.
l Click Search on the Navigation bar. The Search page opens, allowing you to
configure and start a search.
The Web Interface will search in the selected container and all of its subcontainers.
l To search by naming properties, type in the Search field on the Toolbar. The
Web Interface will search for objects whose naming properties match what you
typed. The naming properties include name, first name, last name, display
name, and logon name.
l To search by other properties, click the button on the right side of the Toolbar to
expand the Toolbar, click Add criteria, choose the properties by which you want to
search, click Add, and then configure the criteria as appropriate. The Web Interface
will search for objects that match the criteria that you configured.
3. Press Enter to start the search.
The search results are listed on the Search page. You can customize the list by
adding or removing list columns and sorting the list by column data. To add or
remove list columns, click the Menu button on the left side of the Toolbar and then
click Choose columns. To sort the list by column data, click column headings.
1. Click Search on the Navigation bar.
2. Click the button on the right side of the Toolbar to expand the Toolbar, click Add
criteria, select the check box next to Object type is
User/InetOrgPerson/Computer/Group/Organizational Unit, and then click
the Add button.
3. On the Toolbar, click Group in the list next to The object type is, and then
press Enter.
1. Navigate to the container in the Web Interface.
To navigate to a container, you can search for the container object (see Searching for
directory objects) and then click its name in the list of search results on the Search
page. Alternatively, you can browse for the container objects by using the Browse
pane and the List of objects.
2. Specify how you want to filter the objects held in the container:
l To filter objects by naming properties, type in the Filter field on the Toolbar and then
press Enter or click the button next to the Filter field. The list of objects will include
only the objects whose naming properties match what you typed. The naming
properties include name, first name, last name, display name, and logon name.
l To filter objects by other properties, click the button on the right side of the Toolbar
to expand the Toolbar, click Add criteria, choose the properties by which you want
to filter, click Add, and then configure the criteria as appropriate. The list of objects
will include only the objects that match the criteria you configured.
3. To apply the filter, press Enter or click the button next to the Filter field on
the Toolbar.
When a filter is applied to a container, the Web Interface lists a subset of all objects
held in that container. You can remove the filter to view all objects: If you did not add
criteria, clear the Filter field on the Toolbar and then press Enter; otherwise, expand
the Toolbar, click Clear all, and then press Enter.
1. Navigate to the organizational unit in the Web Interface.
2. Click the button on the right side of the Toolbar to expand the Toolbar, click Add
criteria, select the check box next to Object type is
User/InetOrgPerson/Computer/Group/Organizational Unit, and then click
the Add button.
3. On the Toolbar, confirm that the field next to The object type is reads User and
then click the button next to the Filter field, or press Enter.
1. Do one of the following:
l Configure and perform a search. For instructions, see Searching for directory
objects.
l Create a filtered list of objects. For instructions, see Filtering the contents of
a container.
2. Click the Menu button on the left side of the Toolbar, and then click Save
current view.
3. In the dialog box that appears, type a name for the personal view, and then
click Save.
How to start
To connect to the Web Interface, you need to know the name of the Web server running the
Web Interface and the name of the Web Interface site you want to access. The default site
names are as follows:
To connect to the Web Interface, type the address of the Web Interface site in the address
box of your Web browser, and then press Enter.
l The ActiveRolesManagementShell module provides cmdlets for managing users,
group, computers and other objects in Active Directory via Active Roles; managing
digital certificates; and administering certain Active Roles objects. The cmdlets
provided by this module have their noun perfixed with QAD or QARS, such as New-
QADUser, Add-QADCertificate, or New-QARSAccessTemplateLink.
l The ActiveRolesConfiguration module provides cmdlets for configuring Active
Roles Administration Service instances and Web Interface sites. This module is
available on 64-bit (x64) systems only. It requires the Active Roles Administration
Service or Web Interface to be installed; otherwise, the module does not provide all
cmdlets. The cmdlets provided by this module have their noun prefixed with AR, such
as New-ARDatabase, New-ARService, or New-ARWebSite.
You can use the Import-Module command to load these modules and gain access to all
cmdlets provided by Active Roles Management Shell.
How to start
1. Log on to the computer on which the Administration Service or Web Interface
is installed.
2. Open Active Roles Management Shell on that computer. To open Management Shell,
click Active Roles 7.3 Management Shell on the Apps page or Start menu
depending upon the version of your Windows operating system.
3. Enter the QuickRef command at the Management Shell command prompt to view
the Reference Manual that provides detailed information about all commands
available in Active Roles Management Shell.
This section summarizes the features and enhancements that improve the user experience
of those who deploy and administer Active Roles, implementing and maintaining the Active
Roles-based administrative structure.
Configuration Center
Active Roles 7.3 introduces a new configuration management solution that unifies
management of core configuration for the Active Roles Administration Service and Web
Interface. Configuration Center provides a single solution for configuring Administration
Service instances and Web Interface sites, allowing administrators to perform the core
configuration tasks from a single location. Highlights include:
l Initial configuration tasks such as creation of Administration Service instances and
default Web Interface sites
l Import of configuration and management history from earlier Active Roles versions
l Management of core Administration Service settings such as the Active Roles Admin
account, service account, and database connection
l Creation of Web Interface sites based on site configuration objects of the current
Active Roles version or by importing site configuration objects of earlier Active
Roles versions
l Management of core Web Interface site settings such as the site’s address on the
Web server and configuration object on the Administration Service
l Active Roles version 7.3 supports integration with One Identity Starling services. The
Starling Join feature in Active Roles now enables you to connect to One Identity
Starling, the Software as a Service (SaaS) solution of One Identity. For more
information on Starling Join configuration, see One Identity Starling Join and
Configuration through Active Roles in the Active Roles Administration Guide.
The Configuration Center operations are fully scriptable using Windows PowerShell
command-line tools provided by the Active Roles Management Shell.
In earlier Active Roles versions, Administration Service Setup prompted for various
configuration settings, and created a new, fully configured Administration Service
instance; Web Interface Setup created the default Web Interface sites, which
required the Administration Service to be up and running. Overall, this setup practice
complicated and slowed Active Roles setup, as the completion of Active Roles
installation would be delayed until the administrator responded to the prompts and
the Setup program finished all the core configuration tasks. Configuration Center
allows the administrator to postpone these tasks, and perform them at a convenient
time after completing Active Roles Setup. By separating the configuration tasks from
the Setup program, Configuration Center simplifies Active Roles installation and
streamlines deployment of Active Roles components in an enterprise.
Earlier Active Roles versions exposed this functionality in a separate tool for
configuring Web Interface sites on the Web server. Configuration Center
replaces that tool, to make configuration management more efficient by
providing a unified experience for administrators to perform various types of
configuration tasks.
Wizards that start from hub pages help the administrator manage configuration
settings. Management wizards streamline the core configuration tasks by reducing
time it took in earlier versions to change the service account, admin account and
database; import configuration and management history; and configure Web
Interface sites on the Web server.
l Configuration Shell A new Windows PowerShell module in Active Roles
Management Shell enables access to all Configuration Center features and functions
from a command line or from a script, allowing for unattended configuration of
Active Roles components. The ActiveRolesConfiguration module provides command-
line tools (cmdlets) for the key set of configuration tasks, such as creation of the
Active Roles database, creation or modification of Administration Service instances
and Web Interface sites, data exchange between Active Roles databases and
between site configuration objects, querying the current state of the Administration
Service, and starting, stopping or restarting the Administration Service. The cmdlets
provided by the ActiveRolesConfiguration module have their noun prefixed with AR,
such as New-ARDatabase, Set-ARService, or Set-ARWebSite.
As Configuration Center can manage Active Roles not only on the local computer but also
on remote computers, it is possible to use it on a client operating system as well as on
server operating systems. You can install Configuration Center by installing Active Roles
Management Tools on a 64-bit (x64) server or client operating system, and then connect it
to a remote computer on which the Administration Service or Web Interface is installed. To
start Configuration Center on a client operating system:
To run Configuration Center on a given computer, you must be logged on with a user
account that has administrator rights on that computer.
If neither the Administration Service nor the Web Interface is installed on the local
computer, then Configuration Center prompts you to select a remote computer. In the
Select Server dialog box that appears, supply the fully qualified domain name of a
server, on which the Administration Service or the Web Interface (or both) is installed, and
type the logon name and password of a domain user account that has administrator rights
on that server. You can connect to a remote server at any time by selecting the Connect
to another server command from the menu on the heading bar at the top of the
Configuration Center main window, which also displays the Select Server dialog box.
l Initial configuration tasks, creating the Administration Service instance and the
default Web Interface sites
l Configuration management tasks, letting you manage the existing instance of the
Administration Service or Web Interface
l The logon name and password of the account in which this Administration Service
instance will be running (service account)
l The name of the group or user account that will have full access to all Active
Roles features and functions through this Administration Service instance (Active
Roles Admin)
l The database in which this Administration Service instance will store the
configuration data and management history data
You have the option to create a new database, or use an existing database of the
current Active Roles version. It is possible to have multiple Administration Service
instances use the same database.
l The authentication mode that this Administration Service instance will use when
connecting to the database
With the Windows authentication option, the Administration Service will use the
credentials of the service account; with the SQL Server authentication option,
the Administration Service will use the SQL login name and password you
supply in the wizard.
To start the wizard, click Configure in the Administration Service area on the
Dashboard page in the Configuration Center main window.
l Use the Administration Service instance running on the same computer as the
Web Interface
l Use the Administration Service instance running on a different computer
This option requires you to supply the fully qualified domain name of the computer
running the desired instance of the Administration Service.
l Let the Web Interface choose any Administration Service instance that has the same
configuration as the given one
This option requires you to supply the fully qualified domain name of the computer
running the Administration Service instance of the desired configuration. If your
environment employs Active Roles replication, this must be the computer running the
Administration Service instance whose database server acts as the Publisher for the
Active Roles configuration database.
To start the wizard, click Configure in the Web Interface area on the Dashboard page
in the Configuration Center main window.
l View or change the core Administration Service settings such as the service account,
the admin account, and the database
l Import configuration data from an Active Roles database of the current version or an
earlier version to the current database of the Administration Service
l Import management history data from an Active Roles database of the current
version or an earlier version to the current database of the Administration Service
l View the state of the Administration Service
l Start, stop or restart the Administration Service
l The service account—Click Change in the Service account area. In the wizard that
appears, supply the logon name and password of the domain user account in which
you want the Administration Service to run.
l The Active Roles Admin account—Click Change in the Active Roles Admin area. In
the wizard that appears, specify the group or user account you want to have the
Active Roles Admin rights.
l The Active Roles database—Click Change in the Active Roles database area. In
the wizard that appears, specify the SQL Server instance and the database you want
the Administration Service to use, and choose the database connection authentication
mode (Windows authentication or SQL Server login). You have the option to specify a
separate database for storing management history data.
Because of these considerations, Configuration Center provides a different wizard for
importing management history. The distinctive features of the Import Management History
wizard are as follows:
l The wizard does not replace the existing data in the destination database. It only
retrieves and upgrades management history records from the source database, and
then adds the upgraded records to the destination database.
l The wizard allows you to specify the date range for the management history records
you want to import, so you can import only records that occurred within a particular
time frame instead of importing all records at a time.
l Canceling the wizard while the import operation is in progress does not cause you to
lose the import results, so you can stop the import operation at any time. The
records imported by the time that you cancel the wizard are retained in the
destination database. If you start the wizard again, the wizard imports only records
that were not imported earlier.
l Ready for use Administration Service is running and ready to process client
requests
l Getting ready Administration Service has just started and is preparing to process
client requests
l Stopping Administration Service is preparing to stop
l Stopped Administration Service is stopped
l Unknown Unable to retrieve the state information
l Identify the Web Interface sites that are currently deployed on the Web server
running the Web Interface
l Create, modify or delete Web Interface sites
l Export a Web Interface site’s configuration object to a file
Here you can find an overview of these tasks.
From the Web Interface page, you can open Web Interface sites in your Web
browser: Click an entry in the list of Web Interface sites and then click Open in
Browser on toolbar.
l Choose the Web site to contain the Web application that implements the new Web
Interface site
Then, the wizard lets you specify the object to hold the configuration and customization
data of the new Web Interface site on the Active Roles Administration Service. You can
choose from the following options:
l Create the object from a template
The new site will have the default configuration and customization based on the
template you select.
l Use an existing object
The new site will have the same configuration and customization as any existing Web
Interface site that also uses the object you select. This option is intended for the
scenario where you create an additional instance of one of your existing Web
Interface sites on a different Web server.
l Create the object by importing data from another object
The new site will inherit the configuration and customization of the site that used the
object you select for data import. This option is mainly intended for the upgrade
scenario where you create Web Interface sites of the new Active Roles version that
have the same configuration and customization as your Web Interface sites of an
earlier Active Roles version. In this scenario, you import the configuration data of the
earlier version to the Administration Service of the new version (which also imports
the site configuration objects of the earlier version), and then create configuration
objects for Web Interface sites of the new version by importing data from site
configuration objects of the earlier version.
l Create the object by importing data from an export file
Active Roles
l Choose the Web site to contain the Web application that implements the Web
Interface site
l Supply the desired alias for that Web application. The alias defines the virtual path
that becomes part of the Web Interface site’s address (URL).
Then, the wizard lets you specify the object to hold the site’s configuration and
customization data on the Active Roles Administration Service. You can choose from the
following options:
l Keep on using the current object (default option)
The site’s configuration will remain intact. The wizard displays the name and version
of the current configuration object.
The site will have the default configuration and customization based on the template
you select.
l Use an existing object
The site will have the same configuration and customization as any existing Web
Interface site that also uses the object you select. You could use this option to
deploy an additional instance of one of your existing Web Interface sites on a
different Web server.
l Create the object by importing data from another object
The site will inherit the configuration and customization of the site that used the
object you select for data import. You could use this option to deploy a Web Interface
site of the new Active Roles version with the same configuration and customization
as one of your Web Interface sites of an earlier Active Roles version. In this case,
you import the configuration data of the earlier version to the Administration Service
of the current version (which also imports the site configuration objects of the earlier
version), and then create the site configuration object by importing data from the
appropriate site configuration object of the earlier version.
l Create the object by importing data from an export file
The site will inherit the configuration and customization of the site whose
configuration data was saved to the export file you specify. You can choose an export
file of any supported Active Roles version.
l Component Name of the component, such as Administration Service, Web
Interface or Console (MMC Interface)
l Logging Indicates whether logging is enabled or disabled for the given component,
and the logging level, such as Basic or Verbose
l Log location Depending upon the component, identifies either the folder containing
the log files or the log file for that component
The toolbar on the Logging page allows you to perform the following tasks:
l To enable or disable logging for a given component, select the component in the list,
and then click Modify on the toolbar.
l To open the folder that contains the log file or files for a given component, select the
component in the list, and then click Browse with Explorer on the toolbar.
l To examine the Administration Service log file in Log Viewer, select Administration
Service in the list of components and then click Open in Log Viewer on the
toolbar. For information about Log Viewer, see Active Roles Log Viewer later in
this document.
How to start
Configuration Center is installed and, by default, automatically started after you install the
Administration Service or Web Interface, allowing you to perform initial configuration
tasks on the computer on which you have installed those components. If you close
Configuration Center and want to start it again, you can start Configuration Center from
the following locations:
Configuration Shell
Active Roles Management Shell has been extended with a new module,
ActiveRolesConfiguration, that provides command-line tools (cmdlets) for configuring
Active Roles Administration Service instances and Web Interface sites. This module is
available on 64-bit (x64) systems only. It requires the Active Roles Administration Service
or Web Interface to be installed; otherwise, the module does not provide all cmdlets. The
following table lists and briefly describes the cmdlets provided by this module.
Command Description
Get-ARComponentStatus Returns installation and configuration status of Active Roles
components.
New-ARDatabase Creates a new Active Roles database.
Import-ARDatabase Transfers Active Roles configuration data or management
history data from one database to another.
Backup-AREncryptionKey Creates a file that stores a copy of the current encryption
key used in the configuration database of the local
Administration Service instance.
Restore-AREncryptionKey Restores the encryption key from a backup file to the
configuration database of the local Administration Service
instance.
Reset-AREncryptionKey Creates a new encryption key for the configuration
database of the local Administration Service instance.
New-ARService Creates the instance of the Active Roles Administration
Service on the local computer.
Get-ARService Retrieves the Active Roles Administration Service instance
from the local computer.
Set-ARService Modifies the Active Roles Administration Service instance
on the local computer.
Start-ARService Starts the stopped Active Roles Administration Service on
the local computer.
Stop-ARService Stops the Active Roles Administration Service running on
the local computer.
Restart-ARService Stops and then starts the Active Roles Administration
Service on the local computer.
Remove-ARService Deletes the Active Roles Administration Service from the
local computer.
Test- Verifies whether the given Active Roles database settings
ARServiceDatabaseSettings would cause Management History issues due to separate
Configuration and Management History databases.
Get-ARServiceStatus Retrieves the Active Roles Administration Service status
information from the local computer.
Get-ARVersion Retrieves the version number of the local Active Roles
installation.
New-ARWebSite Creates a new Active Roles Web Interface site.
Get-ARWebSite Retrieves Active Roles Web Interface sites from the Web
server.
Set-ARWebSite Modifies the specified Active Roles Web Interface site on
the Web server.
Remove-ARWebSite Deletes the specified Active Roles Web Interface site from
the Web server.
Get-ARWebSiteConfig Retrieves Web Interface site configuration objects from the
Active Roles Administration Service.
Export-ARWebSiteConfig Exports a Web Interface site configuration to a file.
How to start
1. Log on to the computer on which the Administration Service or Web Interface
is installed.
2. Open Active Roles Management Shell on that computer.
To open Management Shell, click Active Roles 7.3 Management Shell on the
Apps page or Start menu depending upon the version of your Windows
operating system.
3. Enter the QuickRef command at the Management Shell command prompt to view
the Reference Manual that provides detailed information about all commands
available in Active Roles Management Shell.
l Errors encountered by the Administration Service and recorded in the log file
l Requests processed by the Administration Service and traced in the log file
l All trace records found in the diagnostic log file
l All events found in the event log file
l Search the list for a particular text string, such as an error message
l Filter the list by various conditions, to narrow the set of list items to those you are
interested in
l View detailed information about each list item, such as error details, request details
or stack trace
How to start
To start Log Viewer, click Start Log Viewer in the Configuration Center main window.
Once you have started Log Viewer, open your Active Roles diagnostic log file or saved
event log file: Click Open on the Log Viewer toolbar, and supply the path and name of
the log file.
By default, Log Viewer displays a list of errors encountered by the Administration Service
and recorded in the log file. You can use Log Viewer to look for information on how to
troubleshoot a given error: Right-click the error in the list and then click Look for
solution in Knowledge Base. Log Viewer performs a search in One Identity Software
Knowledge Base to list the Knowledge Articles that apply to the error you selected.
Other tasks you can perform:
l To view a list of requests processed by the Administration Service and traced in the
log file, click Requests in the View area on the Log Viewer toolbar.
l To view all trace records found in the diagnostic log file or all events found in the
event log file, click Raw log records in the View area on the Log Viewer toolbar.
l To search the list for a particular text string, such as an error message, type the text
string in the Search box on the Log Viewer toolbar and press Enter.
l To narrow the set of list items to those you are interested in, click Filter on the Log
Viewer toolbar and specify the desired filter conditions.
l To view detailed information about an error, request, trace record or event, right-
click the corresponding list item, and click Details.
l To view all trace records that apply to a given request, right-click the corresponding
item in the Requests list and click Stack trace. This task is unavailable in case of
an event log file.
l To view the request that caused a given error, right-click the error in the Errors list
and click Related request. This task is unavailable in case of an event log file.
l To view all trace records that apply to the request that caused a given error, right-
click the error in the Errors list and click Stack trace for related request. This
task is unavailable in case of an event log file.
How to start
1. Log on as Active Roles Admin, open the Active Roles console, and select the root
node in the console tree.
2. In the details pane, expand the Product Usage Statistics area, and then click
Change next to the Threshold value field.
For further details, see the “Voluntary thresholds for the managed object count” section in
the Active Roles Administration Guide.
Installation label
The Active Roles console allows you to set a text label that helps you identify your Active
Roles installation in the Managed Object Statistics report—a report that lists the managed
object counts. You can use the installation label to distinguish, for example, between
production and non-production or pilot installations. The label text is displayed in the title
of the Managed Object Statistics report.
How to start
1. Log on as Active Roles Admin, open the Active Roles console, and select the root
node in the console tree.
2. In the details pane, expand the Product Usage Statistics area, and then click
Change next to the Installation label field.
Safe mode
Active Roles provides a troubleshooting option, referred to as safe mode, that starts the
Administration Service in a limited state. When safe mode is enabled, the Administration
Service disregards all custom policies, workflows, scripts, scheduled tasks and other
How to start
1. Log on to the computer running the Administration Service with a user account that
has administrator rights on that computer. Local administrator rights are required to
enable or disable safe mode.
2. Open Active Roles Management Shell on the computer running the Administration
Service: Click Active Roles 7.3 Management Shell on the Apps page or Start
menu depending upon the version of your Windows operating system.
3. To enable safe mode, enter the following commands at the Management Shell
command prompt:
Set-ARService -SafeModeEnabled $true
Restart-ARService
4. To disable safe mode, enter the following commands at the Management Shell
command prompt:
Set-ARService -SafeModeEnabled $false
Restart-ARService
About us
Contacting us
For sales or other inquiries, visit https://www.oneidentity.com/company/contact-us.aspx
or call +1-800-306-9329.
l Submit and manage a Service Request
l View Knowledge Base articles
l Sign up for product notifications
l Download software and technical documentation
l View how-to-videos
l Engage in community discussions
l Chat with support engineers online
l View services to assist you with your product