0% found this document useful (0 votes)
9 views140 pages

ActiveRoles Solutions Guide

Uploaded by

atanurelmasoglu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views140 pages

ActiveRoles Solutions Guide

Uploaded by

atanurelmasoglu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 140

One Identity Active Roles 7.5.

Solutions Guide
Copyright 2022 One Identity LLC.
ALL RIGHTS RESERVED.
This guide contains proprietary information protected by copyright. The software described in this
guide is furnished under a software license or nondisclosure agreement. This software may be used
or copied only in accordance with the terms of the applicable agreement. No part of this guide may
be reproduced or transmitted in any form or by any means, electronic or mechanical, including
photocopying and recording for any purpose other than the purchaser’s personal use without the
written permission of One Identity LLC .
The information in this document is provided in connection with One Identity products. No license,
express or implied, by estoppel or otherwise, to any intellectual property right is granted by this
document or in connection with the sale of One Identity LLC products. EXCEPT AS SET FORTH IN THE
TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT,
ONE IDENTITY ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR
STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-
INFRINGEMENT. IN NO EVENT SHALL ONE IDENTITY BE LIABLE FOR ANY DIRECT, INDIRECT,
CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT
LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF
INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF
ONE IDENTITY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. One Identity makes
no representations or warranties with respect to the accuracy or completeness of the contents of this
document and reserves the right to make changes to specifications and product descriptions at any
time without notice. One Identity does not make any commitment to update the information
contained in this document.
If you have any questions regarding your potential use of this material, contact:
One Identity LLC.
Attn: LEGAL Dept
4 Polaris Way
Aliso Viejo, CA 92656
Refer to our Web site (http://www.OneIdentity.com) for regional and international office
information.
Patents
One Identity is proud of our advanced technology. Patents and pending patents may apply to this
product. For the most current information about applicable patents for this product, please visit our
website at http://www.OneIdentity.com/legal/patents.aspx.
Trademarks
One Identity and the One Identity logo are trademarks and registered trademarks of One Identity
LLC. in the U.S.A. and other countries. For a complete list of One Identity trademarks, please visit
our website at www.OneIdentity.com/legal. All other trademarks are the property of their
respective owners.
Legend

WARNING: A WARNING icon highlights a potential risk of bodily injury or property


damage, for which industry-standard safety precautions are advised. This icon is
often associated with electrical hazards related to hardware.

CAUTION: A CAUTION icon indicates potential damage to hardware or loss of data


if instructions are not followed.

Active Roles Solutions Guide


Updated - September 2022
Version - 7.5.4
Contents

Active Roles Solutions Overview 9

ERFM Solution 10
Understanding the problem 10
Understanding the solution 12
AutoProvision 12
Synchronize 13
Synchronized properties 13
Substituted properties 13
Back-synchronized properties 14
Deprovision 14
AutoProvision of distribution list manager 14
Mailbox type conversion 15
Technical description 16
Policy Object 17
Policy settings 18
Container for new shadow accounts 18
Default description for new shadow accounts 18
Attribute to store a reference to shadow account 18
Synchronized properties 19
Substituted properties 19
Back-synchronized properties 24
Policy actions 24
Scheduled Task 26
Deploying the Solution 27
Prerequisite conditions 27
Exchange Server deployment 27
Active Roles deployment 28
Applying the Policy Object 29
Upgrade from an earlier version 30
Examples of Use 31
Configuration 31

Active Roles 7.5.4 Solutions Guide


3
Mailbox creation 32
Creating a new user account with a mailbox 32
Creating a mailbox for an existing user account 33
Account modification 33
Making changes to synchronized properties 33
Making changes to substituted properties 34
Account deprovisioning 35
Membership management delegation 35
Mailbox type conversion 37
Converting a linked mailbox to a user mailbox 37
Converting a user mailbox to a linked mailbox 37

Configuration Transfer Wizard Solution 39


What's new in version 7.5.4 39
Solution components 39
Configuration Collection wizard 40
Configuration Deployment wizard 40
ARSconfig command-line tool 40
Installing the solution 40
Installation requirements 40
Installation procedure 41
Using the solution 41
General considerations 41
About dangling links 43
Using the Collection wizard and Deployment wizard 43
Using the ARSconfig command-line tool 44
Syntax 45
Parameters 45
Scenario: Transfer Active Roles configuration 47
Scenario: Rolling back the configuration changes 49
Known issues 50

Active Roles SPML Provider 53


Features 53
Use scenarios 54
Basic concepts and definitions 54

Active Roles 7.5.4 Solutions Guide


4
How SPML Provider works 55
System requirements 57
Hardware requirements 57
Software requirements 57
Web Server requirements 58
Configuring Active Roles SPML Provider 59
Configuration settings in SPML.Config 59
Sample configuration file 61
Extending the SPML Provider schema 62
Using Active Roles SPML Provider 63
Operation mode 63
Support for Active Roles controls 63
Sending controls to the Active Roles Administration Service 64
Specifying controls to return to the SPML Provider client 65
Sample SPML request 65
SPML request 66
SPML response 67
Supported Azure Features 68
Supported operations 71
Samples of use 73
Configuration settings in sample.config 73
Core Operation samples 74
Capability samples 80
Active Roles SPML Provider terminology 87
Troubleshooting SPML Provider 89
Cannot remove the specified item because it was not found in the specified Collec-
tion 89
Resolution 89
Some of the specified attributes for the '<object class name>’ object class are not
defined in the schema 90
Resolution 91
What’s new 91

Skype for Business Server Solution 92


Introducing Skype for Business Server User Management 92
Supported Active Directory topologies 93

Active Roles 7.5.4 Solutions Guide


5
Single forest 94
Multiple forests - Resource forest 94
Multiple forests - Central forest 94
User Management policy 95
User Management policy settings 96
Connection to Skype for Business Server 96
SIP user name generation rule 97
SIP domain restriction rule 97
Pool restriction rule 98
Telephony restriction rule 99
Master Account Management policy 99
Master Account Management policy settings 100
Skype for Business Server forest mode 100
Container for new shadow accounts 101
Default description for new shadow accounts 101
Attribute to store a reference to shadow account 101
Synchronized properties 101
Substituted properties 102
Back-synchronized properties 103
Master Account Management policy actions 103
Scheduled synchronization 105
Access Templates for Skype for Business Server 105
Deploying the Solution 108
Prerequisite conditions 108
Skype for Business Server deployment 108
Active Roles deployment 109
Deployment in a single-forest environment 110
Deployment in a multi-forest environment 111
Apply the Master Account Management policy 112
Apply the User Management policy 113
Upgrade from an earlier version 114
Managing Skype for Business Server Users 115
Enabling or disabling users for Skype for Business Server 116
Add and enable a new Skype for Business Server user 116
Disable or re-enable a user account for Skype for Business Server 116

Active Roles 7.5.4 Solutions Guide


6
Remove a user account from Skype for Business Server 117
Managing Skype for Business Server user properties 118
View or change Skype for Business Server user properties 118
Move a user to another server or pool in Skype for Business Server 120

Management Pack for SCOM 122


Features 122
Monitoring views 122
Getting started 123
Monitoring Active Roles Administration Service 123
General response - Script 124
General response - Alert 124
Replication monitoring - Script 124
Replication monitoring - Alert 125
Monitoring connection to configuration database 125
Connection to database has been lost - Alert 125
Connection to database has been restored - Alert 126
Monitoring of Dynamic Group-related operations 126
Dynamic Group - Rebuilding has been started - Alert 127
Failed to add object to Dynamic Group - Alert 127
Failed to remove object from Dynamic Group - Alert 127
Dynamic Group - Failed to process membership rule - Alert 128
Dynamic Group - Failed to update membership list - Alert 128
Dynamic Group - Failed to update membership list of nested group - Alert 128
Dynamic Group - Failed to update membership rule upon deletion of object -
Alert 128
Dynamic Group - Failed to look up object when updating - Alert 129
Dynamic Group - Failed to retrieve information from domain - Alert 129
Dynamic Group - Membership rule domain unavailable - Alert 130
Dynamic Group - Membership rule failed - Alert 130
Monitoring of Group Family-related operations 130
Group Family - Cannot find configuration storage group - Alert 131
Group Family - Failed to retrieve configuration data - Alert 132
Group Family - Incorrect configuration data - Alert 132
Group Family - Failed to retrieve configuration data for controlled group - Alert 132
Group Family - Failed to retrieve data from container - Alert 132

Active Roles 7.5.4 Solutions Guide


7
Group Family - Failed to update configuration data - Alert 133
Group Family - Failed to update configuration data for controlled group - Alert 133
Group Family - Cannot find controlled group - Alert 133
Group Family - Failed to create controlled group - Alert 134
Group Family - Failed to update membership list of controlled group - Alert 134
Group Family - Failed to create run task - Alert 134
Group Family - Failed to modify run task - Alert 134
Group Family - Failed to delete run task - Alert 135
Group Family - Run task has been started manually - Alert 135
Group Family run has been completed - Alert 135
Internal error - Alert 135
Critical error on startup - Alert 135
License system failure - Alert 136
Monitoring Active Roles Web Interface 136
Availability - Script 136
Availability - Alert 136
Monitoring performance 137
AD changes processed/sec 137
Changes queue length (AD + Database) 137
Connected clients 137
Database changes processed/sec 138
LDAP operations in progress 138
LDAP operations/sec 138
Private bytes 138
Queued post-processing policies 138
Requests in progress 138
Requests/sec 139
Script module average execution time 139
Script modules executing 139

About us 140
Contacting us 140
Technical support resources 140

Active Roles 7.5.4 Solutions Guide


8
1

Active Roles Solutions Overview

One Identity Active Roles is highly configurable to meet different customer requirements.
The add-on products available as part of Active Roles Solutions extend the Active Roles
native capability to provide extensible solutions to the customer based on their
requirement. For example, specific customer scenarios may involve the following:
l Multi-forest design environments.
l Transfer of Active Roles configuration between different environments.
l Exchange of user, resource, and service provisioning information between SPML-
enabled enterprise applications and Active Directory.
l Administration of Skype for Business Server user accounts.
l Monitoring availability and health of the Active Roles Administration Service and its
information store, Active Roles replication status, and availability of the Active Roles
Web Interface.

Currently, Active Roles provides the following solutions to support customer requirements
in specific environments:
l ERFM Solution
l Configuration Transfer Wizard Solution
l Active Roles SPML Provider
l Skype for Business Server Solution
l Management Pack for SCOM

Active Roles solutions are available as part of the Active Roles package. However, the
solutions can be installed on your system along with Active Roles based on the specific
requirement.

Active Roles 7.5.4 Solutions Guide


9
Active Roles Solutions Overview
2

ERFM Solution

The Active Roles Exchange Resource Forest Management Solution extends the Active Roles
capabilities to enable the management of mailbox users in Exchange environments
leveraging the resource forest model.

l Understanding the problem


l Understanding the solution
l Technical description

Understanding the problem


Although the majority of small- and medium-sized organizations deploy a single Active
Directory forest, a significant portion of large organizations recognize and accommodate
the need to deploy multiple forests. A multi-forest design carries higher administrative and
support costs, and complicates collaboration and messaging. However, it offers the highest
level of security isolation. In addition, some companies consider a multi-forest design
because of organizational structure issues (such as autonomous business units and
decentralized IT departments), business policy, or legal and regulatory requirements.
If a company chooses a multi-forest design, one of the main questions that arise is the
setup of the Exchange messaging system.
An Exchange organization consists of one or more Exchange servers, and each Exchange
organization is specific to one Active Directory forest. Exchange servers rely on access to
the global catalog for address information. Because each forest has a separate global
catalog, an Exchange organization is associated with only one forest.
Having multiple Exchange organizations hinders user collaboration and requires cross-
forest replication of Exchange data between the organizations. To enable multiple
Exchange organizations to function as a single business organization, additional
configuration is required to synchronize the Exchange mail recipients in the respective
directories in each Exchange organization.
Therefore, a preferred deployment option could be to have multiple forests use the same
Exchange organization for mail service. A single Exchange organization that serves multiple

Active Roles 7.5.4 Solutions Guide


10
ERFM Solution
forests does not require cross-forest synchronization of mail recipient data because the
organization uses only one forest for its Active Directory storage and services.
Whether a single Exchange organization serves one forest or more than one forest, the
Exchange organization is still associated with only one of the forests, called the Exchange
forest (or resource forest). Users that have accounts in one forest might have mailboxes in
the same forest or in a different forest; however, mailboxes are always in the same forest
as the Exchange servers because mailbox data is stored on the Exchange servers.
The following figure shows an Exchange organization that has mailboxes on Exchange
servers in one forest and user accounts in a different forest. In this scenario, the user
account in an accounts forest has a disabled account that represents the user’s mailbox in
the Exchange forest.

Figure 1: Processes automated by Active Roles SPML Provider

In the scenario where multiple forests share a single Exchange organization, Exchange
servers are installed only in the Exchange forest. Users have their accounts in accounts
forests and their mailboxes are stored in the Exchange forest. To associate a user with a
mailbox, a disabled user account (shadow account) is created for that user in the Exchange
forest. A mailbox is then created for the shadow account, with a certain attribute on the
shadow account referencing the user’s account held in the accounts forest. This type of
Exchange environment is known as the Exchange resource forest model.
The main advantage of the Exchange resource forest model is a security boundary
between Active Directory and Exchange administration. Also, a single Exchange
organization provides for a single Global Address List (GAL), preserves all Exchange
collaboration capabilities, and uses native Exchange data replication, thus lowering
administrative overhead.
The major problem that arises in the resource forest model is that the separate Exchange
forest and the various accounts forests require directory synchronization between them. A
provisioning process needs to be set up so that each time an administrator creates a user
account in an accounts forest, a shadow account with a mailbox is created in the Exchange
forest. The account properties must also be synchronized between the accounts forest and
the Exchange forest. These processes cannot be automated using native Active Directory
mechanisms, which leads to the need for a third-party solution.

Active Roles 7.5.4 Solutions Guide


11
ERFM Solution
Understanding the solution
Exchange Resource Forest Management extends the Active Roles capabilities to enable the
management of mailbox users in Exchange environments leveraging the resource forest
model. The following figure illustrates the processes that are automated by Exchange
Resource Forest Management.

The AutoProvision, Synchronize, and Deprovision processes maintain the shadow accounts
in the Exchange forest in sync with the master accounts upon creation, modification,
deprovisioning, or deletion of master accounts in accounts forests.

AutoProvision
The AutoProvision process creates a shadow account in the Exchange forest upon:
l Creation of a user in the accounts forest if the option to create a mailbox for that user
is selected
l Execution of the Exchange task to create a mailbox for an existing user from the
accounts forest

Then, the AutoProvision process creates a linked mailbox associated with that shadow
account, designating the user from the accounts forest as the linked master account for
that mailbox.
To maintain a link between the master account and shadow account, Exchange Resource
Forest Management assigns the globally unique identifier (GUID) of the shadow account to
a certain attribute of the master account (the adminDescription attribute by default).

Active Roles 7.5.4 Solutions Guide


12
ERFM Solution
Normally, the AutoProvision process creates a shadow account with the same name as the
name of the user from the accounts forest. In case of a name conflict, a different name is
used to ensure the uniqueness of the shadow account’s name.

Synchronize
The Synchronize process includes the following functions:
l Updating certain properties of shadow accounts based on changes to master
accounts
l Substituting certain properties of master accounts with properties of shadow
accounts
l Updating certain properties of master accounts based on changes to shadow
accounts

Synchronized properties
When you update certain properties of a master account, Exchange Resource Forest
Management updates those properties in both the master account and shadow account.
These properties are referred to as synchronized properties.
Exchange Resource Forest Management performs synchronization of properties upon:
l Creation of shadow accounts
l Modification of master accounts

Thus, modifying personal or organization-related properties of a master account also


results in updating those properties of the shadow account. This function ensures that
changes to master accounts are properly reflected in the directory used by the Exchange
messaging system. For the default list of synchronized properties, see Synchronized
properties later in this document. You can configure Exchange Resource Forest
Management to synchronize additional properties or remove individual properties from
synchronization.

Substituted properties
When you view or change certain properties of a master account in an accounts forest,
Exchange Resource Forest Management redirects the retrieval or change request to the
properties of the shadow account in the Exchange forest. Such properties are referred to as
substituted properties.
Thus, modification of Exchange-related properties of a master account only results in
updating the corresponding properties of the shadow account. This function ensures that
administration of master accounts properly manipulates Exchange recipient properties in
the Exchange forest.

Active Roles 7.5.4 Solutions Guide


13
ERFM Solution
The substituted properties behave as follows:
l When retrieving property values for a master account, Active Roles returns the
property values of the shadow account linked to the master account.
l When modifying properties for a master account, Active Roles actually updates the
properties of the shadow account linked to the master account.

For the default list of substituted properties, see Substituted properties later in this
document. You can configure Exchange Resource Forest Management to extend that list.

Back-synchronized properties
When you change certain properties of a shadow account, Exchange Resource Forest
Management changes those properties in both the shadow account and master account.
These properties are referred to as back-synchronized properties. By default, the list of
back-synchronized properties consists of a single property—mail (E-mail Address), and
can be modified.
When a back-synchronized property of the shadow account has changed, Exchange
Resource Forest Management replicates the change to the master account. The ability to
replicate property changes from the shadow account to the master account is helpful in a
situation where certain properties are administered on the shadow account rather than the
master account.

Deprovision
The Deprovision process performs the deprovision operation on the shadow account once
the master account is deprovisioned. This causes Active Roles to execute the
deprovisioning policies that are in effect on the shadow account to deprovision the linked
mailbox of the master account. Note that the mailbox deprovisioning policies must be
applied to the container that holds shadow accounts rather than master accounts.
In Active Roles, you can undeprovision the deprovisioned master account. However, this
may not undeprovision the shadow account (and, therefore, undeprovision the linked
mailbox). For undeprovisioning master accounts to have an effect on shadow accounts, the
container that holds deprovisioned master accounts must be in the scope of the Policy
Object provided by Exchange Resource Forest Management.

AutoProvision of distribution list manager


Exchange publishes distribution lists as mail-enabled groups in Active Directory. Such
groups are listed in the Global Address List (GAL) and can be administered using Microsoft
Outlook. Thus, Outlook can be used to add or remove members from a distribution list
provided that the Outlook user is allowed to update the membership list of the respective
group in Active Directory.

Active Roles 7.5.4 Solutions Guide


14
ERFM Solution
With Active Roles, an administrator can delegate the membership management task on a
group to the account that is designated as the manager of the group. This can be done by
specifying the manager’s account on the Managed By page and then selecting the check
box to allow the manager to update the membership list of the group. Both the group and
the manager’s account must be in the same Active Directory forest.
In the Exchange resource forest topology, where mail-enabled groups are located in the
forest other than the forest containing user accounts, delegating the membership
management task in this way is not feasible. To address the problem, Exchange Resource
Forest Management synchronizes the manager setting for a shadow account on a group in
the Exchange forest with the respective master account in the accounts forest, causing
Active Roles to give the necessary rights to the master account.
If a user account (master account) in an accounts forest is configured to have a mailbox in
the Exchange forest, and thus has a shadow account in the Exchange forest, the Managed
By page can be used to give the master account the right to manage the membership list of
a group. When you specify the shadow account as the manager of the group and select the
check box to allow the manager to update the membership list, Exchange Resource Forest
Management causes Active Roles to change security settings on the group so that the
master account is authorized to add or remove members from the group.
Hence, on the Managed By page, you need to specify the shadow account rather than the
master account. This requires a tool that would enable you to identify the shadow account.
Exchange Resource Forest Management customizes the Active Roles Web Interface by
adding a new entry to identify the shadow account. You can tell the shadow account’s name
and other properties from the Shadow Account tab on the Exchange Properties page
for the master account.

Mailbox type conversion


You can use Active Roles to convert a linked mailbox to a user mailbox, and vice versa, by
managing the mailbox in the Exchange forest.
For linked mailboxes in the Exchange forest, the Active Roles Web Interface provides a
command allowing you to unlink the mailbox from the external user. The command
converts the mailbox to the user mailbox type, and enables the user account
associated with the mailbox in the Exchange forest. The external user can no longer
access the mailbox.
Foe user mailboxes in the Exchange forest, the Web Interface provides a command
allowing you to link the mailbox to an external user from an accounts forest. The domain of
the external user account must be registered with Active Roles (managed domain). The
command converts the mailbox to the linked mailbox type, with the mailbox user in the
Exchange forest configured as the shadow account and the external user specified as the
linked master account.
For step-by-step instructions, see Mailbox type conversion later in this document.

Active Roles 7.5.4 Solutions Guide


15
ERFM Solution
Technical description
Exchange Resource Forest Management extends the mailbox management capabilities
of Active Roles in the case of resource forest topology. This topology option assumes
that you have:
l At least one Active Directory forest containing logon-enabled user accounts for your
organization, referred to as an accounts forest. The accounts forest does not have
Exchange Server installed, nor does it need to have the Active Directory schema
extended with the Exchange Server attributes.
l An Active Directory forest with Exchange Server, referred to as the Exchange forest,
to hold mailboxes for user accounts from the accounts forest.
l Trust relationships configured so that the Exchange forest trusts the accounts forest.

With Exchange Resource Forest Management, you can use Active Roles to:
l Create a mailbox for a user account from the accounts forest.
You can create a mailbox when creating a user account in the accounts forest. It is
also possible to create a mailbox for a user account that already exists in the
accounts forest. As a result, Active Roles creates a disabled user account (shadow
account) with a linked mailbox in the Exchange forest, and associates the shadow
account and the mailbox with the user account (master account) held in the
accounts forest.
l View or change mailbox properties, and perform Exchange tasks, on a user account
from the accounts forest (master account) that has a linked mailbox in the
Exchange forest.
The pages for managing the master account include all Exchange properties and
tasks that are normally available when the mailbox resides in the same forest as the
managed user account. With Exchange Resource Forest Management, Active Roles
synchronizes the Exchange properties displayed or changed on the pages for
managing the master account with the properties of the linked mailbox.
l View or change the personal or organization-related properties of the master account
while having them synchronized to the respective properties of the shadow account.

When you use Active Roles to change the personal or organization-related properties
of the master account, Exchange Resource Forest Management causes Active Roles
to apply the changes to those properties of the shadow account as well. This function
ensures correct information about the master account in the Exchange address lists.
l Deprovision a master account while having Active Roles deprovision the master
account’s mailbox in the Exchange forest.

When you deprovision a master account, Exchange Resource Forest Management


causes Active Roles to apply the deprovisioning policies to both the master account
and shadow account. As a result, Active Roles makes all the necessary changes to
deprovision the mailbox. You can revert these changes by undeprovisioning the
master account.

Active Roles 7.5.4 Solutions Guide


16
ERFM Solution
l Delegate Exchange mailbox management tasks by applying Access Templates to
containers that hold master accounts.

For example, you can apply the “Exchange - Recipients Full Control” Access Template
to a container in the accounts forest, which enables the delegated administrator to
create, view or change linked mailboxes in the Exchange forest by managing master
accounts held in that container.
l Enable a master account to update membership list of a distribution group held in the
Exchange forest.

When you make a shadow account the manager or a secondary owner of a


distribution group and allow the manager or secondary owners to update
membership list, Exchange Resource Forest Management ensures that the
corresponding master account has sufficient rights to add or remove members from
that group using Exchange clients such as Microsoft Outlook or Outlook Web App.
Exchange Resource Forest Management also enables Active Roles to provide all these
administrative capabilities for linked mailboxes created by Active Roles with an earlier
version of Exchange Resource Forest Management or without Exchange Resource Forest
Management, or created by tools other than Active Roles. Exchange Resource Forest
Management schedules Active Roles to search the managed domains for linked mailboxes
whose master account:
l Is in the scope of the Exchange Resource Forest Management policy for
mailbox management
l Does not have a reference to the shadow account expected by Exchange Resource
Forest Management

For each master account that meets these conditions, Active Roles updates the master
account with a reference to the shadow account, thereby extending the capabilities of
Exchange Resource Forest Management to that master account and its linked mailbox. As a
result, the linked mailbox falls under the control of Exchange Resource Forest
Management.

Policy Object
Exchange Resource Forest Management uses a Policy Object to implement mailbox
management policy for Exchange resource forest topology. This policy enables Active Roles
to create and manage linked mailboxes in the resource forest by administering linked
master accounts in an accounts forest. The Policy Object is in the
Configuration/Policies/Administration/Builtin container. The name of the Policy
Object is Built-in Policy - ERFM - Mailbox Management.
To enable Exchange Resource Forest Management, you need to apply that Policy Object to
the domain or container that holds linked master accounts you want Active Roles to
administer.

Active Roles 7.5.4 Solutions Guide


17
ERFM Solution
Policy settings
The topics in this section cover the mailbox management policy settings.

Container for new shadow accounts


The policy allows you to specify the container in which you want Active Roles to create
shadow accounts when creating linked mailboxes managed by Exchange Resource Forest
Management. You can select the desired organizational unit in the Exchange forest or you
can let Active Roles choose the default container.
If you select a particular organizational unit, Active Roles creates shadow accounts in that
organizational unit. You can select an organizational unit from any domain of the Exchange
forest that is registered with Active Roles as a managed domain.
If you let Active Roles choose the default container for new shadow accounts, then Active
Roles creates shadow accounts in the Users container in a particular domain of the
Exchange forest. If the forest root domain of the Exchange forest is registered with Active
Roles as a managed domain, then Active Roles creates shadow accounts in that domain.
Otherwise, Active Roles creates shadow accounts in the domain that appears first in the
ordered list of the managed domains from the Exchange forest. Note that Exchange
Resource Forest Management requires at least one domain of the Exchange forest to be
registered with Active Roles as a managed domain.

Default description for new shadow accounts


The policy allows you to specify a text to use as the default description for new shadow
accounts that Active Roles creates when creating linked mailboxes managed by Exchange
Resource Forest Management. Active Roles writes that text to the Description property of
every new shadow account.

Attribute to store a reference to shadow account


By default, the policy designates the adminDescription attribute of the master account
for storing the GUID of the shadow account, and allows you to choose a different attribute
for that purpose. Exchange Resource Forest Management uses this attribute to identify the
shadow account (and, consequently, the linked mailbox) when managing a given master
account. The policy causes Active Roles to set this attribute on the master account when
creating the linked mailbox.

Active Roles 7.5.4 Solutions Guide


18
ERFM Solution
Synchronized properties
The policy defines a list of properties to copy from the master account to the shadow
account. These properties are referred to as synchronized properties. When you use Active
Roles to set or change a synchronized property of a master account, the policy causes
Active Roles to set or change the value of that property on both the master account and
shadow account.
In addition, Exchange Resource Forest Management provides a scheduled task that copies
synchronized properties from every managed master account to the corresponding shadow
account. The task runs on a scheduled basis to ensure that each of the synchronized
properties of the shadow account has the same value as the corresponding property of the
master account. If a synchronized property of the shadow account has changed for
whatever reason, Active Roles changes that property back to the value found on the master
account. For further details, see Scheduled Task later in this document. The following table
provides the default list of synchronized properties. You can configure the policy to
synchronize additional properties or remove individual properties from synchronization.

Table 1: Default list of synchronized proprties

c (Country Abbreviation) physicalDeliveryOfficeName (Office


Location)
co (Country)
postalCode (ZIP/Postal Code)
company (Company)
postOfficeBox (Post Office Box)
countryCode (Country-Code)
sAMAccountName (Logon Name (pre-
department (Department)
Windows 2000))
displayName (Display Name)
sn (Last Name)
givenName (First Name)
st (State/Province)
homePhone (Home Phone)
streetAddress (Street Address)
initials (Initials)
telephoneNumber (Telephone Number)
l (City)
title (Job Title)
mobile (Mobile Number)
url (Web Page Address (Others))
otherTelephone (Phone Number (Others))
wWWHomePage (Web Page Address)

Substituted properties
The policy defines a list of properties that appear on the master account but reflect the
properties of the linked mailbox or shadow account. These properties are referred to as
substituted properties. When you use Active Roles to view properties of a master account,
the policy causes Active Roles to retrieve the values of the master account’s substituted
properties from the shadow account. When you use Active Roles to set or change a

Active Roles 7.5.4 Solutions Guide


19
ERFM Solution
substituted property of a master account, the policy causes Active Roles to set or change
the value of that property on the shadow account.
The policy adds all the Exchange recipient properties to the default list of substituted
properties, which causes Active Roles to operate as if master accounts have those
properties although the accounts forest does not have Exchange Server installed (and,
therefore, does not have the Active Directory schema extended with Exchange recipient
properties).
The policy does not allow you to narrow down the list of substituted properties. However,
you can specify your custom list of substituted properties in addition to the default list. If
you do so, the resulting list of substituted properties includes all properties from both the
default list and your custom list.

Table 2: Default list of substituted properties

adminDisplayName edsva-MsExch-AllowRecurringMeetings
altRecipient edsva-MsExch-AllRequestInPolicy
altRecipientBL edsva-MsExch-AllRequestOutOfPolicy
authOrig edsva-MsExch-ApplyEmailAddressPolicy
authOrigBL edsva-MsExch-ArchiveMailboxDatabase
autoReply edsva-MsExch-ArchiveMailboxEnabled
autoReplyMessage edsva-MsExch-ArchiveMailboxName
deletedItemFlags edsva-MsExch-ArchiveMailboxQuota
delivContLength edsva-MsExch-
ArchiveMailboxWarningQuota
deliverAndRedirect
edsva-MsExch-AutoReplyExternalAudience
deliveryMechanism
edsva-MsExch-AutoReplyExternalMessage
delivExtContTypes
edsva-MsExch-AutoReplyInternalMessage
displayNamePrintable
edsva-MsExch-AutoReplyState
dLMemDefault
edsva-MsExch-BookingWindowInDays
dLMemRejectPerms
edsva-MsExch-BookInPolicy-DN
dLMemSubmitPerms
edsva-MsExch-BypassModerationFor
dnQualifier
edsva-MsExch-ConflictPercentageAllowed
edsaAdminGroup
edsva-MsExch-DeleteAttachments
edsaAllExchangeTasks
edsva-MsExch-DeleteComments
edsaCreateMsExchMailbox
edsva-MsExch-DeleteNonCalendarItems
edsaDeleteEmail
edsva-MsExch-DeleteSubject
edsaDeleteMailbox
edsva-MsExch-EnableArchiveMailbox
edsaEstablishEmail
edsva-MsExch-EnableCalendarAttendant
edsaEstablishGroupEmail
edsva-MsExch-

Active Roles 7.5.4 Solutions Guide


20
ERFM Solution
edsaExchangeTasksAvailable EnableResourceBookingAttendant
edsaHideMembership edsva-MsExch-EndDateForRetentionHold
edsaHomeMDB edsva-MsExch-EnforceSchedulingHorizon
edsaHomeMTA edsva-MsExch-
ForwardRequestsToDelegates
edsaMailboxSecurityDescriptor
edsva-MsExch-LitigationHoldEnabled
edsaMoveMailbox
edsva-MsExch-MailboxItemsTotal
edsaMsExchMixedMode
edsva-MsExch-MailboxLastLoggedOnBy
edsaRemoveAllMsExchAttributes
edsva-MsExch-MailboxSize
edsaUnhideMembership
edsva-MsExch-MaximumConflictInstances
edsvaExchOrgVersion
edsva-MsExch-
edsvaExchServerVersion
MaximumDurationInMinutes
edsva-MsExch-AcceptMessagesOnlyFrom
edsva-MsExch-MemberDepartRestriction
edsva-MsExch-ActiveMailboxServerName
edsva-MsExch-MemberJoinRestriction
edsva-MsExch-AddAdditionalResponse
edsva-MsExch-ModeratedBy
edsva-MsExch-AdditionalResponse
edsva-MsExch-ModerationEnabled
edsva-MsExch-
edsva-MsExch-
AddNewRequestsTentatively
ModerationNotificationSending
edsva-MsExch-AddOrganizerToSubject
edsva-MsExch-MoveRequestStatus
edsva-MsExch-AddressBookPolicyDN
edsva-MsExch-OrganizerInfo
edsva-MsExch-AllBookInPolicy
edsva-MsExch-
edsva-MsExch-AllowConflicts ProcessExternalMeetingMessages
edsva-MsExch-ProtocolSettings-IMAP4- edsva-MsExch-ProtocolSettings-
Enable ActiveSync-Enable
edsva-MsExch-ProtocolSettings-MAPI- edsva-MsExch-ProtocolSettings-
Enable ActiveSync-PolicyDN
edsva-MsExch-ProtocolSettings-OMA- edsva-MsExch-ProtocolSettings-IMAP4-
Enable Config
edsva-MsExch-ProtocolSettings-OWA- enabledProtocols
Enable
expirationTime
edsva-MsExch-ProtocolSettings-POP3-
extensionAttribute1
Config
extensionAttribute13
edsva-MsExch-ProtocolSettings-POP3-
Enable extensionAttribute14
edsva-MsExch-ProtocolSettings- extensionAttribute15
UpToDateNotifications-Enable
extensionAttribute2
edsva-MsExch-RejectMessagesFrom
extensionAttribute3

Active Roles 7.5.4 Solutions Guide


21
ERFM Solution
edsva-MsExch- extensionAttribute4
RemoveForwardedMeetingNotifications
extensionAttribute5
edsva-MsExch-RemoveMoveRequest
extensionAttribute6
edsva-MsExch-
extensionAttribute7
RemoveOldMeetingMessages
extensionAttribute8
edsva-MsExch-RemovePrivateProperty
extensionAttribute9
edsva-MsExch-RequestInPolicy-DN
extensionData
edsva-MsExch-RequestOutOfPolicy-DN
folderPathname
edsva-MsExch-
RequireSenderAuthentication formData

edsva-MsExch-ResourceCapacity forwardingAddress

edsva-MsExch-ResourceCapacity garbageCollPeriod

edsva-MsExch-ResourceCustomProperties heuristics

edsva-MsExch-ResourceDelegates-DN homeMDB

edsva-MsExch-RetentionComment homeMTA

edsva-MsExch-RetentionHoldEnabled importedFrom

edsva-MsExch-RetentionPolicy-DN internetEncoding

edsva-MsExch-RetentionUrl language

edsva-MsExch-RoleAssignmentPolicyDN languageCode

edsva-MsExch- legacyExchangeDN
ScheduleOnlyDuringWorkHours mailNickname
edsva-MsExch-SharedMailboxUsers mAPIRecipient
edsva-MsExch-SharingPolicyDN mDBOverHardQuotaLimit
edsva-MsExch-StartDateForRetentionHold mDBOverQuotaLimit
edsva-MsExch-TentativePendingApproval mDBStorageQuota
edsva-MsExch- mDBUseDefaults
UMAnonymousCallersCanLeaveMessages
msExchADCGlobalNames
edsva-MsExch-
UMAutomaticSpeechRecognitionEnabled msExchALObjectVersion

edsva-MsExch-UM- msExchConferenceMailboxBL
CallAnsweringRulesEnabled msExchControllingZone
edsva-MsExch-UM- msExchCustomProxyAddresses
CallsFromNonUsersAllowed
msExchExpansionServerName
edsva-MsExch-UM-DialPlanDN
msExchFBURL
edsva-MsExch-UM-ExtensionNumbers
msExchTUIPassword
edsva-MsExch-UM-FaxEnabled
msExchTUISpeed

Active Roles 7.5.4 Solutions Guide


22
ERFM Solution
edsva-MsExch-UM-IsEnabled msExchTUIVolume
edsva-MsExch-UM-LockedOut msExchUnmergedAttsPt
edsva-MsExch-UM-MailboxPolicyDN msExchUseOAB
edsva-MsExch-UM- msExchUserAccountControl
OperatorExtensionNumber
msExchVoiceMailboxID
edsva-MsExch-UM-PIN
oOFReplyToOriginator
edsva-MsExch-UM-PINResetOnFirstLogon
pOPCharacterSet
edsva-MsExch-UM-SIPAddress
pOPContentFormat
edsvaSendAsTrustees
preferredDeliveryMethod
extensionAttribute10
protocolSettings
extensionAttribute11
proxyAddresses
extensionAttribute12
publicDelegates
msExchHideFromAddressLists
publicDelegatesBL
msExchHomeServerName
queryPolicyBL
msExchIMACL
replicatedObjectVersion
msExchIMAddress
replicationSensitivity
msExchIMAPOWAURLPrefixOverride
replicationSignature
msExchIMMetaPhysicalURL
reportToOriginator
msExchIMPhysicalURL
reportToOwner
msExchIMVirtualServer
securityProtocol
msExchInconsistentState
serverReferenceBL
msExchMailboxFolderSet
showInAddressBook
msExchMailboxGuid
submissionContLength
msExchMailboxSecurityDescript
targetAddress
or
textEncodedORAddress
msExchMailboxUrl
unauthOrig
msExchMasterAccountSid
unmergedAtts
msExchMobileMailboxPolicyLink
msExchOmaAdminExtendedSettings
msExchOmaAdminWirelessEnable
msExchOriginatingForest
msExchPfRootUrl
msExchPoliciesExcluded
msExchPoliciesIncluded

Active Roles 7.5.4 Solutions Guide


23
ERFM Solution
msExchPolicyEnabled
msExchPolicyOptionList
msExchPreviousAccountSid
msExchProxyCustomProxy
msExchQueryBaseDN
msExchRecipLimit
msExchRequireAuthToSendTo
msExchResourceGUID
msExchResourceProperties

NOTE:
l The substitute attribute, mail can now be used optionally instead of using it as a
hard-coded attribute.
l If the mail attribute is removed, then a default value is not set in the master
account during user provisioning. Use a script or a policy to set the mail attribute.
For example,
function onPostCreate($Request)
{
$userDN=$Request.DN
$userObject=Get-QADObject $userDN -IncludeAllProperties
Set-QADObject $userDN -ObjectAttributes @
{mail=$userObject.edsaUPNPrefix+"@<domain>"} -proxy
}

Back-synchronized properties
The policy defines a list of properties to copy from the shadow account to the master
account. By default, the list contains a single property, E-Mail Address (mail). When
the e-mail address has changed on the shadow account (which is normally the case
when Exchange Server creates a linked mailbox), the policy ensures that the e-mail
address is correctly set on the master account by copying the e-mail address form the
shadow account.

Policy actions
The mailbox management policy causes Active Roles to perform the following actions
depending on the change request submitted to the Active Roles Administration Service.

Active Roles 7.5.4 Solutions Guide


24
ERFM Solution
Table 3: Policy actions

Request Actions

Create a new user with Active Roles creates the new user (in the accounts forest), and
mailbox then performs the following actions:
l Create a shadow account (in the Exchange forest), and
populate its properties with the data found in the
request
l Create a linked mailbox using that shadow account, with
the new user (from the accounts forest) specified as the
linked master account
l Create a reference to the shadow account on the master
account
l Update the master account with the e-mail address of
the linked mailbox

When creating the shadow account or mailbox, Active Roles


executes all policies that are applied to the container that
holds the shadow account, including the mailbox auto-
provisioning policies (if any). To have an effect, mailbox auto-
provisioning policies must be applied to the container that
holds shadow accounts (rather than master accounts).

Create a mailbox for an Active Roles retrieves the properties of the existing user (in
existing user the accounts forest), and then performs the following actions:
l Create a shadow account (in the Exchange forest), and
populate its properties with the properties of the existing
user
l Create a linked mailbox using that shadow account, with
the existing user (from the accounts forest) specified as
the linked master account
l Create a reference to the shadow account on the master
account
l Update the master account with the e-mail address of
the linked mailbox

When creating the shadow account or mailbox, Active Roles


executes all policies that are applied to the container that
holds the shadow account, including the mailbox auto-
provisioning policies (if any). To have an effect, mailbox auto-
provisioning policies must be applied to the container that
holds shadow accounts (rather than master accounts).

Modify properties of a If the change request includes any changes to substituted


master account properties, Active Roleshe requested changes to the

Active Roles 7.5.4 Solutions Guide


25
ERFM Solution
Request Actions

substituted properties of the shadow account. Next, Active


Roles makes the requested changes to the properties of the
master account, and then updates the synchronized properties
of the shadow account with the new property values found on
the master account.

Perform an Exchange Active Roles applies the Exchange task to the shadow account
task on a master of that master account.
account

Deprovision a master Active Roles deprovisions the master account, and then
account deprovisions the shadow account. When deprovisioning the
shadow account, Active Roles executes all deprovisioning
policies that are applied to the container that holds the shadow
account, including the mailbox deprovisioning policies. To
have an effect, mailbox deprovisioning policies must be
applied to the container that holds shadow accounts (rather
than master accounts).

Undeprovision a Active Roles undeprovisions the master account and then


deprovisioned master undeprovisions the shadow account. Once the shadow account
account has been undeprovisioned, the master account’s mailbox
reverts to the state it was in before the master account was
deprovisioned.
For undeprovisioning master accounts to have an effect on
shadow accounts, the container that holds deprovisioned
master accounts must be in the scope of the Built-in Policy -
ERFM - Mailbox Management Policy Object (or a copy of
that Policy Object).

Delete a master account Active Roles deletes the master account, and then performs
the “Disable mailbox” task on the shadow account.

Scheduled Task
Exchange Resource Forest Management includes an Active Roles scheduled task that
complements the mailbox management policy to enforce synchronization of master and
shadow account properties, and to capture existing linked mailboxes whose master account
is put under the control of that policy. The scheduled task object is in the
Configuration/Server Configuration/Scheduled Tasks/Builtin container. The name
of the object is ERFM - Mailbox Management. The task is scheduled to run on a daily
basis. Normally, you do not need to modify that scheduled task.
The operation of the task affects only the user accounts that are in the scope of the Built-in
Policy - ERFM - Mailbox Management Policy Object (or a copy of that Policy Object).
When run, the task performs the following actions on each of those user accounts:

Active Roles 7.5.4 Solutions Guide


26
ERFM Solution
l If the user account does not have a linked mailbox, then skip over that user account.
l If the user account has a linked mailbox but does not store a reference to the shadow
account of that mailbox, then create the reference to the shadow account on that
user account.

This action enables Exchange Resource Forest Management to administer exiting


linked mailboxes, possibly created using an earlier version of Exchange Resource
Forest Management or without the use of Exchange Resource Forest Management.
l If the user account has a linked mailbox and stores a reference to the shadow
account, then copy the synchronized properties from the master account to the
shadow account, and copy the back-synchronized properties from the shadow
account to the master account.

This action ensures that the shadow account properties are updated with the latest
changes to the master account properties and vice versa.
l If the shadow account is the manager (or a secondary owner) who can update
membership list of a particular group, then the task checks that group to see if the
master account can update membership list as well, and, if necessary, gives the
master account the right to update membership list.

This action synchronizes the group manager rights of the master account with the
group manager rights of the shadow account, thereby enabling the mailbox logon
account (which is the master account) to add or remove members from distribution
lists by using Outlook or Outlook Web App.

Deploying the Solution


l Prerequisite conditions
l Applying the Policy Object
l Upgrade from an earlier version

Prerequisite conditions
This section summarizes the prerequisite conditions that must be met before you deploy
Exchange Resource Forest Management.

Exchange Server deployment


Exchange Resource Forest Management requires Exchange 2013 or later to be deployed in
the Exchange forest.

Active Roles 7.5.4 Solutions Guide


27
ERFM Solution
Exchange Server should not be installed in the accounts forests. The Active Directory
schema in the accounts forests does not need to be extended with the Exchange Server
attributes.
A trust between the Exchange forest and the accounts forest must be set up before you can
use Exchange Resource Forest Management. At a minimum, an outgoing trust must be set
up so that the Exchange forest trusts the accounts forest.
For more information, see "Learn more about setting up a forest trust to support linked
mailboxes" at
http://technet.microsoft.com/library/ms.exch.eac.trustedforestordomainlearnmore
(v=exchg.150).aspx.

Active Roles deployment


The following Active Roles components must be installed in your Active Directory
environment:
l Administration Service
l Web Interface
l Active Roles console

You can install these components on member servers in an accounts forest or in the
Exchange forest. For installation instructions, see the Active Roles Quick Start Guide.

Log on as Active Roles Admin


To configure Exchange Resource Forest Management, log on as Active Roles Admin. This
ensures that you have sufficient rights to make the necessary configuration changes.
Assuming the default configuration of the Active Roles Administration Service, you should
log on with a domain user account that is a member of the Administrators group on the
computer running the Administration Service.

Register domains with Active Roles


Exchange Resource Forest Management requires the following domains to be registered
with Active Roles:
l In the Exchange forest, a domain that hold computers running the Mailbox
server role
l In each accounts forest, the domains that hold the users you want to administer with
Active Roles

When registering a domain, you are prompted to choose which account you want the
Administration Service to use to access the domain. You can either specify a so-called
override account or let the Administration Service use its service account. With either
option, the account must have sufficient rights in the domain you are registering. At a
minimum, the account must have the following rights:

Active Roles 7.5.4 Solutions Guide


28
ERFM Solution
l Member of the Account Operators domain security group
l In case of Exchange 2013, member of the Recipient Management role group in
the Exchange forest (see “Access to Exchange Server/Exchange 2013” in the
Active Roles Quick Start Guide), and enabled for remote Exchange Management
Shell (see “Support for remote Exchange Management Shell” in the Active Roles
Quick Start Guide)
l In the Exchange forest, read access to Exchange configuration data (see “Permission
to read Exchange configuration data” in the Active Roles Quick Start Guide).

For instructions on how to register domains with Active Roles, see “Adding and removing
managed domains” in the Active Roles Administrator Guide.

Applying the Policy Object


Active Roles provides a built-in Policy Object containing the mailbox management policy
for Exchange resource forest topology. To enable Exchange Resource Forest Management,
you need to:
Link that Policy Object to the appropriate containers in the accounts forest. These are the
containers that hold the user accounts you want to administer using Exchange Resource
Forest Management.
Optionally, view or change policy settings.

To link the Policy Object to an organizational unit or domain

1. In the Active Roles console tree, select Configuration | Policies |


Administration | Builtin.
2. In the details pane, right-click the Built-in Policy - ERFM - Mailbox Management
Policy Object, and then click Policy Scope.
3. In the dialog box that appears, click Add, and then select the desired organizational
unit or domain in the accounts forest.

Out of the box, the Policy Object has all policy settings configured. You can use the Active
Roles console to view or change policy settings as needed.

To view or change policy settings

1. Double-click the Built-in Policy - ERFM - Mailbox Management Policy Object.


2. In the Properties dialog box that appears, go to the Policies tab, and double-click
the entry in the list of policies.
3. In the Properties dialog box that appears, do any of the following:
a. On the Shadow Account tab, view or change the container and default
description for new shadow accounts.
b. On the Master Account tab, view or change the attribute to store a reference
to shadow account.
c. On the Synced tab, view or change the list of synchronized properties.

Active Roles 7.5.4 Solutions Guide


29
ERFM Solution
d. On the Substituted tab, configure your custom list of substituted properties in
addition to the default list.
e. On the Back-synced tab, view or change the list of back-synchronized
properties.

For detailed description of the policy settings, see Policy settings earlier in this document.

Upgrade from an earlier version


You can seamlessly upgrade from Quick Connect for Exchange Resource Forests to
Exchange Resource Forest Management, as follows.

1. Inspect your current configuration of Quick Connect for Exchange Resource Forests,
and note down the existing policy settings such as:
l The container for new shadow accounts, identified by the Default Mailbox OU
policy parameter.
l The default description for new shadow accounts, identified by the Shadow
account description policy parameter.
l The attribute to store a reference to shadow account, identified by the
Attribute to store back link policy parameter.
l The list of synchronized properties, identified by the Synchronized
Attributes List policy parameter.
l The custom list of substituted properties (if any)), identified by the
Substituted Attributes List policy parameter.
l The list of back-synchronized properties, identified by the Back-synchronized
attributes list policy parameter.

For instructions on how to access policy parameters, see the “Set Up and Apply the
Policy Objects” topic in the Quick Connect for Exchange Resource Forests
Administrator Guide.

2. Uninstall the earlier version of the ERFM add-on from the system.
NOTE: If ERFM (Exchange Resource Forest Management) is installed on the Active
Roles 6.x version, it must be uninstalled before installing Active Roles 7.4, as ERFM
is now part of the product. Failure to uninstall ERFM may result in conflicts and
issueseplace this text with a description of a feature that is noteworthy.

3. Upgrade to Active Roles version 7.5.4. For upgrade instructions, see the Active Roles
7.5.4 Quick Start Guide.
4. Adjust the policy settings in the Exchange Resource Forest Management Policy Object
to match the settings you noted down in Step 1, and then link that Policy Object to
the containers that hold the master accounts you managed using Quick Connect for
Exchange Resource Forests. For instructions on how to configure and link that Policy
Object, see Applying the Policy Object earlier in this document.

Active Roles 7.5.4 Solutions Guide


30
ERFM Solution
After you have performed these steps, Exchange Resource Forest Management recognizes
the existing master accounts, enabling Active Roles to manage their linked mailboxes in the
same way as when using Quick Connect for Exchange Resource Forests.
To expedite the recognition of the existing master accounts, you might execute the
Exchange Resource Forest Management scheduled task without waiting for its scheduled
run: In the Active Roles console, navigate to the Configuration/Server
Configuration/Scheduled Tasks/Builtin container, right-click the task ERFM -
Mailbox Management in that container, point to All Tasks, and then click Execute.

Examples of Use
l Configuration
l Mailbox creation
l Account modification
l Account deprovisioning
l Membership management delegation
l Mailbox type conversion

Configuration
The examples in this chapter assume the following configuration of Exchange Resource
Forest Management:
l Accounts is the name of an organizational unit in a managed domain of an
accounts forest.
l Mailboxes is the name of an organizational unit in a managed domain of the
Exchange forest.
l The the Built-in Policy - ERFM - Mailbox Management Policy Object is linked to
the Accounts OU.
l In the policy settings, the Mailboxes OU is selected as the container for new shadow
accounts. Other policy settings are not modified so they have the default values.

In other words, the Accounts OU holds user accounts that are under the control of
Exchange Resource Forest Management; the Mailboxes OU is intended to hold new
shadow user accounts. Once a user account in the Accounts OU is mailbox-enabled, a
shadow account along with a linked mailbox is created in the Mailboxes OU and associated
with the user account from the Accounts OU, to provide access to the mailbox.
Under these assumptions, the following examples are considered:
l Creating a user account in the Accounts OU, with the option to create a mailbox
for that user

Active Roles 7.5.4 Solutions Guide


31
ERFM Solution
l Creating a mailbox for an existing account from the Accounts OU
l Making changes to a mailbox-enabled user account in the Accounts OU, with the
changes automatically applied to the shadow account in the Mailboxes OU
l Deprovisioning a mailbox-enabled user account in the Accounts OU, with the
shadow account automatically deprovisioned in the Mailboxes OU

Mailbox creation
This section demonstrates how Exchange Resource Forest Management automates creation
of mailboxes in the Exchange forest for user accounts held in an accounts forest. The
following examples are considered:
l Creating a new user account with a mailbox
l Creating a mailbox for an existing user account

NOTE: Mailboxes can be created only for Users, enabling mailbox for a Contact is
not allowed.

Creating a new user account with a mailbox


You can use the Active Roles Web Interface to create a new user account in the accounts
forest while having Exchange Resource Forest Management create a linked mailbox for that
user account in the Exchange forest.

To create a new user account with a mailbox

1. In the Web Interface, select the Accounts OU, and then choose the New
User command.
2. Fill in the fields on the pages for creating a user account.
3. Select the Create an Exchange mailbox check box, modify the alias if necessary,
and click Browse to select the appropriate mailbox database.

The list in the Select Mailbox Database dialog box contains the mailbox databases
found in the Exchange forest. The list can be restricted by applying an Exchange
Mailbox AutoProvisioning policy to the Mailboxes OU in the Exchange forest.

4. Complete the pages for creating the user account.

As a result, a new shadow account with a linked mailbox is created in the Mailboxes OU.
The user account you have created in the Accounts OU is specified as the linked master
account for that mailbox.

Active Roles 7.5.4 Solutions Guide


32
ERFM Solution
Creating a mailbox for an existing user account
For the purpose of this section, assume that the Accounts OU contains a user account that
does not have an Exchange mailbox. You can create such an account by leaving the Create
an Exchange mailbox check box cleared on the pages for creating user accounts in the
Active Roles Web Interface. Then, you can create a mailbox for that user account by using
the Web Interface as follows.

To create a mailbox for an existing user account

1. In the Web Interface, select the user account in the Accounts OU, and then choose
the Create User Mailbox command.
2. On the Mailbox Settings page, modify the alias if necessary, and click Browse to
select the appropriate mailbox database.

The list in the Select Mailbox Database dialog box contains the mailbox databases
found in the Exchange forest. The list can be restricted by applying an Exchange
Mailbox AutoProvisioning policy to the Mailboxes OU in the Exchange forest.

3. Click Finish.

As a result, a new shadow account with a linked mailbox is created in the Mailboxes OU.
The user account you selected in the Accounts OU is specified as the linked master
account for that mailbox.

Account modification
This section demonstrates how Exchange Resource Forest Management handles the
changes you make to a master account. Making changes to certain properties results in
updating data in both the master account and shadow account, whereas modification of
some other properties only updates data in the shadow account. Therefore, two examples
are considered:
l Making changes to synchronized properties
l Making changes to substituted properties

Making changes to synchronized properties


When you update certain properties of a master account, Exchange Resource Forest
Management updates those properties in both the master account and shadow account.
These properties are referred to as synchronized properties. For details, see Synchronized
properties earlier in this document.

Active Roles 7.5.4 Solutions Guide


33
ERFM Solution
To verify the behavior of synchronized properties

1. In the Web Interface, select a mailbox-enabled user account held in the Accounts
OU, and then choose the General Properties command.
2. On the General tab, make changes to the First name or Last name field.
3. Go to the Organization tab and make changes to the Title, Department, or
Company field.
4. Click Save to apply your changes.
5. Locate the shadow account in the Mailboxes OU—the name of the shadow account is
identical to the name of the master account you have modified in the Accounts OU.
6. Choose the Properties command for the shadow account.
7. Examine data on the General and Organization tabs to verify that the changes you
have made to the master account are also applied to the shadow account.

You can review the updates to the account properties by using the Change History
command on the master account and on the shadow account—the Change History results
provide information on which properties were updated, what changes were made to the
properties, who performed the update, and when.

Making changes to substituted properties


When you view or change certain properties of a master account in an accounts forest,
Exchange Resource Forest Management redirects the retrieval or change request to the
properties of the shadow account in the Exchange forest. Such properties are referred to as
substituted properties.
All the substituted properties that are mandatory for Exchange Resource Forest
Management to work are listed in the Substituted properties section, earlier in this
document. These properties used to store mailbox settings. As mailboxes are located in the
Exchange forest, the updates to such properties need to be performed on the shadow
accounts. Exchange Resource Forest Management implements a mechanism for capturing
updates to substituted properties on the master account side and then applying those
changes on the shadow account side.
You can view or modify some of the substituted properties on the Web Interface pages for
managing Exchange recipient properties of a mailbox-enabled user account in the
Accounts OU.

To view or change Exchange properties on the master account

1. In the Web Interface, select a mailbox-enabled user account held in the Accounts
OU, and then choose the Exchange Properties command.
2. View or change the settings on the following tabs:
l General
l E-mail Addresses
l Mailbox Features

Active Roles 7.5.4 Solutions Guide


34
ERFM Solution
l Mail Flow Settings
l Mailbox Settings
3. Click Save to apply your changes.

Once you have completed these steps, your changes are applied to the shadow account
associated with the master account you were administering. You can verify this by using
the Change History command on the shadow account. The Change History results
indicate that the changes were actually made to the properties of the shadow account, in
the Mailboxes OU.

Account deprovisioning
When you use Active Roles to deprovision a master account, Exchange Resource Forest
Management causes Active Roles to deprovision the shadow accounts as well. In this way,
Active Roles deprovisions the master account’s mailbox. You can verify this behavior by
using the Active Roles Web Interface.

To deprovision a master account


l In the Web Interface, select a mailbox-enabled user account held in the Accounts
OU, and then choose the Deprovision command.

Once you have completed these steps, the Deprovision command is performed not only
on the master account but also on the shadow account. You can verify this by using the
Deprovisioning Results command on the shadow account in the Mailboxes OU.

Membership management delegation


This section shows how Exchange Resource Forest Management facilitates delegation of the
membership management task for distribution lists. To perform the procedures in this
section, you need the following environment:
l Exchange Resource Forest Management configured as described in the Configuration
section earlier in this document.
l A mailbox-enabled user account named John Smith created by Active Roles in the
Accounts OU, so the shadow account for that user account exists in the
Mailboxes OU.
l For the user account John Smith, on a computer in the accounts forest, Microsoft
Outlook configured to connect to the mailbox of that user account.
l A mail-enabled group named DL, representing a certain distribution list, created in
the Mailboxes OU.

The following procedure demonstrates how to delegate the task of managing the DL
membership list to the user account John Smith.

Active Roles 7.5.4 Solutions Guide


35
ERFM Solution
To delegate the membership management task

1. In the Active Roles Web Interface for Administrators, open the Exchange
Properties page for the user account John Smith:
l Locate and select the Accounts OU.
l Select the user account John Smith in the list of objects held in that OU.
l Click the Exchange Properties command.
2. On the Exchange Properties page, go to the Shadow Account tab, and click the
Properties button on that tab.

This opens the General Properties page for the shadow account.

3. On the General Properties page, click the Account tab and note down the pre-
Windows 2000 logon name of the shadow account.
4. In the Web Interface, open the Managed by tab for the DL group:
l Locate and select the Mailboxes OU.
l Click the DL group in the list of objects held in that OU.
l Click the Managed by tab on the General Properties page that appears.
5. On the Managed by tab, click the Change button under the Manager box.

This opens the Select Object dialog box allowing you to specify the manager
account.

6. Use the Select Object dialog box to find and select the shadow account:
l In the Name box, type the name of the shadow account you noted
down in Step 3.
l Click Search.
l Click Search.
l In the list of search results, click the name of the shadow account.
l Click OK to close the Select Object dialog box.
7. On the Managed by tab, click Save; then, select the Manager can update
membership list check box, and click Save again.

Although you have specified the shadow account as the manager of the group, Active Roles
updates security settings on the group so that the master account is authorized to add or
remove members from the group by using conventional tools such as Microsoft Outlook.
If you clear the Manager can update membership list check box, or change the
manager of the group, Active Roles updates the security settings to revoke the former
manager’s right to modify the membership list of the group.
After you have specified the shadow account as the manager of the DL group with the
Manager can update membership list option, force Active Roles to give the manager
rights to the master account by executing the scheduled task ERFM - Mailbox
Management held in the Configuration/Server Configuration/Scheduled
Tasks/Builtin container or wait for a scheduled run of that task. Then, you can verify that

Active Roles 7.5.4 Solutions Guide


36
ERFM Solution
the master account can use Microsoft Outlook to add or remove group members, provided
that Outlook is configured to connect to the mailbox for the John Smith user account:

1. Log on with the name and password of the John Smith account to the computer
where Microsoft Outlook is configured to connect to the linked mailbox of that
user account.
2. Open Outlook and press Ctrl+Shift+B to display the Address Book.
3. In the Address Book, double-click the DL group.
4. On the General tab in the dialog box that appears, click Modify Members to add or
remove members from the DL group.

Mailbox type conversion


This section demonstrates how to perform mailbox type conversion using Active Roles. The
following scenarios are covered:
l Converting a linked mailbox to a user mailbox
l Converting a user mailbox to a linked mailbox

Converting a linked mailbox to a user mailbox


If a given mailbox from the Exchange forest is assigned to a user from an accounts forest
(linked mailbox), then you can use Active Roles to convert that mailbox to the user mailbox
type. After you convert the mailbox, the external user (formerly master account) can no
longer access the mailbox. The mailbox can only be accessed by the user account that is
associated with the mailbox in the Exchange forest (formerly shadow account).

To convert a linked mailbox to a user mailbox

1. Open the Active Roles Web Interface for Administrators, and select the mailbox user
account in the Exchange forest (shadow account).
2. Click the Convert to User Mailbox command.
3. Click OK in the confirmation message box that appears.

After mailbox conversion, the mailbox user account remains disabled. To enable the user
account, set the user password by using the Reset Password command, and then click
the Enable Account command.

Converting a user mailbox to a linked mailbox


For a user mailbox in the Exchange forest, you can use Active Roles to assign that mailbox
to a user from an accounts forest. This configures the mailbox as follows:

Active Roles 7.5.4 Solutions Guide


37
ERFM Solution
l The mailbox type changes to the linked mailbox type.
l The user from the accounts forest becomes the master account for the mailbox.
l The user associated with the mailbox in the Exchange forest becomes the
shadow account.

The domain of the user from the accounts forest must be registered with Active Roles
(managed domain).

To convert a user mailbox to a linked mailbox

1. Open the Active Roles Web Interface for Administrators, and select the user mailbox
in the Exchange forest.
2. Click the Convert to Linked Mailbox command.
3. Click Change under the Linked master account field, and select the user from an
accounts forest.
4. Click Finish.

As a result of these steps, the master account is assigned to the mailbox and the mailbox
user in the Exchange forest becomes the shadow account, linked with the master account.
If the master account is in the scope of the Exchange Resource Forest Management policy,
the properties of the master account and shadow account are synchronized in the same
way as when you configure a mailbox-enabled user in an accounts forest by using the
Exchange Resource Forest Management solution.

Active Roles 7.5.4 Solutions Guide


38
ERFM Solution
3

Configuration Transfer Wizard


Solution

For large enterprises which implement a complex administrative structure using Active
Roles, one of the greatest challenges becomes exporting Active Roles configuration from a
test environment to a production environment.
With Active Roles Configuration Transfer Wizard, you can export Active Roles configuration
objects (such as Access Templates, Managed Units, Policy Objects, Policy Type objects,
etc.) to an XML file and then import them from that file to populate another instance of
Active Roles. The export and import operations provide a way to move configuration
objects from a test environment to a production environment.
This document provides information on how to install and use Configuration Transfer
Wizard.

What's new in version 7.5.4


Version 7.5.4 of Configuration Transfer Wizard adds support for the latest Active Roles
version, 7.5.4. Now you can use Configuration Transfer Wizard to move configuration data
between Active Roles instances of version 6.7 or later, including version 7.5.4.

Solution components
Configuration Transfer Wizard includes the following components, which are installed
during the solution setup:
l Configuration Collection wizard
l Configuration Deployment wizard
l ARSconfig command-line tool

Active Roles 7.5.4 Solutions Guide


39
Configuration Transfer Wizard Solution
Configuration Collection wizard
Configuration Collection Wizard is intended to collect the Active Roles configuration data in
a source environment. During the collection process, the selected Active Roles
configuration objects are packed into an XML file referred to as configuration package.

Configuration Deployment wizard


Configuration Deployment Wizard is designed to deploy a configuration package, earlier
created with the Configuration Collection Wizard, in a destination Active Roles
environment. When deploying the configuration data, the target Active Roles instance is
populated with the configuration objects collected from the source Active Roles instance.

ARSconfig command-line tool


The ARSconfig command-line tool provides a script-based interface that enables
automation of Active Roles configuration transfer. By using the command-line script, you
can create or deploy an Active Roles configuration data package, or roll back changes made
to a target Active Roles configuration during deployment of a configuration package.
For information on how to use the solution components, see Using the solution later in
this document.

Installing the solution


This section explains how to install Configuration Transfer Wizard.

Installation requirements
The solution runs on top of Active Roles, and requires the Active Roles Administration
Service to be deployed in your Active Directory environment prior to deploying the solution.
The following versions of the Active Roles Administration Service are supported:
l 7.0.2
l 7.1
l 7.2
l 7.3
l 7.4.x

Active Roles 7.5.4 Solutions Guide


40
Configuration Transfer Wizard Solution
Before you install Configuration Transfer Wizard, ensure that you have any of following
software components installed on the computer where you plan to install Configuration
Transfer Wizard:
l Active Roles Administration Service
l Active Roles Console (MMC Interface)

Depending on whether you use the solution to collect Active Roles configuration data or to
deploy a configuration package, Configuration Transfer Wizard must be installed on a
computer from which you can connect to the Active Roles Administration Service in the
source or destination environment. If the source and destination environments are
physically separated, the solution must be installed in each environment.

Installation procedure
Assuming default security settings, the Domain Admins rights are sufficient to install
the solution.

To install Configuration Transfer Wizard

1. Start the Installation Wizard by running ConfigurationTransferWizard.msi from


the Active Roles distribution package.
2. Follow the instructions in the Installation Wizard.

Using the solution


This section explains how to use Configuration Transfer Wizard.

General considerations
To use this solution, you must have the necessary security permissions. It is sufficient to be
a member of the Active Roles Admin account, in both the source and destination
environments. The Active Roles Admin account is specified during installation of the
Administration Service and defaults to the Administrators group on the computer running
the Administration Service.
IMPORTANT: Before transferring the Active Roles configuration data, ensure that the
Active Directory Organizational Unit (OU) structure in the destination environment is
identical to the OU structure in the source environment.
These are the general steps required to transfer Active Roles configuration data by using
this solution:

Active Roles 7.5.4 Solutions Guide


41
Configuration Transfer Wizard Solution
1. Collect configuration data from a source Active Roles environment In this
step, you select the Active Roles configuration objects you want the configuration
package to include, and then create a configuration package XML file. This step is
performed in the source environment.
2. Deploy the collected configuration data to a destination Active Roles
environment In this step, the target Active Roles instance is populated with
configuration objects from an earlier created package. This step is performed in the
destination environment.

NOTE: If an object to deploy already exists in the target configuration, then the
properties of the object are updated during the deployment process.

To perform these steps, you can use either the Configuration Collection Wizard and
Configuration Deployment Wizard, or the ARSconfig command-line tool. Both methods
have the same effect and can be used interchangeably, depending on your requirements.
l You can use this solution to transfer Active Roles configuration objects of the
following categories:
l Access Templates and containers that hold Access Templates
l Managed Units and containers that hold Managed Units
l Policy Objects and containers that hold Policy Objects
l Scheduled Task objects and containers that hold such objects
l Application objects and containers that hold such objects
l Script Modules and containers that hold Script Modules
l Virtual attributes
l Access Template Links (edsACE object type)
l Policy Object Links (edsPolicyObjectLink object type)
l Mail Configuration objects (edsMailConfiguration object type)
l Workflow definition objects (edsWorkflowDefinition object type)
l Automation Workflow definition objects (edsAutomationWorkflowDefinition object
type)
l Policy Type objects (edsPolicyType object type)
l Entitlement Profile Specifier objects and containers (edsOneViewSpecifier or
edsOneViewSpecifiersContainer object type) - requires Active Roles 6.7 or later
l Display specifiers and containers that hold display specifiers (displaySpecifier or
edsDisplaySpecifierContainer object type)

The solution cannot be used to transfer configuration objects of the following categories:
l Built-in objects (the objects that have “built-in” as part of the name)
l Objects held in the Configuration/Application Configuration/Web Interface container
(Web Interface configuration data)

If you need to roll back the changes made to the configuration of the target Active Roles
instance, during the package deployment, you can do this by using the command-line tool

Active Roles 7.5.4 Solutions Guide


42
Configuration Transfer Wizard Solution
included with the solution. For step-by-step instructions, see Scenario: Rolling back the
configuration changes later in this document.

About dangling links


When collecting Access Templates and Policy Objects, the solution analyzes their links and
writes the links to the destination package. Every link record includes information about the
directory object and, if applicable, the trustee to which the respective Access Template or
Policy Object is applied. In the configuration package file, this information normally takes
the form of the distinguished name (DN), whereas in the Active Roles environment the links
refer to the objects by security identifier (SID) or globally unique identifier (GUID). The
solution needs DN rather than SID or GUID to identify an object as in a different
environment, the object SID or GUID differs from that in the original environment. By
identifying the link reference objects by DN, the solution enables the delegation and policy
settings to be properly transferred from the source environment to the destination
environment.
To have the link records identify the link reference objects by DN, the solution has to look
up object SID or GUID to object DN. If this process fails for a given link, the link record is
created that identifies the link reference object by SID or GUID. Such a record is referred to
as dangling link.
If any dangling links have been recorded to the destination package, the solution informs of
this condition. Deploying a package that contains dangling links may create links in the
destination environment that refer to non-existent objects. As a result, some delegation
and policy settings configured by deploying the package may not match the settings found
in the source environment from which the package was collected.
The ARSconfig tool provides the danglingLinks parameter that allows you to specify how
you want the deployment process to handle dangling links. For more information, see Using
the ARSconfig command-line tool later in this document.

Using the Collection wizard and


Deployment wizard
To transfer Active Roles configuration, you can collect configuration objects from one Active
Roles environment and then deploy them to another environment in the following way:

1. Create a configuration package file with the Configuration Collection Wizard.


2. Deploy the package with the Configuration Deployment Wizard.

To create a configuration package with the Configuration Collection wizard

1. Start the wizard by running the Configuration Collection Wizard application from
the Start menu or Start page.

Active Roles 7.5.4 Solutions Guide


43
Configuration Transfer Wizard Solution
2. On the Collect Active Roles Configuration Data page, do the following:
a. Click Connect and using the Connect to Administration Service dialog
that opens, select the Administration Service to which you want the
wizard to connect.
b. Under Select configuration objects to package, select the objects you
want to include in the configuration package, and specify whether you want to
collect the child objects of the selected objects.
c. When finished, click Create Package.
3. On the Specify a location for the configuration package page, do the following:
a. Click Browse to specify a location and name for the configuration package file.
b. Under Package description, enter the package description (optionally).
c. To cause the wizard to collect Access Templates associated with selected
objects, leave the Do not collect associated Access Templates check box
cleared. Otherwise, select this check box.
d. To cause the wizard to collect Policy Objects associated with selected objects,
leave the Do not collect associated Policy Objects check box cleared.
Otherwise, select this check box.
4. On the Verify the information you specified page, click Start.

To deploy a configuration package with the Configuration Deployment wizard

1. Start the wizard by running the Configuration Deployment Wizard application


from the Start menu or Start page.
2. On the Deploy Active Roles Configuration Data page, do the following:
a. Click Browse to select the configuration package file.
b. Optionally, select the Ignore errors check box for the wizard to ignore any
errors during the configuration deployment.
c. Click Deploy Package.
3. On the Connect to Administration Service page, select the Administration
Service to which you want the wizard to connect, and then click Next.
4. On the Add Domain Name Mapping page, if names of the managed domains differ
in the test and production environments, add domain name mapping entries, and
then click Next.
5. On the Verify the information you specified page, click Start.

Using the ARSconfig command-line tool


As an alternative to using the graphical user interface tools, you can use the ARSconfig
command-line tool. The ARSconfig tool is the arsconfig.wsf Windows Script File (WSF) that
defines the command line parameters and the required object references.

Active Roles 7.5.4 Solutions Guide


44
Configuration Transfer Wizard Solution
Using the ARSconfig tool requires two files to be pre-configured, before running the script.
These are a file that lists the configuration objects that the package must include, and, if
necessary, a file containing domain mapping entries.

To run the ARSconfig command-line tool


l From a command prompt, run the arsconfig.wsf script, specifying the required type
of task and parameters. The script syntax is described in the section that follows.

Syntax
Cscript arsconfig.wsf [/?] /task:<'collect' | 'deploy' | 'rollback'>
[/selection:"<filename.xml>"] [/package:"<filename.xml>"] [/map:"<filename.csv>"]
[/verbose] [/log:"<filename>"] [/deletelog] [/server:<servername>]
[/login:<username>] [/password:<userpassword>] [/danglingLinks:<'Stop' | 'Skip' |
'Deploy'>] [/ignoreLinks:<'0' | '1' | '2' | '3'>] [/ignoreErrors] [/upgrade]

Parameters
Table 4: Parameters

Parameter Description

task This is a required parameter which defines the type of task you
want to perform by using this script.
Specify one of these parameter values:
l 'collect' - Collects configuration data from the source
Active Roles environment, and creates a configuration
package file.
l 'deploy' - Populates the target Active Roles instance with
objects from a configuration package created earlier by
Configuration Transfer Wizard.
l 'rollback' - Reverts the configuration of the target Active
Roles instance to the state it was in before deployment of
the configuration package.

selection The path and name of the XML file containing a list of the
source configuration objects to be included in the configuration
package.
This parameter is required when you use this script to create a
configuration package. The XML file you specify in this
parameter must be manually created before you run the script.

package The full path to the configuration package XML file.


Add this parameter is you want to specify a custom name and

Active Roles 7.5.4 Solutions Guide


45
Configuration Transfer Wizard Solution
Parameter Description

location for the configuration package file. If you do not specify


this parameter, the script assumes that the installation path,
and the default package file name are used.

map The name of the domain mapping file.


Add this parameter if you want the test domain names to be
replaced with the production domain names, during
configuration package deployment.
You can add this parameter only when you use this script to
deploy a configuration package. The CSV file you specify in this
parameter must be manually created before you run the script.

verbose Enables log trace output.


If this parameter is not specified, then no information is
displayed in the Command Prompt while the script is running.

log Specifies the name of the trace output file. You can also specify
a target location for the log file.
Add this parameter to create a log file with diagnostic
information.

deletelog Deletes the trace output file upon successful completion.


Add this parameter if you want the log file deleted if a task was
completed with no errors.

server The fully qualified domain name of the computer running the
Administration Service to connect to.
If this parameter is not specified, the script attempts a
connection to any available Administration Service.

login The user logon name of the account with which you want to
connect, in the form Domain\UserName, or in the form of a
user principal name.

password Password for the user logon name you specify in the login
parameter.

danglingLinks This parameter takes effect if the task parameter value is set to
'deploy', and specifies whether to deploy Access Template or
Policy Object links, if any found in the package, that refer to
objects which may fail to be resolved in the destination
environment (dangling links). The acceptable parameter values
are:
l 'Stop' - The deployment process is not started if any
dangling links are detected (default setting)

Active Roles 7.5.4 Solutions Guide


46
Configuration Transfer Wizard Solution
Parameter Description
l 'Skip' - The dangling links are not deployed in the destin-
ation environment
l 'Deploy' - Deployment of the dangling links is attempted
based on the data found in the package

ignoreLinks Specifies whether to collect Access Template links and Policy


Object links. This parameter can take any of the following
values:
l '0' - Collect all links (default setting).
l '1' - Do not collect Policy Object links.
l '2' - Do not collect Access Template links.
l '3' - Do not collect Policy Object and Access Template
links.

ignoreErrors If this parameter is specified, the solution ignores any errors


that can be encountered during the configuration deployment.

upgrade If supplied together with /task:'deploy', preserves the existing


links, policy parameters and scheduled task parameters.
Without this parameter, the deployment of a configuration
package replaces the existing links with the links found in the
configuration package, and resets the policy and schedule task
parameters to the default values.

Scenario: Transfer Active Roles configuration


This scenario explains how to use the ARSconfig command-line tool to transfer a set of
configuration objects from a test Active Roles instance to a production instance.
Suppose you need to transfer the following configuration objects from a test Active Roles
instance to a production Active Roles instance:
l The Configuration/Access Templates/Common container, including all child
objects stored in this container.
l The Configuration/Managed Units/Development container, excluding the child
objects stored in this container.
l All child objects stored in the Script Modules/Corporate Policy/Priority Access
container, but excluding the container itself.

Also, assume that the names of the domains managed by the test (source) Active Roles
instance are test1.company.com and test2.company.com, and the two corresponding
domains managed by the production (target) Active Roles instance are
prod1.company.com and prod2.company.com.
To implement this scenario, complete the following steps:

Active Roles 7.5.4 Solutions Guide


47
Configuration Transfer Wizard Solution
1. Create a list of the configuration objects to collect
2. Create configuration data package
3. Add domain mapping
4. Deploy the configuration data package

Step 1: Creating a list of the configuration objects to


package
In this step, you create a list of the configuration objects that you want to collect into the
configuration package, and define how you want to collect their child objects.
To do that, create the selection.xml file, and save that file to the solution installation
folder: <Active Roles installation folder>\Configuration Transfer Wizard\Scripts.
To clarify the file format, consider the following sample file that illustrates how to collect
Access Templates, Managed Units, and Script Modules residing within specified containers:
<?xml version="1.0" encoding="utf-8"?>
<Configuration>
<include DN="CN=Common,CN=Access Templates,CN=Configuration" collectSelf="True"
collectChildren="True"/>
<include DN="CN=Development,CN=Managed Units,CN=Configuration" collectSelf="True"
collectChildren="False"/>
<include DN="CN=Priority Access,CN=Corporate Policy,CN=Script
Modules,CN=Configuration" collectSelf="False" collectChildren="True"/>
</Configuration>

Step 2: Creating configuration data package file


In this step, you use the ARSconfig command-line tool to create a configuration data
package file using the data from the selection.xml file created in Step 1.

To create the configuration data package file


l At a command prompt, navigate to the Configuration Transfer Wizard installation
folder, and enter the following syntax:

Cscript.exe arsconfig.wsf /task:collect /selection:selection.xml


As the result, the package.xml configuration data package file will be created in the
following default location: <Active Roles installation folder>\Configuration Transfer
Wizard\Scripts.

Active Roles 7.5.4 Solutions Guide


48
Configuration Transfer Wizard Solution
Step 3: Configuring domain mapping
If the names of the managed domains are different in the test and production
environments, you must add domain mapping that defines the correspondence between
the domain names. When the configuration package is deployed in the target environment,
the domain names specified as a part of the objects' attributes are replaced with the names
of the production domains, according to the name mapping entries.
In this step, you create the CSV domain name mapping file—mapping.csv, and then
save that file to the solution installation folder: <Active Roles installation
folder>\Configuration Transfer Wizard\Scripts. In this scenario, the mapping.csv file
contains the following lines:
"DC=test1,DC=company,DC=com","DC=prod1,DC=company,DC=com"
"DC=test2,DC=company,DC=com","DC=prod2,DC=company,DC=com"

Step 4: Deploying the configuration data package


In this step, you use the ARSconfig command-line tool to deploy the package.xml
configuration package in the production Active Roles environment. When running the
arsconfig.wsf script, specify the package file to deploy (package.xml), and the domain
name mapping file (mapping.csv) you have created in Step 3.

To deploy the package


l At a command prompt, navigate to the Configuration Transfer Wizard installation
folder, and enter the following syntax:
Cscript.exe arsconfig.wsf /task:deploy /package:package.xml /map:mapping.csv

Scenario: Rolling back the configuration changes


This step may be required if you have encountered any errors when deploying a
configuration package in the production environment. By rolling back changes in the target
configuration, you bring it to the state it was in before the package was deployed. Use the
following instruction to roll back the changes made by the deployment of the package.xml
file described in the scenario outlined above.

To roll back configuration changes


l At the command prompt, navigate to the Configuration Transfer Wizard installation
folder, and enter the following syntax:

Cscript.exe arsconfig.wsf /task:rollback /package:package.xml

Active Roles 7.5.4 Solutions Guide


49
Configuration Transfer Wizard Solution
Known issues
This section provides a list of the currently known issues that customers may experience
with Configuration Transfer Wizard. For each issue, the list includes an ID number, which
identifies the issue, a brief description of the problem, and a workaround, if any exists, for
the problem.

TF00004281

In the target Active Roles configuration, the solution cannot restore the
edsvaDebuggingServer and edsvaDebuggingServerName properties of Script Module
objects: those attributes are always empty.
WORKAROUND
Manually specify those properties with the use of the Active Roles console.

TF00004581

Configuration Deployment Wizard fails to deploy some of Access Templates. The solution
log file contains the error message similar to the following text:
"Error [4710]: Administrative Policy returned an error. The object <Object
DN> not found."
This error occurs if the source configuration contains nested Access Templates.
WORKAROUND
On the Collect Active Roles Configuration Data page of the wizard, select all the
nested Access Templates you want to collect. If you are using ARSconfig, ensure that the
selection file includes the nested Access Templates into the configuration export package.

TF00004585

After transferring a Policy Object that includes the “User Account Relocation
Deprovisioning” policy entry, the “Description” and the “Error message returned by this
policy” text boxes available on the User Account Relocation Policy Properties dialog
box contain invalid target domain name.
WORKAROUND
After deploying the target configuration, manually edit those text elements using the Active
Roles console.

TF00010732

When collecting Script Modules, Configuration Transfer Wizard may not collect the library
Script Modules that are used by the Script Modules being exported. As a result, the
deployment of the exported Script Modules may cause an error condition in the destination
environment.
WORKAROUND
On the Collect Active Roles Configuration Data page of the wizard, select all the library

Active Roles 7.5.4 Solutions Guide


50
Configuration Transfer Wizard Solution
Script Modules that are used by the Script Modules you want to collect. If you are using
ARSconfig, ensure that the selection file includes the library Script Modules into the
configuration export package.

TF00039803

When collecting Display Specifiers, Configuration Transfer Wizard may not collect the
Active Roles virtual attributes for which the Display Specifiers are being exported. As a
result, the deployment of the exported Display Specifiers may cause an error condition in
the destination environment.
WORKAROUND
On the Collect Active Roles Configuration Data page of the wizard, select all the Active
Roles virtual attributes for which the Display Specifiers are being exported. If you are using
ARSConfig, ensure that the selection file includes the Active Roles virtual attributes into the
configuration export package.

TF00050511

In a situation where an object to be exported does not exist in the source environment,
Configuration Transfer Wizard stops the export process. As a result, the configuration
export package may not include all objects that were selected for export.
WORKAROUND
Ensure that all objects you selected for export exist in the source environment.

TF00062463

Configuration Transfer Wizard does not provide the ability to export links that involve pre-
defined or built-in objects, nor does it make possible to export pre-defined or built-in
objects. As a result, you do not have the option to transfer, for example, the links of pre-
defined Access Templates.
WORKAROUND
When transferring a configuration that includes any links of pre-defined or built-in objects,
create the required links manually in the destination environment.

TF00125202

When using the Configuration Collection Wizard or Configuration Deployment Wizard, you
may encounter an error message such as “A generic error occurred in GDI+.”
WORKAROUND
Disregard the error message. Click OK to close the error message box.

TF00130489

When using ARSconfig with the 'rollback' task option, you may encounter an error: “This
script module is in use, and cannot be deleted.” This issue is most likely to occur with a
PowerShell based Script Module containing a library script, and is due to the fact that the
Script Module remains locked for a certain time period after all the Script Modules that use
the library script have been deleted.

Active Roles 7.5.4 Solutions Guide


51
Configuration Transfer Wizard Solution
WORKAROUND
Run ARSconfig with the 'rollback' task option once more, or delete the Script Module
manually, with the use of the Active Roles console.

TF00134074

With the display DPI setting of 'Large size (120 DPI)' you may encounter some minor visual
defects on Configuration Transfer Wizard pages.
WORKAROUND
Use the display DPI setting of 'Normal size (96 DPI)'.

Active Roles 7.5.4 Solutions Guide


52
Configuration Transfer Wizard Solution
4

Active Roles SPML Provider

Active Roles SPML Provider is designed to exchange the user, resource, and service
provisioning information between SPML-enabled enterprise applications and Active
Directory.
Active Roles SPML Provider supports the Service Provisioning Markup Language Version 2
(SPML v2), an open standard approved by the Organization for the Advancement of
Structured Information Standards (OASIS). SPML - is an XML-based provisioning request-
and-response protocol that provides a means of representing provisioning requests and
responses as SPML documents. The use of open standards provides the enterprise
architects and administrators with the flexibility they need when performing user
management and user provisioning in heterogeneous environments.

Features
The key features of Active Roles SPML Provider are as follows:
l Support for two operation modes: SPML Provider can be configured to operate in
proxy mode or in direct access mode. In proxy mode, SPML Provider accesses Active
Directory or Active Directory Lightweight Directory Services (AD LDS, formerly
known as ADAM) through Active Roles used as a proxy service, while in direct access
mode, SPML Provider directly accesses Active Directory or AD LDS.
l Support for equivalent LDAP operations: SPML Provider can perform equivalent
LDAP operations such as addRequest, modifyRequest, deleteRequest, and
lookupRequest.
l Support for Azure AD, AD, and AD LDS data management: SPML Provider
enables SPML-conformant applications to read from and write to Azure AD, Active
Directory (AD), and AD LDS.
l Search Capability support: SPML Provider allows SPML-enabled applications to
search for relevant directory objects based on various search criteria.
l Password Capability support: SPML Provider allows SPML-enabled applications to
perform basic password management tasks such as setting and expiring user
passwords.

Active Roles 7.5.4 Solutions Guide


53
Active Roles SPML Provider
l Suspend Capability support: SPML Provider allows SPML-enabled applications to
effectively enable, disable and deprovision user accounts in Active Directory.
l Flexible Configuration options: There is support for many different configuration
options that enable the administrator to adjust the behavior and optimize the SPML
Provider performance.
l IIS Security Support: SPML Provider supports all IIS security configurations,
including integrated Windows authentication, basic authentication, and basic
authentication over Secure Sockets Layer (SSL).
l Support for using Active Roles controls: In proxy mode, you can send Active
Roles controls to the Active Roles Administration Service with an SPML request to
perform an administrative operation. In your request, you can also define the Active
Roles controls that the Administration Service must return in the SPML response.

Use scenarios
SPML Provider can be used for a variety of purposes. Some common scenarios for using
SPML Provider are as follows:
l Non-Windows applications: The systems running non-Windows applications that
need to communicate with Active Directory can do this through SPML Provider. For
example, with SPML Provider, Unix applications can manage Unix-enabled user
accounts in Active Directory. In proxy mode, SPML Provider allows existing SPML-
compatible provisioning systems, such as SUN Java System Identity Manager and
IBM Tivoli Directory Integrator to take advantage of the functionality of Active Roles.
l Web services: The use of directories in Web services is growing rapidly.
Additionally, XML is becoming the default language for use with Web services. SPML
Provider fills the gap between XML documents and Active Directory services,
enabling applications that must provide or use Web services to communicate with
Active Directory.
l Handheld and portable devices: Data-enabled cell phones or PDAs that need an
access to directory data may not contain a client for the ADSI LDAP Provider but
might be able to use the SPML communication protocol to access Active Directory
over the Internet.
l Firewall access: Certain firewalls cannot pass LDAP traffic because they cannot
audit it, but these firewalls can pass XML. In such cases, applications can use SPML
Provider to communicate with Active Directory across a firewall.

Basic concepts and definitions


Active Roles SPML Provider operates based on the concepts defined in SPML v2. This
section introduces and describes these key concepts and definitions as applied to
SPML Provider.

Active Roles 7.5.4 Solutions Guide


54
Active Roles SPML Provider
A Client (Requesting Authority or Requestor) is any SPML-compliant application that sends
well-formed SPML requests to the Active Roles SPML Provider and receives responses from
it. Clients can include various business applications, such as human resources (HR)
databases or Identity Management systems. There is no direct contact between a client and
the target (Active Roles or an Active Directory server).
Active Roles SPML Provider (Provisioning Service Provider or PSP) is a Web service that
uses the Simple Object Access Protocol (SOAP) over HTTP for communications. SPML
Provider can directly access Active Directory data or communicate with Active Directory
using the Active Roles proxy service. SPML Provider acts as an intermediary between a
client and the target (Active Directory domain controller or Active Roles).
In proxy mode, Active Roles represents the Provisioning Service Target (or Target) that is
available for provisioning actions through SPML Provider. The target has a unique identifier
(targetID) that is maintained by SPML Provider and is used in a request or a response.
AD Objects (Provisioning Service Objects or PSO) represent directory objects that SPML
Provider manages. A client can add, delete, modify, or look up a directory object. Each
object has a unique identifier (PSO ID). In SPML Provider, an object DN is used as a PSO ID.
NOTE: A Requestor, Provisioning Service Provider, Provisioning Service Target, and Provi-
sioning Service Objects are key notions described in the official SPML v2 specification.
For detailed information on the concepts defined in SPML v2, see Section 2 “Concepts” of
the OASIS SPML v2 specification, available for download at http://www.oasis-
open.org/specs/index.php#spmlv2.0.

How SPML Provider works


With SPML Provider, applications can use SPML documents to look up, retrieve and update
directory data in Active Directory, Azure AD, and AD LDS. SPML Provider converts XML
elements and attributes into commands used to make changes to Active Directory and
retrieve data from Active Directory. SPML Provider can also convert the response received
from Active Roles or Active Directory to XML format. These conversions are based on and
are in compliance with the OASIS SPML v2 - DSML v2 Profile specification.
SPML Provider runs as a Web application on a Web server running Microsoft Internet
Information Services (IIS), and uses SOAP over HTTP to transmit and receive directory
requests from client computers.
The SPML Provider environment includes the following components:
l Clients that use SPML v2: These clients are applications that manage directory
objects (for example, user accounts). A client issues SPML requests that describe
operations to be performed on the directory object and send these requests to
SPML Provider.
l SPML Provider: Receives and processes client requests, and returns a response to
the client.
l Active Roles: In proxy mode, this is the endpoint for provisioning requests and the
actual software that manages directory objects.

Active Roles 7.5.4 Solutions Guide


55
Active Roles SPML Provider
l Active Directory, Azure AD, or AD LDS: In proxy mode, SPML Provider can
access Active Directory or Azure AD domains and AD LDS instances that are
registered with Active Roles as managed domains, Azure AD tenants, and managed
AD LDS instances, respectively. In direct access mode, SPML Provider can access the
domain controller or the AD LDS instance defined in the SPML.Config file. For more
information, see “Configuring SPML Provider” later in this document.

The following diagram illustrates the flow of requests and responses through the SPML
Provider environment components:

Figure 2: Flow of requests and responses through the SPML Provider


environment components

As shown in the diagram, the client/SPML Provider communications are based on the
simple request/response protocol.
In proxy mode, SPML Provider works in the following way:

1. A client issues a well-formed SPML request using the SOAP over HTTP protocol. This
request goes to a server running IIS, where it is routed to SPML Provider.
2. SPML Provider examines the request for conformance to the SPML format.
3. If the request complies with the SPML format, the SPML Provider submits the request
to Active Roles. Based on the client request, Active Roles retrieves or modifies data in
Active Directory, Azure AD, or in AD LDS.
4. After performing the requested operation, Active Roles sends the result of the
operation back to SPML Provider.
5. SPML Provider then processes this result data and sends the result of the performed
operation back to the client in the form of an SPML response.

In direct access mode, SPML Provider works in the following way:

1. A client issues a well-formed SPML request using the SOAP over HTTP protocol. This
request goes to a server running IIS, where it is routed to SPML Provider.
2. SPML Provider examines the request for conformance to the SPML format.

Active Roles 7.5.4 Solutions Guide


56
Active Roles SPML Provider
3. If the request conforms to the SPML format, SPML Provider retrieves or modifies the
relevant data in Active Directory or in AD LDS (ADAM).
4. SPML Provider sends the result of the performed operation back to the client in the
form of an SPML response.

If the client request does not conform to the SPML format, the client receives an SPML
response that describes the encountered error.

System requirements
Before installing the Active Roles SPML Provider, ensure your system meets the following
minimum hardware and software requirements.

Hardware requirements
Ensure that the following hardware requirements are met:
l 1 GHz or higher Intel Pentium-compatible CPU.
l At least 1 GB of RAM.
l At least 100 MB of free disk space.

Software requirements
Ensure that the following software requirements are met:
l Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft
Windows Server 2016, or Microsoft Windows Server 2019 operating system.
l Microsoft .NET Framework 4.7.2.
l Microsoft Internet Information Services (IIS). For proxy mode, the IIS server must
be part of an Active Directory forest where Active Roles is deployed.
l For proxy mode, Active Roles Administration Service 7.4 is required.
TIP: If you choose the proxy mode, for performance reasons, we recommend that
you install the Active Roles SPML Provider on the computer running the Active
Roles Administration Service.

NOTE: SPML component cannot be installed on a System with TerminalServer roles and
components enabled.

Active Roles 7.5.4 Solutions Guide


57
Active Roles SPML Provider
Web Server requirements

Windows Server 2012


On a Windows Server 2012 or Windows Server 2012 R2 based computer, ensure that the
Web Server (IIS) sever role is installed, including:
l Web Server/Common HTTP Features/
l Default Document
l HTTP Errors
l Static Content
l HTTP Redirection
l Web Server/Security/
l Request Filtering
l Basic Authentication
l Windows Authentication
l Web Server/Application Development/
l .NET Extensibility 4.7.2
l ASP
l ASP.NET 4.7.2
l ISAPI Extensions
l ISAPI Filters
l Management Tools/IIS 6 Management Compatibility/
l IIS 6 Metabase Compatibility

Windows Server 2016 and Windows Server 2019


On Windows Server 2016 and Windows Server 2019 based computer, ensure that the Web
Server (IIS) sever role is installed, including:
l Web Server/Common HTTP Features/
l Default Document
l HTTP Errors
l Static Content
l HTTP Redirection
l Web Server/Security/
l Request Filtering
l Basic Authentication

Active Roles 7.5.4 Solutions Guide


58
Active Roles SPML Provider
l Windows Authentication
l Web Server/Application Development/
l .NET Extensibility 4.7.2
l ASP
l ASP.NET 4.7.2
l ISAPI Extensions
l ISAPI Filters
l Management Tools/IIS 6 Management Compatibility/
l IIS 6 Metabase Compatibility

Use Server Manager to add the required role, role services, and features.

Feature Delegation
Configure Internet Information Services (IIS) to provide Read/Write delegation for the
following features:
l Handler Mappings
l Modules

Use Feature Delegation in Internet Information Services (IIS) Manager to verify that
these features have delegation set to Read/Write.

Configuring Active Roles SPML Provider


Configuration settings allow the administrator to configure SPML Provider and its schema in
order to adjust the SPML Provider behavior. Administrators can, for example, specify the
required managed objects and attributes in the schema, or choose the type of execution
(disabling or deprovisioning objects) for the Suspend operation.

Configuration settings in SPML.Config


The SPML Provider configuration settings can be found in the SPML.Config file located in the
Web sub-folder of the SPML Provider installation folder. The SPML.Config file contains data
in the XML format. You can open and edit the configuration file with a common text editor
such as Notepad.
NOTE: After you modify configuration settings, the IIS application pool for the SPML
Provider Web site must be restarted in order for the changes to take effect.
The following table describes the XML elements used in the SPML Provider
configuration file.

Active Roles 7.5.4 Solutions Guide


59
Active Roles SPML Provider
Table 5: XML elements used in the SPML Provider configuration file

Element Parent Description


element

service configuration In proxy mode, specifies the name of the computer


running the Active Roles Administration Service. In
direct access mode, specifies the name of the AD
domain controller or AD LDS server. The name of
the AD LDS server must be in the form
<servername:portnumber>.

adsiProvider configuration Specifies the progID of the ADSI Provider. In proxy


mode, the progID is EDMS. In direct access mode,
the progID is LDAP.

schemaFile configuration Contains the name of the file that defines the DSML
Profile schema for SPML Provider. By default, the
file name is SPMLSchema.Config. The schema file
must be located in the same folder as the
SPML.Config file.

defaultMaxSelect search Specifies the maximum number of search results


that SPML Provider can return without page
splitting. The default value is 1000.

pageSize search Specifies the maximum number of search results


per page. The default value is 25.
NOTE: If pageSize is set to 0, SPML Provider
returns search results without page splitting.

class password Contains the LDAP display name of the schema


class of objects on which SPML Provider is expected
to perform the Password Capability-related
operations such as setPassword and
expirePassword.

class suspend Contains the LDAP display name of the schema


class of objects on which SPML Provider is expected
to perform the Suspend Capability-related
operations such as suspend, resume, and active.

suspendAction suspend Possible values: disable or deprovision. The default


value is disable.
If suspendAction is set to disable, SPML Provider
disables the specified user account on the target.
If suspendAction is set to deprovision, SPML
Provider deprovisions the specified user account in
accordance with the deprovisioning policies defined

Active Roles 7.5.4 Solutions Guide


60
Active Roles SPML Provider
Element Parent Description
element

by Active Roles.

checkOutput configuration Possible values: true or false. The default value is


false.
true causes SPML Provider to check the string
attribute values retrieved from the underlying
directory before adding them to a response. If an
attribute value contains illegal characters that could
break the XML parser on the client side, SPML
Provider converts the attribute value to the
base64binary format and then adds the result of
the conversion to the response. Note that this
option may result in performance degradation of
SPML Provider as checking every attribute value is
a resource-intensive operation.
false causes SPML Provider not to check the string
attribute values retrieved from the underlying
directory. An attribute value is added to the
response without any conversion even if the value
contains illegal characters.
NOTE: In accordance with the XML specification,
the legal character range is as follows: #x9 | #xA
| #xD | [#x20-#xD7FF] | [#xE000-#xFFFD] |
[#x10000-#x10FFFF]. With checkOutput set to
true, SPML Provider ensures that attribute values
in a response contain only characters from the
legal character range.

Sample configuration file


The following is an example of the configuration file for SPML Provider configured to
operate in proxy mode. If SPML Provider and the Active Roles Administration service are
installed on the same computer, the default configuration settings look as follows:
<?xml version="1.0"?>
<configuration xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns="urn:quest:names:SPMLProvider">
<service>localhost</service>
<adsiProvider>EDMS</adsiProvider>
<schemaFile>SPMLSchema.Config</schemaFile>
<capabilities>
<search>

Active Roles 7.5.4 Solutions Guide


61
Active Roles SPML Provider
<defaultMaxSelect>1000</defaultMaxSelect>
<pageSize>25</pageSize>
</search>
<password>
<appliesTo>
<class>user</class>
</appliesTo>
</password>
<suspend>
<appliesTo>
<class>user</class>
</appliesTo>
<suspendAction>disable</suspendAction>
</suspend>
</capabilities>
<checkOutput>false</checkOutput>
</configuration>

Extending the SPML Provider schema


The SPML Provider schema defines the XML structure of the objects and attributes that
SPML Provider manages. You can modify the schema to manage new types of objects or
object properties. Thus, you can add the class and attribute definitions to the schema in
order to meet the needs of your organization.
NOTE: In proxy mode, you can add only those object classes and attributes that are valid
according to the Active Roles schema.
The SPML Provider schema is stored in the SPMLSchema.Config file. The
SPMLSchema.Config file is located in the Web sub-folder of the SPML Provider
installation folder.
The schema format corresponds to the DSML Version 2 profile (DSMLv2). For detailed
information on the DSML v2 profile, refer to the OASIS SPML v2 - DSML v2 Profile
specification. The specification describes the use of the DSML protocol as a data model for
SPML- based provisioning and can be accessed from the OASIS Web site at
http://www.oasis-open.org/specs/index.php#spmlv2.0.

Active Roles 7.5.4 Solutions Guide


62
Active Roles SPML Provider
Using Active Roles SPML Provider
To access SPML Provider, use the following URL:
http://<HostName>/ARServerSPML/SPMLProvider.asmx
where the <HostName> stands for the name of the computer where SPML Provider
is installed.
NOTE: The SPML Provider Web service is described by a Web Services Description
Language (WSDL) file. To obtain a WSDL description of SPML Provider, navigate to
http://<HostName>/ARServerSPML/SPMLProvider.asmx?WSDL.

Operation mode
SPML Provider can be configured to operate in:
l Proxy mode In this mode, SPML Provider accesses Active Directory, Azure AD, or
AD LDS using the Active Roles proxy service. In proxy mode, SPML Provider extends
Active Roles. Because SPML Provider uses open standards such as HTTP, XML, and
SOAP, a greater level of interoperability with Active Roles is possible than is available
with the Active Roles ADSI Provider.
l Direct access mode In this mode, SPML Provider directly accesses Active
Directory, Azure AD, or AD LDS.

In proxy mode, SPML Provider can manage objects in Active Directory domains and AD LDS
instances that are registered with Active Roles as managed domains and managed AD LDS
instances, respectively. In direct access mode, SPML Provider can manage only objects in
the domain or AD LDS instance to which SPML Provider is connected using the configuration
setting such as the domain controller or AD LDS server.

TIP: To take advantages of the powerful functionality of Active Roles, we recommend


that you use proxy mode whenever possible

Support for Active Roles controls


Active Roles implements special parameters called Active Roles controls (hereafter
controls). The controls allow you to customize request processing.
In proxy mode, SPML Provider clients can send controls to the Active Roles Administration
Service with an SPML request to perform an administrative operation. The Administration
Service can process the controls. On the other hand, the Administration Service can return
its own control to the SPML Provider client, and then the client can process that control. The
controls a client sends to the Administration Service are referred to as InControls whereas
the controls the Administration Service returns to the client are referred to as OutControls.
This section covers the following subjects:

Active Roles 7.5.4 Solutions Guide


63
Active Roles SPML Provider
l Sending the InControl-type controls to the Active Roles Administration Service with
an SPML request.
l Specifying a set of the OutControl-type controls that the Active Roles Administration
Service will return with an SPML response.

For more information about Active Roles controls and for the list of available built-in
controls, see Active Roles SDK.

IMPORTANT: All elements described in this section must be defined at the beginning
of your SPML request. For a sample of use, see later in this document.

Sending controls to the Active Roles


Administration Service
This section covers the controls and control XML elements that your SPML request must
include to send controls to the Active Roles Administration Service.
Element name: controls
Element description: Specifies a collection of InControl-type controls to send to
Administration Service.
Child elements: control
Attributes:

Table 6: Controls attributes

attribute name attribute description

xmlns Declares the namespase for all child elements of the controls
element. This attribute must be set to quest:ars:SPML:2:0

Element name: control


Element description: Describes a control to send to the Administration Service.
Parent elements: controls
Child elements: None
Attributes:

Table 7: Control attributes

attribute name attribute description

name Specifies the name of the control.

The control value in the control element body must be specified as follows:
<control name=%control name%>%control value%</control>
To send an empty control, use the following syntax:

Active Roles 7.5.4 Solutions Guide


64
Active Roles SPML Provider
<control name=%control name% />

Specifying controls to return to the SPML


Provider client
This section covers the controlsForOutput and control XML elements that your SPML
request must include to specify a set of controls to return to the SPML Provider client.
Element name: controlsForOutput
Element description: Specifies a collection of OutControl-type controls to return to
SPML client.
Child clements: control
Attributes:

Table 8: Attributes for controlsForOutput

attribute name attribute description

xmlns Declares the namespase for all child elements of the controls
element. This attribute must be set to quest:ars:SPML:2:0

Element name: control


Element description: Describes a control to return to SPML Provider client with an
SPML response.
Parent elements: controlsForOutput
Child elements: None
Attributes:

Table 9: Attributes for control

attribute name attribute description

name Specifies the name of the control.

The control elements used to specify controls to return with SPML response must be
defined as follows:
<control name=%control name% />

Sample SPML request


This section provides a sample SPML request and the SPML response that illustrate how to
use Active Roles controls in your SPML requests.

Active Roles 7.5.4 Solutions Guide


65
Active Roles SPML Provider
This sample shows how an SPML Provider client can send a request to modify the specified
user object. With this request, the client sends the AllowApproval built-in control set to
Confirm, and the CustomControl control set to MyCustomValue. The request also contains the
controlsForOutput element, which specifies that Active Roles Administration service will
return values of the OperationStatus and CustomControl controls in the SPML response.
TIP: For more information about the use of the AllowApproval and OperationStatus
controls, refer to the Active Roles SDK.
NOTE: You need to modify the sample SPML request in order to adjust it to your envir-
onment. Before using this sample, set the ID attribute of the psoID element to the distin-
guished name of the user account you want to modify.

SPML request
<?xml version="1.0"?>
<soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:xsd="http://www.w3.org/2001/XMLSchema"
xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/">
<soap:Body>
<spml:modifyRequest xmlns:spml="urn:oasis:names:tc:SPML:2:0">
<controls xmlns="quest:ars:SPML:2:0">
<control name="AllowApproval">Confirm</control>
<control name="CustomControl">MyCustomValue</control>
</controls>
<controlsForOutput xmlns="quest:ars:SPML:2:0">
<control name="OperationStatus"/>
<control name="CustomControl"/>
</controlsForOutput>
<spml:psoID ID="CN=JDOE,OU=Users,DC=mycompany,DC=com"/>
<spml:modification>
<modification name="description" operation="replace"
xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value>New description</value>
</modification>
</spml:modification>
</spml:modifyRequest>
</soap:Body>
</soap:Envelope>

Active Roles 7.5.4 Solutions Guide


66
Active Roles SPML Provider
SPML response
<?xml version="1.0" encoding="UTF-16"?>
<soap:Envelope xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:xsd="http://www.w3.org/2001/XMLSchema">
<soap:Body>
<modifyResponse status="success" xmlns="urn:oasis:names:tc:SPML:2:0">
<controls xmlns="quest:ars:SPML:2:0">
<control name="OperationStatus">Completed</control>
<control name="CustomControl">ReturnedValue</control>
</controls>
<pso>
<psoID ID="CN=JDOE,OU=Users,DC=mycompany,DC=com"/>
<data>
<attr name="cn" xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value xsi:type="xsd:string">Admin1</value>
</attr>
<attr name="objectClass" xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value xsi:type="xsd:string">top</value>
<value xsi:type="xsd:string">person</value>
<value xsi:type="xsd:string">organizationalPerson</value>
<value xsi:type="xsd:string">user</value>
</attr>
<attr name="objectCategory" xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value
xsi:type="xsd:string">CN=Person,CN=Schema,CN=Configuration,DC=dom,DC=lab,DC=local<
/value>
</attr>
<attr name="objectGUID" xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value xsi:type="xsd:base64Binary">Aodvua6TAE+Ja9O3vnRntg==</value>
</attr>
<attr name="description" xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value xsi:type="xsd:string">New description</value>
</attr>
</data>
</pso>

Active Roles 7.5.4 Solutions Guide


67
Active Roles SPML Provider
</modifyResponse>
</soap:Body>
</soap:Envelope>

Supported Azure Features


l Active Roles 7.4 SPML Provider supports Azure user, group, and contact creation.
NOTE: You must complete Azure AD configuration, before using SPML for user,
group, and contact creation in Azure AD. For more information, see Azure AD and
Office 365 Management Administrator Guide.

Sample SPML request for Azure user, group, and contact creation

Sample SPML request for Azure User Creation


<?xml version="1.0"?>
<soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:xsd="http://www.w3.org/2001/XMLSchema"
xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/">
<soap:Body>
<addRequest xmlns="urn:oasis:names:tc:SPML:2:0" returnData="everything">
<containerID ID="OU=AzureOU, DC=Sample,DC=local,DC=com"/>
<data>
<attr name="cn" xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value>AzureUser</value>
</attr>
<attr name="description" xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value>Azure test user</value>
</attr>
<attr name="sAMAccountName" xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value>AzureUser</value>
</attr>
<attr name="objectClass" xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value>user</value>
</attr>
<attr name="mail" xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value>[email protected]</value>
</attr>

Active Roles 7.5.4 Solutions Guide


68
Active Roles SPML Provider
<attr name="otherHomePhone" xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value>12135555555</value>
<value>12134444444</value>
</attr>
<attr name="edsaPassword" xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value>P@ssw0rd123</value>
</attr>
<attr name="edsaAccountIsDisabled" xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value>FALSE</value>
</attr>
<attr name="userPrincipalName" xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value>[email protected]</value>
</attr>
<attr name="edsvaAzureOffice365Enabled" xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value>TRUE</value>
</attr>
<attr name="edsaAzureUserPrincipalName" xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value>[email protected]</value>
</attr>
<attr name="edsaAzureUserAccountEnabled" xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value>TRUE</value>
</attr>
<attr name="edsaAzureUserDisplayName" xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value>AzureUser</value>
</attr>

</data>
</addRequest>
</soap:Body>
</soap:Envelope>
Sample SPML request for Azure Group Creation.
<?xml version="1.0"?>
<soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:xsd="http://www.w3.org/2001/XMLSchema"
xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/">
<soap:Body>

Active Roles 7.5.4 Solutions Guide


69
Active Roles SPML Provider
<addRequest xmlns="urn:oasis:names:tc:SPML:2:0" returnData="everything">
<psoID ID="CN=GroupName,OU=AzureOU,DC=Sample,DC=local,DC=com"/>
<data>
<attr name="objectClass" xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value>group</value>
</attr>
<attr name="description" xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value>My test group</value>
</attr>
<attr name="mailEnabled" xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value>false</value>
</attr>
<attr name="mail" xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value> [email protected]</value>
</attr>
<attr name="mailNickName" xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value> GroupName</value>
</attr>
<attr name="edsvaAzureOffice365Enabled" xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value>TRUE</value>
</attr>
<attr name="edsaAzureGroupDisplayName" xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value> GroupName</value>
</attr>
<attr name="edsaEstablishGroupEmail" xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value>false</value>
</attr>
<attr name="edsaAzureGroupType" xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value>-2147483646</value>
</attr>
</data>
</addRequest>
</soap:Body>
</soap:Envelope>
Sample SPML request for Azure Contact Creation
<?xml version="1.0"?>

Active Roles 7.5.4 Solutions Guide


70
Active Roles SPML Provider
<soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:xsd="http://www.w3.org/2001/XMLSchema"
xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/">
<soap:Body>
<addRequest xmlns="urn:oasis:names:tc:SPML:2:0" returnData="everything">
<containerID ID="OU=AzureOU,DC=Sample,DC=local,DC=com"/>
<data>
<attr name="cn" xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value>AzureContact</value>
</attr>
<attr name="description" xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value>AzureContact</value>
</attr>
<attr name="objectClass" xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value>Contact</value>
</attr>
<attr name="edsvaAzureOffice365Enabled" xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value>TRUE</value>
</attr>
<attr name="edsaAzureContactEmail" xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value>[email protected]</value>
</attr>
</data>
</addRequest>
</soap:Body>
</soap:Envelope>

Supported operations
SPML Provider implements the SPML v2 core protocol and supports core operations that are
required for conformance to the official SPML v2 specification. The following table lists the
core operations supported by SPML Provider.

Active Roles 7.5.4 Solutions Guide


71
Active Roles SPML Provider
Table 10: Core operations supported by SPML Provider

Operation Description

listTargets Lists targets available for provisioning through SPML Provider and
the SPML Provider's supported set of capabilities for targets.

add Creates a new object on the target.

modify Changes the specified object on the target.

lookup Obtains the XML that represents the specified object on the target.

delete Removes the specified object from the target.

In addition to core operations required for conformance to the SPML v2 specification, SPML
Provider supports a set of optional operations (Capabilities) that are functionally related.
The following tables list the Capabilities supported by SPML Provider.
Search capability

Table 11: Capabilities supported by SPML Provider

Operation Description

search Obtains every object that matches the specified query.

iterate Obtains the next set of objects from the result set selected for a
search operation.

closeIterator Informs SPML Provider that the client no longer intends to iterate
the search result.

Suspend capability

Table 12: Suspend capability

Operation Description

suspend Disables/deprovisions the specified object on the target.

resume Re-enables the specified object on the target.

active Checks whether the specified object on the target has been
suspended.

Password Capability

Table 13: Password capability

Operation Description

setPassword Specifies a new password for a user account.

expirePassword Marks as invalid the current password for a user account.

Active Roles 7.5.4 Solutions Guide


72
Active Roles SPML Provider
For detailed information on the SPML v2 operations, refer to the “Operations” section in the
official SPML v2 specification, available for download at http://www.oasis-
open.org/specs/index.php#spmlv2.0.

Samples of use
SPML Provider implements the SPML v2 core protocol and supports the DSML v2 Profile for
SPML operations. SPML Provider comes with a sample client that includes examples
illustrating how to construct SOAP messages that contain SPML payloads to perform
common directory operations.

To work with the examples in the SPML Provider sample client

1. From the Start menu on the computer on which SPML Provider is installed, select
Active Roles SPML Provider to open the home page of the sample client in your
Web browser.
2. On the Samples of Use home page, under How do I, click the example you
want to examine.

For instance, you might click Create new user to view, modify, and perform the
SPML v2 request that creates a user object.

3. On the page that opens, in the SPMLv2 request box, view the SOAP message that
will be sent to SPML Provider.

You may need to modify the SOAP message in order to adjust it to your environment.
Thus, with the Create new user example, you have to set the ID attribute of the
<ContainerID> element to the distinguished name (DN) of the container where you
want to create a new user.

4. Click the Send Request button to send the SOAP message to SPML Provider.
5. In the SPMLv2 response box, view the SOAP message returned by SPML Provider in
response to your request.
6. To examine another example, return to the home page, and then click the
desired example.

Configuration settings in sample.config


Support for configuration options enables administrators to set the SPML Provider sample
client configuration in order to test the SPML Provider functionality under actual conditions.
Administrators can, for example, specify the desired settings for the sample container
object (OU) that will be used in sample SPML v.2 operations.
The configuration settings of the SPML Provider sample client can be found in the
sample.config file located in the Samples sub-folder of the SPML Provider
installation folder.

Active Roles 7.5.4 Solutions Guide


73
Active Roles SPML Provider
The sample.config file contains data in the XML format. You can open and edit the
configuration file with a common text editor such as Notepad. The default configuration
settings in the sample.config file look as follows:
<samples>
<server>localhost</server>
<url>ARServerSPML/spmlprovider.asmx</url>
<sampleContainerName>OU=MyOU,DC=Company,DC=com</sampleContainerName>
</samples>
The following table provides reference information for XML elements used in the
sample.config. file.

Table 14: XML elements used in the sample.config. file

Element Parent Description


element

server samples Specifies the name of the computer running


SPML Provider.

url samples Specifies Web address of SPML Provider. The


default address is
ARServerSPML/spmlprovider.asmx.

sampleContainerName samples Specifies the distinguished name of the


container (OU) used in the sample SPML v.2
requests.

Core Operation samples


The following table lists all examples included in the Core Operation samples.

Table 15: Core operation samples

Operation Description

List targets available for This example illustrates how to retrieve the targets
provisioning with SPML available for provisioning with SPML Provider.
Provider
To do this, SPML Provider performs the listTargets
operation.
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP
elements enclose the SPML payload.
l The <listTargetsRequest> element asks SPML

Active Roles 7.5.4 Solutions Guide


74
Active Roles SPML Provider
Operation Description

Provider to declare the set of targets that SPML


Provider exposes for provisioning operations.

The response lists the supported targets, including the


schema definitions for each target and the set of
capabilities that SPML Provider supports for each target.
The contents of the <listTargetsResponse> element
conform to the OASIS SPML v2 specification.

Create new user These examples illustrate how to create a user account
object in two operation modes.
Create new user (using
direct access mode) To create a new object, SPML Provider performs the add
operation.
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP
elements enclose the SPML payload.
l The <addRequest> element asks SPML Provider to
create a new object.
l The <containerID> element specifies the distin-
guished name of the container in which to create the
new object.
l The <data> element encloses the elements that
specify attribute values on the new object. Thus, in
accordance with the objectClass attribute value,
SPML Provider is requested to create a user account.

The operation response indicates whether the user account


is successfully created.
Note that in direct access mode, to provision a user
account, you should complete the following steps:
l Issue a request to create a new user account (see
above).
l Issue a request to set the user password (see “Set
user password” in “Password capability samples,”
later in this document).
l Issue a request to enable the user account (see
“Resume user account” in "Suspend capability
samples,” later in this document).

Create new user (approval This example illustrates how to create a user account if this
aware) operation is subject to approval by designated approvers.
For more information about approval activities and
workflows, refer to Active Roles Help and Active Roles SDK.

Active Roles 7.5.4 Solutions Guide


75
Active Roles SPML Provider
Operation Description

If the creation of user is subject to approval, to perform the


operation, your SPML request must contain the
AllowApproval built-in control. For information about how
to use controls in SPML requests, see Support for Active
Roles controls earlier in this document.
To create a new object, SPML Provider performs the add
operation.
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP
elements enclose the SPML payload.
l The <addRequest> element asks SPML Provider to
create a new object.
l The <controls> element includes the child element
<control> that sets the AllowApproval control to the
Confirm value.
l The <controlsForOutput> element includes the child
element <control>, which specifies that the
OperationStatus control will be returned with the
SPML response.
l The <containerID> element specifies the distin-
guished name of the container in which to create the
new object.
l The <data> element encloses the elements that
specify attribute values on the new object. Thus, in
accordance with the objectClass attribute value,
SPML Provider is requested to create a user account.

The operation response contains the OperationStatus


control value that indicates the creation operation status.
For example, if the user creation operation is subject to
approval, the OperationStatus control returns the Pending
value. In this case, the operation is waiting for approval by
designated approvers. For more information about possible
values of the OperationStatus control, see Active Roles
SDK.

Create a user whose logon This example illustrates an attempt to create a new user
name is not in compliance account whose logon name does not conform to the Active
with Active Roles policies Roles policies.
Because the user logon name does not conform to the
Active Roles policies, the creation operation fails and the
operation response includes an error message returned by

Active Roles 7.5.4 Solutions Guide


76
Active Roles SPML Provider
Operation Description

Active Roles. For example, an attempt to set the


sAMAccountName attribute to a string of more than 20
characters causes the user creation operation to fail, with
the response containing a message that provides some
details on the error condition.

Create new group This example illustrates how to create the group object
SPMLGroup in the mycompany.com domain.
To create a new object, SPML Provider performs the add
operation.
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP
elements enclose the SPML payload.
l The <addRequest> element asks SPML Provider to
create a new object.
l The <psoID> element specifies the distinguished
name of the object to be created.
l The <data> element encloses the elements that
specify attribute values on the new object. Thus, in
accordance with the objectClass attribute value,
SPML Provider is requested to create a group object.

Modify user attributes This example illustrates how to modify the description
attribute of the John Smith user object in the
mycompany.com domain.
To modify the object attribute, SPML Provider performs the
modify operation.
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP
elements enclose the SPML payload.
l The <modifyRequest> element asks SPML Provider to
make changes to a specified object.
l The <psoID> element specifies the distinguished
name of the user account to be modified.
l The <modification> element specifies the type of
change as replace, causing the new values to replace
the existing attribute values.
l The <data> element encloses the elements that
specify the new attribute values.

Modify Shared mailbox user Modify or replace the

Active Roles 7.5.4 Solutions Guide


77
Active Roles SPML Provider
Operation Description

permissions edsaUserMailboxSecurityDescriptorSddl attribute of


the Shared mailbox object.
To modify the object attribute, SPML Provider performs the
modify operation.
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP
elements enclose the SPML payload.
l The <modifyRequest> element asks SPML Provider to
make changes to a specified object.
l The <psoID> element specifies the distinguished
name of the user account to be modified.
l The <modification> element specifies the type of
change as replace, causing the new values to replace
the existing attribute values.
l The <data> element encloses the elements that
specify the new attribute values, in SDDL format
along with the SID of the user specified.

For example, see Sample request to modify Shared mailbox


user permissions.

Add user to group This example illustrates how to add the John Smith user
account to the SPMLGroup group object in the
mycompany.com domain.
To do this, SPML Provider preforms the modify operation.
l The request message includes the following XML
elements:
l The <soap:Envelope> and <soap:Body> SOAP
elements enclose the SPML payload.
l The <modifyRequest> element asks SPML Provider to
make changes to a specified object.
l The <psoID> element specifies the distinguished
name of the group object to be modified.
l The <modification> element specifies the type of
change as add, causing the new values to be
appended to the existing attribute values.
l The <data> element encloses the elements that
specify the distinguished name of the user account to
be appended to the existing values of the member
attribute.

Active Roles 7.5.4 Solutions Guide


78
Active Roles SPML Provider
Operation Description

Look up user attributes This example illustrates how to get the XML representation
of the John Smith userin the mycompany.com domain.
To get the XML representation of an object, SPML Provider
performs the lookup operation.
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP
elements enclose the SPML payload.
l The <lookupRequest> element asks SPML Provider to
return the XML document that represents a specified
object.
l The <psoID> element specifies the distinguished
name of the object.

The response contains the object identifier, the XML


representation of the object and its attributes, and
information about SPML Provider capabilities that are
supported on the object (the capability-specific data that is
associated with the object).

Delete user This example illustrates how to delete the John Smith
user account.
To do this, SPML Provider performs the delete operation.
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP
elements enclose the SPML payload.
l The <deleteRequest> element asks SPML Provider to
delete a specified object.
l The <psoID> element specifies the distinguished
name of the user account to delete.

Delete group This example illustrates how to delete the SPMLGroup


group object in the mycompany.com domain.
To do this, SPML Provider performs the delete operation.
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP
elements enclose the SPML payload.
l The <deleteRequest> element asks SPML Provider to
delete a specified object.
l The <psoID> element specifies the distinguished
name of the group object to delete.

Active Roles 7.5.4 Solutions Guide


79
Active Roles SPML Provider
Sample request to modify Shared mailbox user
permissions
This section provides a sample request that illustrate how to use Active Roles controls in
your SPML requests to modify Shared mailbox user permissions.
Sample request to modify Shared mailbox user permissions
<?xml version="1.0"?>
<soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:xsd="http://www.w3.org/2001/XMLSchema"
xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/">
<soap:Body>
<spml:modifyRequest xmlns:spml="urn:oasis:names:tc:SPML:2:0">
<spml:psoID ID="CN=shmb1,OU=NOV_OU,DC=ars,DC=cork,DC=lab,DC=local"/>
<spml:modification>
<modification name="edsaUserMailboxSecurityDescriptorSddl" operation="replace"
xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value>O:PSG:PSD:AI(A;CI;RC;;;S-1-5-21-2064067869-2662360268-1970296196-3772)
(A;CI;RC;;;S-1-5-21-2064067869-2662360268-1970296196-3773)
</value>
</modification>
</spml:modification>
</spml:modifyRequest>
</soap:Body>
</soap:Envelope>

Capability samples
The following tables list all examples included in the Capability samples, grouped by
Capability.

Search Capability samples

Table 16: Search Capability samples

Operation Description

Perform one-level search This example illustrates how to obtain a list of the child
objects (direct descendants) of the Active Directory

Active Roles 7.5.4 Solutions Guide


80
Active Roles SPML Provider
Operation Description

container object. In proxy mode, you can use this example


to list the domains that are registered with Active Roles
(managed domains).
To do this, SPML Provider performs the search operation.
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP elements
enclose the SPML payload.
l The <searchRequest> element asks SPML Provider to
perform a search and return the identifiers of the
objects found.
l The <query> element determines that SPML Provider
is to perform a one-level search (that is, to search
only direct descendants of the object specified by
<basePsoID>).
l The <basePsoID> element specifies the distinguished
name of the container object to search.

The response contains the identifiers (distinguished names)


of the objects residing in the container object specified by
the <basePsoID> element.

Perform subtree search This example illustrates how to obtain a list of objects that
reside below the Active Directory object in the directory
tree. You can use this example to list the objects that reside
in a given domain.
To do this, SPML Provider performs the search operation.
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP elements
enclose the SPML payload.
l The <searchRequest> element asks SPML Provider to
perform a search and return the identifiers of the
objects found.
l The <query> element determines that SPML Provider
is to perform a subtree search (that is, to search any
direct or indirect descendant of the object specified by
<basePsoID>).
l The <basePsoID> element specifies the distinguished
name of the container object to search. For instance,
this could be the distinguished name of a domain that
is registered with Active Roles (managed domain).

The response contains the identifiers (distinguished names)

Active Roles 7.5.4 Solutions Guide


81
Active Roles SPML Provider
Operation Description

of the objects that reside in the directory tree below the


container object specified by the <basePsoID> element.

Perform base search This example illustrates how to obtain an XML


representation of the specific object.
To do this, SPML Provider performs the search operation.
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP elements
enclose the SPML payload.
l The <searchRequest> element asks SPML Provider to
perform a search and return the XML representation
of the object found.
l The <query> element determines that SPML Provider
is to perform a base search (that is, to search only the
object identified by <basePsoID>).
l The <basePsoID> element specifies the distinguished
name of the object to search. For instance, this could
be the distinguished name of a user account.

The response contains the identifier of the object and the


XML representation of the object (as defined in the schema
of the target).

Iterate search results This example illustrates how to obtain the next set of
objects from the result set that SPML Provider selected for a
search operation.
In this case, SPML Provider performs the iterate operation.
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP elements
enclose the SPML payload.
l The <iterateRequest> element asks SPML Provider to
return additional objects that matched a previous
search request but that the Provider has not yet
returned to the client.
l The <iterator> element supplies the iterator ID found
either in the original search response or in a
subsequent iterate response.

Stop iterating search This example illustrates how to tell SPML Provider that the
results client has no further need for the search results that a
specific iterator represents.
In this case, SPML Provider performs the closeIterator

Active Roles 7.5.4 Solutions Guide


82
Active Roles SPML Provider
Operation Description

operation.
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP elements
enclose the SPML payload.
l The <closeIteratorRequest> element tells SPML
Provider that the client no longer intends to iterate
search results.
l The <iterator> element specifies the ID of the
iterator to close. This could be the iterator ID found in
the original search response or in a subsequent
iterate response.

Find inactive users This example illustrates how to get a list of inactive
(disabled or deprovisioned) user accounts found within a
specified container.
To do this, SPML Provider performs the search operation.
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP elements
enclose the SPML payload.
l The <searchRequest> element asks SPML Provider to
perform a search and return the identifiers of the
objects found.
l The <query> element determines SPML Provider is to
perform a subtree search.
l The <basePsoID> element specifies the distinguished
name of the container object to search. For instance,
this could be the distinguished name of a certain
organizational unit.
l The <filter> element encloses the elements that
direct SPML Provider to search for inactive user
accounts. Thus, the <equalityMatch> elements are
configured so as to limit the search to user accounts;
the <isActive> element combined with the <not>
element causes SPML Provider to select the user
accounts that are inactive.
l The response contains the identifiers (distinguished
names) of the inactive user accounts that exist in the
directory tree below the container object specified by
the <basePsoID> element.

Perform complex search This example illustrates how to have SPML Provider find all

Active Roles 7.5.4 Solutions Guide


83
Active Roles SPML Provider
Operation Description

objects that meet certain search criteria and return the


values of certain attributes of the objects found.
In this case, SPML Provider performs the search operation.
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP elements
enclose the SPML payload.
l The <searchRequest> element asks SPML Provider to
perform a search and return the identifiers and
attribute values of the objects found.
l The <query> element determines the scope of the
search.
l The <basePsoID> element specifies the distinguished
name of the container object to search. For instance,
this could be the distinguished name of a certain
organizational unit.
l The <filter> element encloses the elements that
specify the search criteria.
l The <attributes> element specifies the object attrib-
utes to be included in the response.

The response contains the identifiers (distinguished names)


of the objects found and, for each object, the values of the
attributes specified by the <attributes> element in the
search request.

Find only security groups This example illustrates how to obtain a list of security
groups found in a specified container.
In this case, SPML Provider performs the search operation.
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP elements
enclose the SPML payload.
l The <searchRequest> element asks SPML Provider to
perform a search and return the identifiers of the
objects found.
l The <query> element determines that SPML Provider
is to perform a subtree search.
l The <basePsoID> element specifies the distinguished
name of the container object to search. For instance,
this could be the distinguished name of a certain
organizational unit.

Active Roles 7.5.4 Solutions Guide


84
Active Roles SPML Provider
Operation Description
l The <filter> element encloses the elements that
direct SPML Provider to search for security groups.
Thus, the <equalityMatch> elements are configured
so as to limit the search to group objects; the
<extensibleMatch> element specifies a matching rule
that is equivalent to the LDAP filter
(groupType:1.2.840.113556.1.4.803:=2147483648)
where 2147483648 is the decimal equivalent of the
ADS_GROUP_TYPE_SECURITY_ENABLED flag (0x80000000).

The response contains the identifiers (distinguished names)


of the security groups that exist in the directory tree below
the container object specified by the <basePsoID> element.

Password Capability samples

Table 17: Password capability samples

Operation Description

Set user password This example illustrates how to set a new password for the
specific user account.
To set a new password, SPML Provider performs the
setPassword operation.
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP elements
enclose the SPML payload.
l The <setPasswordRequest> element asks SPML
Provider to change to a specified value the password
that is associated with a certain user account.
l The <psoID> element specifies the distinguished name
of the user account.
l The <password> element specifies the new password
to assign to the user account.

Expire user password This example illustrates how to force a given user to change
the password at next logon.
To do this, SPML Provider performs the expirePassword
operation.
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP elements
enclose the SPML payload.

Active Roles 7.5.4 Solutions Guide


85
Active Roles SPML Provider
Operation Description
l The <expirePasswordRequest> element asks SPML
Provider to mark expired the current password that is
associated with a certain user account. The
remainingLogins attribute is set to 1 so as to disallow
grace logons once the expirePassword operation is
completed, forcing the user to change the password
at next logon.
l The <psoID> element specifies the distinguished name
of the user account.

Suspend Capability samples

Table 18: Suspend capability samples

Operation Description

Suspend user account This example illustrates how to either disable or deprovision
a specified user account, depending on the SPML Provider
configuration (see the description of the <suspendAction>
element in the “Configuring SPML Provider” section earlier
in this document).
To do this, SPML Provider performs the suspend operation.
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP elements
enclose the SPML payload.
l The <suspendRequest> element asks SPML Provider to
perform the suspend action on a certain user account
(either disable or deprovision, depending on the
configuration of SPML Provider).
l The <psoID> element specifies the distinguished name
of the user account to suspend.

Resume user account This example illustrates how to enable a disabled user
account. This operation requires that the suspend action be
set to disable in the SPML Provider configuration file (see
the description of the <suspendAction> element in the
“Configuring SPML Provider” section earlier in this
document).
In this case, SPML Provider performs the resume operation
in order to enable a disabled user account.
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP elements
enclose the SPML payload.

Active Roles 7.5.4 Solutions Guide


86
Active Roles SPML Provider
Operation Description
l The <resumeRequest> element asks SPML Provider to
re-enable a user account that has been disabled.
l The <psoID> element specifies the distinguished name
of the user account to re-enable.

Check whether user is This example illustrates how to determine whether a


active specified user account is active, that is, has not been
suspended. A user account is considered to be suspended if
the suspend action was performed on that account. The
suspend action can be either disable or deprovision,
depending on the SPML Provider configuration (see the
description of the <suspendAction> element in the
“Configuring SPML Provider” section earlier in this
document).
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP elements
enclose the SPML payload.
l The <activeRequest> element asks SPML Provider to
check whether the suspend action has been
performed on a given user account (either disable or
deprovision, depending on the SPML Provider config-
uration).
l The <psoID> element specifies the distinguished name
of the user account to check.

The <activeResponse> element in the response message has


the active attribute that indicates whether the specified user
account is suspended. If the user account is suspended, the
active attribute is set to false. Otherwise, the active
attribute is set to true.

Active Roles SPML Provider terminology


Direct Access Mode

In this mode, SPML Provider directly connects to the specified domain or AD LDS instance.

Capabilities

A set of optional, functionally related operations defined in SPML v2.

Active Roles 7.5.4 Solutions Guide


87
Active Roles SPML Provider
Core Operations

The minimum set of operations that a provider must implement to conform to the official
SPML v2 specification.

Extensible Markup Language (XML)

A meta-markup language that provides a format for describing structured data. This
facilitates more precise declarations of content and more meaningful search results across
multiple platforms. In addition, XML enables a new generation of Web-based data viewing
and manipulation applications.

Organization for the Advancement of Structured Information


Standards (OASIS)

An international consortium that drives the development, convergence, and adoption of e-


business and Web service standards.

Provider

See Provisioning Service Provider.

Provisioning Service Object (PSO)

Represents a data entity or an information object on a target.

Provisioning Service Provider (PSP)

A software component that listens for, processes, and returns the results for well-formed
SPML requests from a known requestor.

Provisioning Service Target (PST)

Represents a destination or endpoint that a provider makes available for


provisioning actions.

Proxy Mode

In proxy mode, SPML Provider accesses directory data using the Active Roles proxy service.

Requesting Authority (RA)

A software component that issues well-formed SPML requests to a Provisioning


Service Provider.

Requestor

See Requesting Authority.

Active Roles 7.5.4 Solutions Guide


88
Active Roles SPML Provider
Simple Object Access Protocol (SOAP)

An XML/HTTP-based protocol for platform-independent access to objects and services on


the Web. SOAP defines a message format in XML that travels over the Internet using
HyperText Transfer Protocol (HTTP). By using existing Web protocols (HTTP) and languages
(XML), SOAP runs over the existing Internet infrastructure without being tied to any
operating system, language, or object model.

SPML

An XML-based framework for exchanging user, resource, and service provisioning


information between cooperating organizations.

SPML v2

An OASIS standard that provides a means of representing provisioning requests and


responses as SPML documents.

Target

See Provisioning Service Target.

Target Schema

Defines the XML structure of the objects (PSO) that the target may contain.

Troubleshooting SPML Provider


This section briefly discusses some error statements that you may encounter when using
SPML Provider.

Cannot remove the specified item because it


was not found in the specified Collection
When sending a request to remove a user from a group (see the example below), the
requested operation fails with the error statement “Cannot remove the specified item
because it was not found in the specified Collection.”

Resolution
This error has one of the following causes:

Active Roles 7.5.4 Solutions Guide


89
Active Roles SPML Provider
l The <value> element of the <attr> element specifies a user account that is not a
member of the group.
l The Distinguished Name fields, such as CN or OU, used in the distinguished name of
the user account to be removed, have invalid spelling or case. The Distinguished
Name fields must be in upper case. So the use of cn=Robert Smith instead of
CN=Robert Smith generates this error.

Verify that the <value> element specifies the distinguished name of the user that is the
group member. Make sure that the Distinguished Name fields are in upper case.
The following example illustrates how to create a request to remove user Robert Smith
from the Sales group.
<?xml version="1.0"?>
<soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:xsd="http://www.w3.org/2001/XMLSchema"
xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/">
<soap:Body>
<modifyRequest xmlns="urn:oasis:names:tc:SPML:2:0" returnData="everything">
<psoID ID="CN=Sales,OU=SPML2,DC=Mycompany,DC=com"/>
<modification modificationMode="delete">
<data>
<attr name="member" xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value>CN=Robert Smith,OU=Staff,DC=MyCompany,DC=com</value>
</attr>
</data>
</modification>
</modifyRequest>
</soap:Body>
</soap:Envelope>

Some of the specified attributes for the


'<object class name>’ object class are not
defined in the schema
When sending a request to change values of an object virtual attribute, the requested
operation fails with the error statement “Some of the specified attributes for the '<object
class name>' object class are not defined in the schema.”

Active Roles 7.5.4 Solutions Guide


90
Active Roles SPML Provider
Resolution
This error has one of the following causes:
l The spmlschema.config configuration file has changed since you started SPML
Provider.
l The Default Application Pool idle timeout period has ended.

To resolve this issue, recycle the Default Application Pool or change its settings using
Internet Information Services (IIS) Manager.

What’s new
This version of Active Roles SPML Provider has the same features and functions as the
previous version, 1.4.0. The new version adds support for:
l Active Roles 7.4, allowing you to use the latest version of the Active Roles
Administration Service.
l Adding users, groups, and contacts in Azure AD.

This version of Active Roles SPML Provider requires a 64-bit (x64) operating system,
and cannot be installed on a 32-bit (x86) system (see System requirements earlier in
this document).

Active Roles 7.5.4 Solutions Guide


91
Active Roles SPML Provider
5

Skype for Business Server Solution

The Skype for Business Server User Management solution enables Active Roles to
administer Skype for Business Server user accounts. This solution provides built-in policies
that synchronize user account information between Active Roles and Skype for Business
Server, allowing Skype for Business Server user management tasks to be performed using
Active Roles Web Interface.
l Introducing Skype for Business Server User Management
l Supported Active Directory topologies
l User Management policy
l Master Account Management policy
l Access Templates for Skype for Business Server

Introducing Skype for Business Server


User Management
With Skype for Business Server User Management, you can use Active Roles to perform the
following tasks:
l Add and enable new Skype for Business Server users
l View or change Skype for Business Server user properties and policy assignments
l Move Skype for Business Server users from one Skype for Business Server
pool to another
l Disable or re-enable user accounts for Skype for Business Server
l Remove users from Skype for Business Server

Skype for Business Server User Management adds the following elements to Active Roles:
l Built-in Policy Object containing a policy that enables Active Roles to perform user
management tasks on Skype for Business Server.

Active Roles 7.5.4 Solutions Guide


92
Skype for Business Server Solution
l Built-in Policy Object containing a supplementary policy that enables Active Roles to
administer Skype for Business Server usersin environments that involve multiple
Active Directory forests.
l Commands and pages for managing Skype for Business Server users in the Active
Roles Web Interface.
l Access Templates to delegate Skype for Business Server user management tasks.

The Skype for Business Server User Management policy allows you to control the following
factors of Skype for Business Server user creation and administration:
l Rule for generating the SIP user name. When adding and enabling a new Skype for
Business Server user, Active Roles can generate a SIP user name based on other
properties of the user account.
l Rule for selecting a SIP domain. When configuring the SIP address for a Skype for
Business Server user, Active Roles can restrict the list of selectable SIP domains and
suggest which SIP domain to select by default.
l Rule for selecting a Telephony option. When configuring Telephony for a Skype for
Business Server user, Active Roles can restrict the list of selectable Telephony
options and suggest which option to select by default.
l Rule for selecting a Skype for Business Server pool. When adding and enabling a new
Skype for Business Server user, Active Roles can restrict the list of selectable
registrar pools and suggest which pool to select by default. This rule also applies to
selection of the destination pool when moving a Skype for Business Server user from
one pool to another.

Skype for Business Server User Management provides a number of Access Templates
allowing you to delegate the following tasks in Active Roles:
l Add and enable new Skype for Business Server users
l View existing Skype for Business Server users
l View or change the SIP address for Skype for Business Server users
l View or change the Telephony option and related settings for Skype for Business
Server users
l View or change Skype for Business Server user policy assignments
l Disable or re-enable user accounts for Skype for Business Server
l Move users from one Skype for Business Server pool to another
l Remove users from Skype for Business Server

Supported Active Directory topologies


Skype for Business Server User Management supports the same Active Directory
Domain Services (AD DS) topologies as Microsoft Lync 2013. The following topologies
are supported:

Active Roles 7.5.4 Solutions Guide


93
Skype for Business Server Solution
l Single forest with a single tree or multiple trees
l Multiple forests in a resource forest topology
l Multiple forests in a central forest topology

Single forest
The single forest topology assumes that the logon-enabled user accounts managed by
Active Roles are defined in the Active Directory forest in which Skype for Business Server is
deployed. To perform Skype for Business Server user management tasks on a given user
account, Active Roles makes changes to the attributes of that use account, and then, based
on the attribute changes, the Skype for Business Server User Management policy requests
the Skype for Business Server remote shell to update the user account accordingly. For
example, when creating a new Skype for Business Server user, Active Roles sets a virtual
attribute on that user’s account directing the policy to invoke the remote shell command for
enabling the new user for Skype for Business Server. When making changes to an existing
Skype for Business Server user, Active Roles populates the attributes of the user’s account
with the desired changes, causing the policy to apply those changes via the remote shell.

Multiple forests - Resource forest


The resource forest topology refers to a multi-forest environment where a separate forest—
Skype for Business Server forest—hosts servers running Skype for Business Server but
does not host any logon-enabled user accounts. Outside the Skype for Business Server
forest, user forests host logon-enabled user accounts but no servers running Skype for
Business Server. When creating a Skype for Business Server account for a user from an
external forest, Active Roles creates a disabled user account in the Skype for Business
Server forest, establishes a link between the user account in the user forest (master
account) and the disabled user account in the Skype for Business Server forest (shadow
account), and enables the shadow account for Skype for Business Server. The Master
Account Management policy then ensures that the attributes of the shadow account are
synchronized with the attributes of the master account, so that Skype for Business Server
user properties can be administered on the master account via Active Roles. In the Skype
for Business Server forest, the User Management policy detects the attribute changes
replicated from the master account to the shadow account, and translates them to remote
shell commands on Skype for Business Server, similarly to the Single forest case.

Multiple forests - Central forest


The central forest topology refers to a multi-forest environment where a separate forest—
Skype for Business Server forest—hosts servers running Skype for Business Server and
may also host logon-enabled accounts. Outside the Skype for Business Server forest, user

Active Roles 7.5.4 Solutions Guide


94
Skype for Business Server Solution
forests host logon-enabled user accounts but no servers running Skype for Business
Server.
With the Skype for Business Server User Management policy applied to logon-enabled
user accounts in the Skype for Business Server forest, Active Roles can enable and
administer those user accounts for Skype for Business Server in the same way as in the
Single forest case.
When creating a Skype for Business Server account for a user from an external forest,
Active Roles creates a contact in the Skype for Business Server forest, establishes a link
between the user account in the user forest (master account) and the contact in the Skype
for Business Server forest (shadow account), and enables that contact for Skype for
Business Server. The Master Account Management policy then ensures that the attributes
of the contact are synchronized with the attributes of the user account, so that Skype for
Business Server user properties can be administered on the user account via Active Roles.
In the Skype for Business Server forest, the User Management policy detects the attribute
changes replicated from the user account to the contact, and translates them to remote
shell commands on Skype for Business Server, similarly to the Single forest case.

User Management policy


The User Management policy is intended for single-forest and multi-forest environments
where logon-enabled accounts of Skype for Business Server users are defined in the Active
Directory forest in which Skype for Business Server is deployed, as well as for multi-forest
environments where logon-enabled master accounts of Skype for Business Server users
are defined in external forests with each master account being represented by a shadow
account (disabled user account or contact) in the Active Directory forest in which Skype for
Business Server is deployed. The User Management policy enables Active Roles to perform
user management tasks on Skype for Business Server.
The Policy Object that holds this policy is in the
Configuration/Policies/Administration/Builtin container. The name of the Policy
Object is Built-in Policy - Skype for Business - User Management. Depending upon
your Active Directory topology, apply this Policy Object as follows to enable Skype for
Business Server User Management in Active Roles.

Table 19: Applying the Built-in - Skype for Business - User Management Policy
Object

Topology Where to apply the Policy Object


option

Single forest Apply this Policy Object to


Active Directory domains or containers that hold user accounts you
want to administer by using Skype for Business Server User
Management in Active Roles.

Multiple forests Apply this Policy Object to

Active Roles 7.5.4 Solutions Guide


95
Skype for Business Server Solution
Topology Where to apply the Policy Object
option

- Resource Active Directory domains or containers in the Skype for Business


forest Server forest that hold shadow accounts (disabled user accounts) for
users from external forests you want to administer by using Skype for
Business Server User Management in Active Roles.

Multiple forests Apply this Policy Object to


- Central forest
Active Directory domains or containers in the Skype for Business
Server forest that hold logon-enabled user accounts you want to
administer by using Skype for Business Server User Management in
Active Roles
Active Directory domains or containers in the Skype for Business
Server forest that hold shadow accounts (contacts) for users from
external forests you want to administer by using Skype for Business
Server User Management in Active Roles.

User Management policy settings


The topics in this section cover the User Management policy settings.

Connection to Skype for Business Server


To administer Skype for Business Server users, Active Roles requires a connection to a
computer running the following server role in your Skype for Business Server deployment:
Front End Server (in case of Skype for Business Server Enterprise Edition) or Standard
Edition Server. The computer must be from an Active Directory domain that is registered
with Active Roles as a managed domain. By using the Server policy setting, you can
specify how you want Active Roles to select a Skype for Business Server computer:
l Connect to any available server With this option, Active Roles attempts to
connect to any Front End Server or Standard Edition Server that runs the Central
Management Server in your Skype for Business Server deployment. If no Central
Management Server role holders are available in the managed domains, then Active
Roles attempts to connect to the first Front End Server or Standard Edition Server
found in the managed domains.
l Connect to these servers only This option allows you to configure a list from
which you want Active Roles to select a Skype for Business Server computer. You
can:
l Add or remove computers from the list. Active Roles searches the managed
domains for computers running the appropriate Skype for Business Server role,
allowing you to select the desired computers.

Active Roles 7.5.4 Solutions Guide


96
Skype for Business Server Solution
l Set the default computer. Active Roles first attempts to connect to that
computer.
l Reorder the list. Active Roles first attempts to connect to computers that are
higher in the list.

Note that at least one of your Active Directory domains that hold computers running the
Front End Server or Standard Edition Server must be registered with Active Roles as a
managed domain. Otherwise, Active Roles is unable to discover your Skype for Business
Server deployment, so Skype for Business Server User Management functions are
unavailable.

SIP user name generation rule


The SIP User Name policy setting allows you to configure a rule for generating the SIP
user name based on other properties of the user account. When adding a new Skype for
Business Server user, Active Roles uses that rule to generate the SIP user name on the
Web Interface page for enabling users for Skype for Business Server. The rule has an effect
if you select the SIP address option that provides for entering a SIP user name. On the page
where you edit Skype for Business Server users, the rule performs a validation function,
preventing changes to the SIP user name that violate the rule.
To configure a rule, you set up a value that acts as a template for the SIP user name. You
can add one or more entries to the value, with each entry representing one of the following:
l Text A text string. You can type the desired text when adding the entry.
l User Property A particular property of the user account. You can choose the
desired property and specify whether you want the entry to include the entire
property or a part of the property.
l Parent OU Property A particular property of the Organizational Unit that holds the
user account. You can choose the desired property and specify whether you want the
entry to include the entire property or a part of the property.
l Parent Domain Property A particular property of the Active Directory domain that
holds the user account. You can choose the desired property and specify whether you
want the entry to include the entire property or a part of the property.

The rule sets the SIP user name to the string value obtained by calculating each entry and
then concatenating the calculation results so that they form a single string value.
By default, the policy allows the generated name to be modified. The SIP User Name
policy setting provides the option to prevent changing the generated name. If you select
that option, the SIP user name is read-only on the Web Interface page for enabling users
for Skype for Business Server.

SIP domain restriction rule


The SIP Domain policy setting allows you to configure a rule that restricts selection of a
SIP domain for the user SIP address. When you add a new Skype for Business Server user

Active Roles 7.5.4 Solutions Guide


97
Skype for Business Server Solution
or edit an existing Skype for Business Server user, this rule determines the list from which
you can select a SIP domain for the user’s SIP address. In case of adding a new Skype for
Business Server user, the rule applies to any SIP address option that involves selecting a
SIP domain from the list.
To configure a rule, you choose one of these policy options:
l Allow selection of any SIP domain With this option, the policy does not restrict
the list of SIP domains.
l Restrict selection to these SIP domains This option allows you to configure a
list of acceptable SIP domains. You can:
l Add or remove SIP domains from the list. Active Roles identifies all SIP
domains that exist in your Skype for Business Server deployment, allowing you
to select the desired SIP domains.
l Set the default SIP domain. When creating a SIP address, Active Roles selects
the specified SIP domain by default.
l Reorder the list. When prompting to select a SIP domain for a user’s SIP
address, Active Roles lists the SIP domain names in the order specified.

Pool restriction rule


The Pool policy setting allows you to configure a rule that restricts selection of an
Enterprise Edition Front End pool or Standard Edition server to which Skype for Business
Server users can be assigned. When you add a new Skype for Business Server user, this
rule determines the list from which you can select a pool for the new user. When you move
a Skype for Business Server user from one pool to another, this rule determines the list
from which you can select the destination pool.
To configure a rule, you choose one of these policy options:
l Allow selection of any pool With this option, the policy does not restrict the
list of pools.
l Restrict selection to these pool This option allows you to configure a list of
acceptable pools. You can:
l Add or remove pools from the list. Active Roles identifies all Front End pools
and Standard Edition servers in your Skype for Business Server deployment,
allowing you to select the desired pools or servers.
l Set the default pool. When adding a new Skype for Business Server user
or moving a user to another pool, Active Roles selects the specified pool
by default.
l Reorder the list. When prompting to select a pool, Active Roles lists the pools in
the order specified.

Active Roles 7.5.4 Solutions Guide


98
Skype for Business Server Solution
Telephony restriction rule
The Telephony policy setting allows you to configure a rule that restricts selection of a
Telephony option for Skype for Business Server users. When you add or edit a Skype for
Business Server user, this rule determines the list from which you can select a
Telephony option.
To configure a rule, you choose one of these policy options:
l Allow selection of any option With this option, the policy does not restrict the list
of Telephony options.
l Restrict selection to these options This option allows you to configure a list of
acceptable Telephony options. You can:
l Add or remove Telephony options from the list.
l Set the default Telephony option. When adding a new Skype for Business
Server, Active Roles selects the specified Telephony option by default.
l Reorder the list. When prompting to select a Telephony option, Active Roles
lists the options in the order specified.

Master Account Management policy


The Master Account Management policy is intended for multi-forest environments where
logon-enabled master accounts of Skype for Business Server users are defined in Active
Directory forests in which Skype for Business Server isn’t deployed, with each master
account being represented by a shadow account (disabled user account or contact) in the
Active Directory forest in which Skype for Business Server is deployed (see Multiple forests
- Resource forest and Multiple forests - Central forest earlier in this document). The Master
Account Management policy enables Active Roles to control master accounts of Skype for
Business Server users, and operates in conjunction with the User Management policy that
controls shadow accounts in the Skype for Business Server forest.
The Policy Object that holds this policy is in the
Configuration/Policies/Administration/Builtin container. The name of the Policy
Object is Built-in Policy - Skype for Business - Master Account Management.
Depending upon your Active Directory topology, apply this Policy Object as follows to
enable Skype for Business Server User Management in Active Roles.

Table 20: Applying the Built-in - Skype for Business - Master Account
Management Policy Object

Topology How to apply the Policy Object


option

Single forest Do not apply this Policy Object

Multiple forests Configure the Forest Mode policy setting by selecting the Resource

Active Roles 7.5.4 Solutions Guide


99
Skype for Business Server Solution
Topology How to apply the Policy Object
option

- Resource forest option, and then apply this Policy Object to


forest
Active Directory domains or containers that hold logon-enabled user
accounts in external forests (master accounts) you want to administer
by using Skype for Business Server User Management in Active Roles.

Multiple forests Configure the Forest Mode policy setting by selecting the Central
- Central forest forest option, and then apply this Policy Object to
Active Directory domains or containers that hold logon-enabled user
accounts in external forests (master accounts) you want to administer
by using Skype for Business Server User Management in Active Roles.

Master Account Management policy settings


The topics in this section cover the Master Account Management policy settings.

Skype for Business Server forest mode


The Master Account Management policy is intended for multi-forest environments where
the Skype for Business Server forest is used either as a resource forest or as a central
forest. In the central forest mode, the Skype for Business Server forest may hold logon-
enabled Skype for Business Server user accounts in addition to shadow accounts (contacts)
for Skype for Business Server users from external forests. In the resource forest mode, the
Skype for Business Server forest holds only shadow accounts (logon-disabled user
accounts) for Skype for Business Server users from external forests. The Forest Mode
policy setting allows you to choose the option that matches the Skype for Business Server
forest mode in your Skype for Business Server deployment:
l Resource forest The policy creates and administers logon-disabled user accounts
as shadow accounts for Skype for Business Server users from external forests. The
user account from an external forest, referred to as a master account, is linked and
synchronized with the shadow account that is enabled for Skype for Business Server
in the Skype for Business Server forest.
l Central forest The policy creates and administers contact objects as shadow
accounts for Skype for Business Server users from external forests. The user account
from an external forest, referred to as a master account, is linked and synchronizes
with the contact that is enabled for Skype for Business Server in the Skype for
Business Server forest.

Active Roles 7.5.4 Solutions Guide


100
Skype for Business Server Solution
Container for new shadow accounts
The Master Account Management policy allows you to specify the container in which you
want Active Roles to create shadow accounts when enabling master accounts for Skype for
Business Server. You can select the desired organizational unit in the Skype for Business
Server forest or you can let Active Roles choose the default container.
If you select a particular organizational unit, Active Roles creates shadow accounts in that
organizational unit. You can select an organizational unit from any domain of the Skype for
Business Server forest that is registered with Active Roles as a managed domain.
If you let Active Roles choose the default container for new shadow aActive Rolesccounts,
then Active Roles creates shadow accounts in the Users container in a particular domain of
the Skype for Business Server forest. If the forest root domain of the Skype for Business
Server forest is registered with Active Roles as a managed domain, then Active Roles
creates shadow accounts in that domain. Otherwise, Active Roles creates shadow accounts
in the domain that appears first in the ordered list of the managed domains from the Skype
for Business Server forest. Note that Active Roles requires at least one domain of the Skype
for Business Server forest to be registered with Active Roles as a managed domain.

Default description for new shadow accounts


The Master Account Management policy allows you to specify a text to use as the default
description for new shadow accounts that Active Roles creates when enabling master
accounts for Skype for Business Server. Active Roles writes that text to the Description
property of every new shadow account.

Attribute to store a reference to shadow account


By default, the Master Account Management policy designates the adminDescription
attribute of the master account for storing the GUID of the shadow account, and allows you
to choose a different attribute for that purpose. Skype for Business Server User
Management uses this attribute to identify the shadow account in the Skype for Business
Server forest when managing a given master account in an external forest. The policy
causes Active Roles to set this attribute on the master account when linking the master
account to the shadow account in the Skype for Business Server forest.

Synchronized properties
The Master Account Management policy defines a list of properties to copy from the master
account to the shadow account. These properties are referred to as synchronized
properties. When you use Active Roles to set or change a synchronized property of a
master account, the policy causes Active Roles to set or change the value of that property
on both the master account and shadow account.

Active Roles 7.5.4 Solutions Guide


101
Skype for Business Server Solution
In addition, Skype for Business Server User Management provides a scheduled task that
copies synchronized properties from every managed master account to the
corresponding shadow account. The task runs on a scheduled basis to ensure that each
of the synchronized properties of the shadow account has the same value as the
corresponding property of the master account. If a synchronized property of the shadow
account has changed for whatever reason, Active Roles changes that property back to
the value found on the master account. For further details, see Scheduled
synchronization later in this document.
The following table provides the default list of synchronized properties. You can configure
the policy to synchronize additional properties or remove individual properties from
synchronization.

Table 21: Default list of synchronized properties

c (Country Abbreviation) physicalDeliveryOfficeName (Office


Location)
co (Country)
postalCode (ZIP/Postal Code)
company (Company)
postOfficeBox (Post Office Box)
countryCode (Country-Code)
sAMAccountName (Logon Name (pre-
department (Department)
Windows 2000))
displayName (Display Name)
sn (Last Name)
givenName (First Name)
st (State/Province)
homePhone (Home Phone)
streetAddress (Street Address)
initials (Initials)
telephoneNumber (Telephone Number)
l (City)
title (Job Title)
mobile (Mobile Number)
url (Web Page Address (Others))
otherTelephone (Phone Number (Others))
wWWHomePage (Web Page Address)

Substituted properties
The Master Account Management policy defines a list of properties that appear on the
master account but reflect the properties of the shadow account. These properties are
referred to as substituted properties. When you use Active Roles to view properties of a
master account, the policy causes Active Roles to retrieve the values of the master
account’s substituted properties from the shadow account. When you use Active Roles to
set or change a substituted property of a master account, the policy causes Active Roles to
set or change the value of that property on the shadow account.
The policy does not allow you to narrow down the list of substituted properties. However,
you can specify your custom list of substituted properties in addition to the default list. If
you do so, the resulting list of substituted properties includes all properties from both the
default list and your custom list.

Active Roles 7.5.4 Solutions Guide


102
Skype for Business Server Solution
Table 22: Default list of substituted properties

edsva-Skype for Business-AccountExists edsva-Skype for Business-Move


edsva-Skype for Business-ArchivingPolicy edsva-Skype for Business-
MoveTargetRegistrarPool
edsva-Skype for Business-ClientPolicy
edsva-Skype for Business-
edsva-Skype for Business-
PersistentChatPolicy
ClientVersionPolicy
edsva-Skype for Business-PIN
edsva-Skype for Business-
ConferencingPolicy edsva-Skype for Business-PINPolicy
edsva-Skype for Business-DialPlanPolicy edsva-Skype for Business-PrivateLine
edsva-Skype for Business-Disable edsva-Skype for Business-ReEnable
edsva-Skype for Business-Enable edsva-Skype for Business-RegistrarPool
edsva-Skype for Business- edsva-Skype for Business-SIPAddress
ExchangeArchivingPolicy
edsva-Skype for Business-SIPAddressType
edsva-Skype for Business-
edsva-Skype for Business-SIPDomain
ExternalAccessPolicy
edsva-Skype for Business-SIPUserName
edsva-Skype for Business-HostedVoiceMail
edsva-Skype for Business-TasksAllowed
edsva-Skype for Business-IsEnabled
edsva-Skype for Business-
edsva-Skype for Business-LineServerURI
TelephonyOption
edsva-Skype for Business-LineURI
edsva-Skype for Business-
edsva-Skype for Business-LocationPolicy TemporarilyDisable
edsva-Skype for Business-MasterAccount edsva-Skype for Business-VoicePolicy
edsva-Skype for Business-MobilityPolicy

Back-synchronized properties
The Master Account Management policy defines a list of properties to copy from the shadow
account to the master account. By default, the list is empty. If you add a property to that
list, the policy ensures that any changes to that property on the shadow account are
replicated to the master account.

Master Account Management policy actions


The Master Account Management policy causes Active Roles to perform the following
actions depending on the change request submitted to the Active Roles
Administration Service.

Active Roles 7.5.4 Solutions Guide


103
Skype for Business Server Solution
Table 23: Policy Actions

Request Actions

Enable an existing Active Roles retrieves the properties of the existing user (in
Active Directory user for the external forest), and then performs the following actions:
Skype for Business
l Create a shadow account in the Skype for Business
Server
Server forest, and populate its properties with the
properties of the user from the external forest
l Enable the shadow account for Skype for Business
Server
l Set the msRTCSIP-OriginatorSID attribute of the shadow
account to the value of the objectSID attribute of the
user from the external forest
l Create a reference to the shadow account on the master
account

If the user from the external forest already has a shadow


account (for example, created by Exchange Resource Forest
Management), then the policy re-uses the existing shadow
account instead of creating a new one.
When creating the shadow account, Active Roles executes all
policies that are applied to the container that holds the shadow
account.

Modify Skype for If the change request includes any changes to substituted
Business Server user properties, Active Roles first makes the requested changes to
properties of a master the substituted properties of the shadow account. Next, Active
account Roles makes the requested changes to the properties of the
master account, and then updates the synchronized properties
of the shadow account with the new property values found on
the master account.

Deprovision a master Active Roles deprovisions the master account, and then
account temporarily disables the shadow account for Skype for
Business Server.

Undeprovision a Active Roles undeprovisions the master account and then re-
deprovisioned master enables the shadow account for Skype for Business Server.
account
For undeprovisioning master accounts to have an effect on
shadow accounts, the container that holds deprovisioned
master accounts must be in the scope of the Built-in Policy -
Skype for Business - Master Account Management
Policy Object (or a copy of that Policy Object).

Delete a master account Active Roles deletes the master account, and then removes
the shadow account from Skype for Business Server.

The Master Account Management policy requires that shadow accounts be in the scope of
the User Management policy provided by Skype for Business Server User Management.

Active Roles 7.5.4 Solutions Guide


104
Skype for Business Server Solution
This enables Active Roles to perform the Skype for Business Server related actions on the
shadow account.

Scheduled synchronization
Skype for Business Server User Management includes an Active Roles scheduled task that
complements the Master Account Management policy to enforce synchronization of master
and shadow account properties, and to capture existing Skype for Business Server users
whose master account happens to fall under the control of that policy. The scheduled task
object is in the Configuration/Server Configuration/Scheduled Tasks/Builtin
container. The name of the object is Skype for Business - Master Account
Management. The task is scheduled to run on a daily basis. Normally, you do not need to
modify that scheduled task.
The operation of the task affects only the user accounts that are in the scope of the Built-in
Policy - Skype for Business - Master Account Management Policy Object (or a copy
of that Policy Object). When run, the task performs the following actions on each of those
user accounts:
l If the user account does not have a shadow account that is enabled for Skype for
Business Server, then skip over that user account.
l If the user account has a shadow account that is enabled for Skype for Business
Server but does not store a reference to that shadow account, then create the
reference to the shadow account on that user account.
This action enables Skype for Business Server User Management to administer
exiting Skype for Business Server users, possibly enabled for Skype for Business
Server by using an earlier version of Skype for Business Server User Management or
without the use of Skype for Business Server User Management.
l If the user account has a shadow account that is enabled for Skype for Business
Server and stores a reference to the shadow account, then copy the synchronized
properties from the master account to the shadow account, and copy the back-
synchronized properties from the shadow account to the master account.
This action ensures that the shadow account properties are updated with the latest
changes to the master account properties and vice versa.

Access Templates for Skype for


Business Server
Skype for Business Server User Management provides a number of Access Templates
allowing you to delegate the tasks of managing Skype for Business Server users in Active
Roles. You can find these Access Templates in the Configuration/Access
Templates/Skype for Business Server container:

Active Roles 7.5.4 Solutions Guide


105
Skype for Business Server Solution
Table 24: Skype for Business Server User Management Access

Access Template Description

Skype for Business Server - Gives permission to perform the following tasks by using
User Full Control Active Roles:
l Add and enable new Skype for Business Server
users
l View existing Skype for Business Server users
l View or change the SIP address
l View or change the telephony option and related
settings
l View or change the user policy assignments in
Skype for Business Server
l Temporarily disable or re-enable users for Skype
for Business Server
l Move users to another server or pool in Skype for
Business Server
l Remove users from Skype for Business Server

Skype for Business Server - Gives permission to perform the following tasks by using
User Telephony Active Roles:
l View existing Skype for Business Server users
l View the SIP address
l View or change the telephony option and related
settings
l View the user policy assignments in Skype for
Business Server

Skype for Business Server - Gives permission to perform the following tasks by using
User Disable/Re-enable Active Roles:
l View existing Skype for Business Server users
l View the SIP address
l View the telephony option and related settings
l View the user policy assignments in Skype for
Business Server
l Temporarily disable or re-enable users for Skype
for Business Server

Skype for Business Server - Gives permission to perform the following tasks by using
User Policies Active Roles:

Active Roles 7.5.4 Solutions Guide


106
Skype for Business Server Solution
Access Template Description
l View existing Skype for Business Server users
l View the SIP address
l View the telephony option and related settings
l View or change the user policy assignments in
Skype for Business Server

When applying Access Templates for Skype for Business Server User Management,
consider your Active Directory topology.

Table 25: Applying Access templates for Skype for Business Server User
Management

Topology Where to apply Access Templates


option

Single forest Apply Access Templates to Active Directory domains and containers to
which the Built-in Policy - Skype for Business - User
Management Policy Object (or a copy of that Policy Object) is applied,
to allow access to user accounts of Skype for Business Server users
managed by Active Roles.

Multiple forests Apply Access Templates to Active Directory domains and containers in
- Resource external forests to which the Built-in Policy - Skype for Business -
forest Master Account Management Policy Object (or a copy of that Policy
Object) is applied, to allow access to master accounts of Skype for
Business Server uses managed by Active Roles.
You do not need to apply these Access Templates in the Skype for
Business Server forest.

Multiple forests Apply Access Templates to Active Directory domains and containers in
- Central forest external forests to which the Built-in Policy - Skype for Business -
Master Account Management Policy Object (or a copy of that Policy
Object) is applied, to allow access to master accounts of Skype for
Business Server uses managed by Active Roles.
Apply Access Templates to Active Directory domains and containers in
the Skype for Business Server forest to which the Built-in Policy -
Skype for Business - User Management Policy Object (or a copy of
that Policy Object) is applied, to allow access to logon-enabled user
accounts of Skype for Business Server users managed by Active Roles
in the Skype for Business Server forest.

Active Roles 7.5.4 Solutions Guide


107
Skype for Business Server Solution
Deploying the Solution
l Prerequisite conditions
l Deployment in a single-forest environment
l Deployment in a multi-forest environment
l Upgrade from an earlier version

Prerequisite conditions
This section summarizes the prerequisite conditions that must be met before you deploy
Skype for Business Server User Management.

Skype for Business Server deployment


With Skype for Business Server User Management, you can perform user management on
Microsoft Lync 2013 with limited support.

Single forest
In case of single forest, Skype for Business Server must be deployed in the forest that holds
logon-enabled accounts for Skype for Business Server users. For further details, see Single
forest earlier in this document.

Multiple forests
In case of multiple forests, Skype for Business Server must be deployed in the Skype
for Business Server forest only. You don’t need to deploy Skype for Business Server in
external user forests or extend the Active Directory schema with Skype for Business
Server attributes in those forests. For further details about multi-forest topology
options, see Multiple forests - Resource forest and Multiple forests - Central forest
earlier in this document.

Active Directory forest trust

The multi-forest topology option requires a one-way trust relationship between the Skype
for Business Server forest and each user forest so that users can authenticate to the user
forest but access services in the Skype for Business Server forest. Create a “forest” trust
instead of an “external” trust because an external trust only supports NTLM, while a forest
trust supports both NTLM and Kerberos, and therefore won’t limit Skype for Business client
authentication options.

Active Roles 7.5.4 Solutions Guide


108
Skype for Business Server Solution
Trusts are configured as one-way to prevent unauthorized access to the user forest from
the Skype for Business Server forest. For details, see "How Domain and Forest Trusts
Work" at http://technet.microsoft.com/library/cc773178.aspx.

Skype for Business Server contact management rights

In case of central forest deployment, you need to grant Skype for Business Server contact
management rights on the container that is intended to hold shadow accounts (contacts
enabled for Skype for Business Server in the Skype for Business Server forest). Otherwise,
Skype for Business Server security groups do not have sufficient rights to manage contact
objects, which causes an “access is denied” condition when Active Roles attempts to enable
a shadow account for Skype for Business Server.
To grant Skype for Business Server contact management rights, use the following
command in Skype for Business Server Management Shell:
Grant-CsOUPermission -OU "<DN of container>" -ObjectType "contact"
Replace <DN of container> with the Distinguished Name of the container that is intended
to hold shadow accounts, for example: OU=Shadow Accounts,DC=Skype for
BusinessServer,DC=lab. If the domain does not have permission inheritance disabled
(which is the default case), then you can supply the Distinguished Name of the domain
rather than container:
Grant-CsOUPermission -OU "DC=Skype for BusinessServer,DC=lab" -ObjectType
"contact"
You must be a domain administrator in order to run the Grant-CsOUPermission
cmdlet locally.

Active Roles deployment


The following Active Roles components must be installed in your Active Directory
environment:
l Administration Service
l Web Interface
l Active Roles console

You can install these components on member servers in a user forest or in the Skype for
Business Server forest. For installation instructions, see the Active Roles Quick Start Guide.

Log on as Active Roles Admin


To configure Skype for Business Server User Management, log on as Active Roles Admin.
This ensures that you have sufficient rights to make the necessary configuration changes.
Assuming the default configuration of the Active Roles Administration Service, you should
log on with a domain user account that is a member of the Administrators group on the
computer running the Administration Service.

Active Roles 7.5.4 Solutions Guide


109
Skype for Business Server Solution
Register domains with Active Roles
Skype for Business Server User Management requires the following domains to be
registered with Active Roles:
l At least one domain that holds computers running the Front End Server or Standard
Edition Server role in your Skype for Business Server deployment
l Domains that hold logon-enabled users you are going to administer with Skype for
Business Server User Management
l In case of multi-forest topology, the domain in the Skype for Business Server forest
that holds shadow accounts for Skype for Business Server users

When registering a domain, you are prompted to choose which account you want the
Administration Service to use to access the domain. You can either specify a so-called
override account or let the Administration Service use its service account. With either
option, the account must have sufficient rights in the domain you are registering. At a
minimum, the account must have the following rights:
l In the domain that holds Skype for Business Server computers, a member of the
RTCUniversalUserAdmins group
l In the user domains, a member of the Account Operators group
l In the shadow accounts domain, a member of the Account Operators group
For a central forest deployment, the account must also have the rights to create,
view, modify and delete contact objects in the shadow accounts domain. It will suffice
to make the account a member of the Domain Admins group.
For instructions on how to register domains with Active Roles, see “Adding and
removing managed domains” in the Active Roles Administrator Guide.

Deployment in a single-forest environment


In a single-forest environment, you only need to link the Built-in Policy - Skype for
Business - User Management Policy Object to the Active Directory domains or
containers that hold user accounts for which you want Active Roles to perform Skype for
Business Server user management tasks.

To link the Policy Object to an organizational unit or domain

1. In the Active Roles console tree, select Configuration | Policies |


Administration | Builtin.
2. In the details pane, right-click the Built-in Policy - Skype for Business - User
Management Policy Object, and then click Policy Scope.
3. In the dialog box that appears, click Add, and then select the desired organizational
unit or domain.

Out of the box, the Policy Object has all policy settings configured. You can use the Active
Roles console to view or change policy settings as needed.

Active Roles 7.5.4 Solutions Guide


110
Skype for Business Server Solution
To view or change policy settings

1. In the Active Roles console tree, select Configuration | Policies |


Administration | Builtin.
2. In the details pane, double-click the Built-in Policy - Skype for Business - User
Management Policy Object.
3. In the Properties dialog box that appears, go to the Policies tab, and double-click
the entry in the list of policies.
4. In the Properties dialog box that appears, do any of the following:
l On the Server tab, specify how you want Active Roles to select a computer
running Skype for Business Server.
l On the SIP User Name tab, configure a rule for generating the SIP user name
in the user SIP address.
l On the SIP Domain tab, configure a rule to restrict selection of a SIP domain
for the user SIP address.
l On the Pool tab, configure a rule to restrict selection of an Enterprise Edition
Front End pool or Standard Edition server to which Skype for Business Server
users can be assigned.
l On the Telephony tab, configure a rule to restrict selection of a Telephony
option for Skype for Business Server users.

For detailed description of the policy settings, see User Management policy settings earlier
in this document.

Deployment in a multi-forest environment


In a multi-forest environment, you need to perform the following deployment tasks:
l Apply the Master Account Management policy Adjust the Forest Mode policy setting
in the Built-in Policy - Skype for Business - Master Account Management
Policy Object and then link that Policy Object to Active Directory domains or
containers that hold logon-enabled user accounts in user forests (master accounts)
for which you want Active Roles to perform Skype for Business Server user
management tasks.
l Apply the User Management policy Link the Built-in Policy - Skype for Business
- User Management Policy Object to Active Directory domains or containers in the
Skype for Business Server forest that hold shadow accounts.
In case of central forest, you also need to link the Built-in Policy - Skype for
Business - User Management Policy Object to Active Directory domains or
containers in the Skype for Business Server forest that hold logon-enabled user
accounts for which you want Active Roles to perform Skype for Business Server user
management tasks.

Active Roles 7.5.4 Solutions Guide


111
Skype for Business Server Solution
Apply the Master Account Management policy
The Built-in Policy - Skype for Business - Master Account Management Policy
Object enables Active Roles to perform Skype for Business Server user management tasks
on user accounts in Active Directory forests that are external to the Skype for Business
Server forest. It needs to be configured as appropriate to your Skype for Business Server
forest mode (resource forest or central forest) and then linked to domains or containers in
external user forests.

To configure the Policy Object

1. In the Active Roles console tree, select Configuration | Policies |


Administration | Builtin.
2. In the details pane, double-click the Built-in Policy - Skype for Business -
Master Account Management Policy Object.
3. In the Properties dialog box that appears, go to the Policies tab, and double-click
the entry in the list of policies.
4. In the Properties dialog box that appears, go to the Forest Mode tab and select the
option that matches the Skype for Business Server forest mode in your Skype for
Business Server deployment (see Skype for Business Server forest mode).
5. Review other policy settings:
l On the Shadow Account tab, view or change the container and default
description for new shadow accounts.
l On the Master Account tab, view or change the attribute to store a reference
to shadow account.
l On the Synced tab, view or change the list of synchronized properties.
l On the Substituted tab, configure your custom list of substituted properties in
addition to the default list.
l On the Back-synced tab, view or change the list of back-synchronized
properties.

For detailed description of the policy settings, see Master Account Management policy
settings earlier in this document.

To link the Policy Object to an organizational unit or domain

1. In the Active Roles console tree, select Configuration | Policies |


Administration | Builtin.
2. In the details pane, right-click the Built-in Policy - Skype for Business - Master
Account Management Policy Object, and then click Policy Scope.
3. In the dialog box that appears, click Add, and then select the desired organizational
unit or domain.

Active Roles 7.5.4 Solutions Guide


112
Skype for Business Server Solution
Apply the User Management policy
The Built-in Policy - Skype for Business - User Management Policy Object
enables Active Roles to perform Skype for Business Server user management tasks on
user accounts in the Skype for Business Server forest. It needs to be linked to domains
or containers in the Skype for Business Server forest that hold shadow accounts. In
case of central forest, you also need to link that Policy Object to Active Directory
domains or containers in the Skype for Business Server forest that hold logon-enabled
user accounts for which you want Active Roles to perform Skype for Business Server
user management tasks.

To link the Policy Object to an organizational unit or domain

1. In the Active Roles console tree, select Configuration | Policies |


Administration | Builtin.
2. In the details pane, right-click the Built-in Policy - Skype for Business - User
Management Policy Object, and then click Policy Scope.
3. In the dialog box that appears, click Add, and then select the desired organizational
unit or domain.

Out of the box, the Policy Object has all policy settings configured. You can use the Active
Roles console to view or change policy settings as needed.

To view or change policy settings

1. In the Active Roles console tree, select Configuration | Policies |


Administration | Builtin.
2. In the details pane, double-click the Built-in Policy - Skype for Business - User
Management Policy Object.
3. In the Properties dialog box that appears, go to the Policies tab, and double-click
the entry in the list of policies.
4. In the Properties dialog box that appears, do any of the following:
l On the Server tab, specify how you want Active Roles to select a computer
running Skype for Business Server.
l On the SIP User Name tab, configure a rule for generating the SIP user name
in the user SIP address.
l On the SIP Domain tab, configure a rule to restrict selection of a SIP domain
for the user SIP address.
l On the Pool tab, configure a rule to restrict selection of an Enterprise Edition
Front End pool or Standard Edition server to which Skype for Business Server
users can be assigned.
l On the Telephony tab, configure a rule to restrict selection of a Telephony
option for Skype for Business Server users.

For detailed description of the policy settings, see User Management policy settings earlier
in this document.

Active Roles 7.5.4 Solutions Guide


113
Skype for Business Server Solution
Upgrade from an earlier version
You can use the following steps to upgrade from Active Roles Add-on for Skype for Business
Server to Skype for Business Server User Management:

1. Identify the Active Directory topology option used by the add-on. The possible
options are:
l Single forest
l Multiple forests - Resource forest
l Multiple forests - Central forest
In case of multiple forests, note down the Distinguished Name of the container in
which the add-on creates shadow accounts.

2. Uninstall the earlier version of the add-on from Active Roles Add-on Manager, and
then uninstall the add-on from the system
3. Upgrade to Active Roles version 7.5.4. For upgrade instructions, see the Active Roles
7.5.4 Quick Start Guide.
4. Deploy Skype for Business Server User Management. Depending on the Active
Directory topology option used by the add-on:
l In case of single forest, follow the Deployment in a single-forest environment
instructions.
l In case of multiple forests, follow the Deployment in a multi-forest
environment instructions. Configure the Built-in Policy - Skype for
Business - Master Account Management Policy Object to match the
topology option and container for shadow accounts you identified in Step 1.

The following instructions elaborate on these steps. The instructions apply to Active Roles
Add-on for Skype for Business Server 2.1.

To identify the Active Directory topology option used by the add-on

1. In the Active Roles console tree, select Applications | Active Roles Add-on for
Skype for Business Server.
2. Review the add-on settings in the Configure Add-on area in the details pane:
l The Active Directory topology option is selected in the Active Directory
topology box.
l If a multi-forest option is selected, the Distinguished Name of the container in
which the add-on creates shadow accounts is specified in the Container for
shadow accounts/contacts box.

If the add-on was configured with the resource forest or central forest option, you need to
configure and apply the Built-in Policy - Skype for Business - Master Account
Management Policy Object as follows.

Active Roles 7.5.4 Solutions Guide


114
Skype for Business Server Solution
To configure and apply the Master Account Management policy

1. In the Active Roles console tree, select Configuration | Policies |


Administration | Builtin.
2. In the details pane, double-click the Built-in Policy - Skype for Business -
Master Account Management Policy Object.
3. In the Properties dialog box that appears, go to the Policies tab, and double-click
the entry in the list of policies.
4. In the Properties dialog box that appears, go to the Forest Mode tab and
select the option that matches the Active Directory topology option that was used
by the add-on:
l If the add-on was configured with the option Multiple forests - Resource
forest, then select the Resource forest option on the Forest Mode tab.
l If the add-on was configured with the option Multiple forests - Central
forest, then select the Central forest option on the Forest Mode tab.
5. Go to the Shadow Account tab and configure the policy to use the container for
shadow accounts that was used by the add-on: Click This container, click Browse,
and select the container.
6. Click OK to close the Properties dialog for the policy entry.
7. In the Properties dialog box for the Policy Object, click Apply, go to the Scope tab,
and then click the Scope button on that tab.
8. In the dialog box that appears, add the containers that hold the master accounts you
managed using the add-on, and then click OK.
9. Click OK to close the Properties dialog box for the Policy Object.

Skype for Business Server User Management recognizes the existing master accounts,
enabling Active Roles to manage their shadow accounts for Skype for Business Server in
the same way as when using the add-on. To expedite the recognition of the existing master
accounts, you might execute the Master Account Management task without waiting for its
scheduled run: In the Active Roles console, navigate to the Configuration/Server
Configuration/Scheduled Tasks/Builtin container, right-click the object Skype for
Business - Master Account Management in that container, point to All Tasks, and
then click Execute.

Managing Skype for Business Server


Users
The Skype for Business Server User Management solution enables Active Roles to
administer Skype for Business Server users. Once you have deployed Skype for Business
Server User Management, the Active Roles Web Interface can be used to perform the
following tasks:

Active Roles 7.5.4 Solutions Guide


115
Skype for Business Server Solution
l Enabling or disabling users for Skype for Business Server
l Managing Skype for Business Server user properties

Enabling or disabling users for Skype for


Business Server
By using the Active Roles Web Interface, you can enable, temporarily disable, or remove
Active Directory users from Skype for Business Server.

Add and enable a new Skype for Business


Server user
For an existing Active Directory user account, you can use the Active Roles Web Interface
to create and enable a new Skype for Business Server user account by adding the Active
Directory user to Skype for Business Server.

To add and enable a new Skype for Business Server user

1. Select the user account in the Active Roles Web Interface for administrators.
2. Click the Enable for Skype for Business Server command.
The command is available if you have sufficient rights in Active Roles to enable users
for Skype for Business Server, and the selected account is in the scope of the policy
provided by Skype for Business Server User Management and is not enabled for
Skype for Business Server; otherwise, the Web Interface does not display the Enable
for Skype for Business Server command.

3. On the page that appears, assign the user to a Skype for Business Server pool,
specify any additional details, assign Skype for Business Server policies to the user as
needed, and then click Finish.

Disable or re-enable a user account for Skype for


Business Server
You can use the Active Roles Web Interface to disable a user account for logon to Skype for
Business Server. This allows you to disable a previously enabled user account in Skype for
Business Server while retaining all the Skype for Business Server settings that were
configured for the user account. Because you do not lose the Skype for Business Server
user account settings, you can re-enable a disabled user account again without having to
reconfigure the user account.

Active Roles 7.5.4 Solutions Guide


116
Skype for Business Server Solution
To disable or re-enable a previously enabled user account for Skype for
Business Server

1. In the Active Roles Web Interface for administrators, select the user account that you
want to disable or re-enable.
2. Do one of the following:
l To disable the user account, click the Temporarily Disable for Skype for
Business Server command.
l To re-enable the user account, click the Re-enable for Skype for Business
Server command.

The Web Interface displays the Temporarily Disable for Skype for Business Server
command if you have sufficient rights in Active Roles to perform that command, and the
user account you have selected is in the scope of the policy provided by Skype for Business
Server User Management and is enabled for Skype for Business Server.
The Web Interface displays the Re-enable for Skype for Business Server command if
you have sufficient rights in Active Roles to perform that command, and the user account
you have selected is in the scope of the policy provided by Skype for Business Server User
Management and was disabled by using the Temporarily Disable for Skype for
Business Server command.

Remove a user account from Skype for


Business Server
You can use the Active Roles Web Interface to remove a user account from Skype for
Business Server. This removes all the Skype for Business Server related attributes from the
user account, including the identities of any per-user policies that have been assigned to
that user account. You can later re-add the account to Skype for Business Server by using
the Enable for Skype for Business Server command (see Add and enable a new Skype
for Business Server user). However, all the Skype for Business Server-related information
(including policy assignments) previously associated with that account will have to be re-
created. If you want to prevent a user from logging on to Skype for Business Server, but do
not want to lose all of their account information, you can temporarily disable the user
account for Skype for Business Server (see Disable or re-enable a user account for Skype
for Business Server).

To remove a user account from Skype for Business Server

1. In the Active Roles Web Interface for administrators, select the user account that you
want to remove from Skype for Business Server.
2. Click the Remove from Skype for Business Server command.

The Web Interface displays the Remove from Skype for Business Server command if
you have sufficient rights in Active Roles to perform that command, and the user account
you have selected is in the scope of the policy provided by Skype for Business Server User
Management and is enabled or temporarily disabled for Skype for Business Server.

Active Roles 7.5.4 Solutions Guide


117
Skype for Business Server Solution
Managing Skype for Business Server user
properties
By using the Active Roles Web Interface, you can:
l View or change Skype for Business Server user properties such as the user’s SIP
address, telephony options and Skype for Business Server policy assignments
l Move Skype for Business Server users to a different Enterprise Edition Front End pool
or Standard Edition server

View or change Skype for Business Server user


properties
For a user account that is enabled or temporarily disabled for Skype for Business Server,
you can use the Active Roles Web Interface to view or change Skype for Business Server
user properties such as the user’s SIP address, telephony options and Skype for Business
Server policy assignments.

To view or change Skype for Business Server user properties

1. In the Active Roles Web Interface for administrators, select the user account whose
properties you want to view or change.
2. Click the Skype for Business Server User Properties command.
The Web Interface displays the Skype for Business Server User Properties
command if you have sufficient rights in Active Roles to view Skype for Business
Server user properties of the selected account, and the user account you have
selected is in the scope of the policy provided by Skype for Business Server User
Management and is enabled or temporarily disabled for Skype for Business Server.

3. On the page that appears, view or change the following settings:


l Enabled for Skype for Business Server Indicates whether or not the user
is enabled to log on to Skype for Business Server. If you clear this check box,
the user will no longer be able to log on to Skype for Business Server. Selecting
this check box re-enables the user to log on to Skype for Business Server. The
function of this check box is equivalent to the Temporarily Disable for
Skype for Business Server and Re-enable for Skype for Business
Server commands (see Disable or re-enable a user account for Skype for
Business Server).
l SIP address Indicates the user’s SIP address (SIP URI), a unique identifier
that allows the user to communicate using SIP devices such as Microsoft Skype
for Business. The SIP address consists of the SIP user name on the left side of
the @ symbol, and the SIP domain name on the right side. It must be prefaced
by “sip:”; for example, sip:[email protected].

Active Roles 7.5.4 Solutions Guide


118
Skype for Business Server Solution
l Registrar pool Identifies the Enterprise Edition Front End pool or Standard
Edition server where the Skype for Business Server user is homed. If you need
to move the user to a different server or pool, see Move a user to another
server or pool in Skype for Business Server later in this document.
l Telephony Specifies whether the Skype for Business Server user can make
PC-to-PC calls with audio and video, route incoming and outgoing calls, and
control the desktop phone. The possible telephony options are as follows:
l PC-to-PC only The user can make only PC-to-PC audio or video calls.
l Audio/video disabled The user cannot make calls with audio and
video.
l Remote call control The user can use Skype for Business Server to
control the desktop phone, and can also make PC-to-PC calls.
l Enterprise Voice The user can use Skype for Business Server to route
all incoming and outgoing calls, and can also make PC-to-PC calls.
l Remote call control only The user can use Skype for Business Server
to control the desktop phone, but cannot make PC-to-PC audio calls.
l Line URI Applies to all telephony options but Audio/video disabled.
Specifies the primary phone number assigned to the Skype for Business
Server user.
The line URI must use the E.164 format and have the "TEL:" prefix. For
example: TEL:+12345678997. The extension number, if any, should be added
at the end of the line URI, for example: TEL:+12345678997;ext=65431.
l Line server URI Applies to the Remote call control and Remote call
control only options. Specifies the URI of the remote call control telephone
gateway assigned to the Skype for Business Server user.
The line server URI is the gateway URI, prefaced by “sip:”; for example,
sip:[email protected].
l Dial plan policy Applies to the Enterprise Voice option. Identifies the dial
plan currently assigned to the Skype for Business Server user, and allows you
to assign a different dial plan.
l Voice policy Applies to the Enterprise Voice option. Identifies the voice
policy currently assigned to the Skype for Business Server user, and allows you
to assign a different voice policy.
l Conferencing policy Identifies the conferencing policy currently assigned to
the Skype for Business Server user, and allows you to assign a different
conferencing policy to the user.
l Conferencing policy Identifies the conferencing policy currently assigned to
the Skype for Business Server user, and allows you to assign a different
conferencing policy to the user.
l Client version policy Identifies the client version policy currently assigned to
the Skype for Business Server user, and allows you to assign a different client
version policy.

Active Roles 7.5.4 Solutions Guide


119
Skype for Business Server Solution
l PIN policy Identifies the personal identification number (PIN) policy currently
assigned to the Skype for Business Server user, and allows you to assign a
different PIN policy.
l External access policy Identifies the external access policy currently
assigned to the Skype for Business Server user, and allows you to assign a
different external access policy.
l Archiving policy Identifies the archiving policy currently assigned to the
Skype for Business Server user, and allows you to assign a different
archiving policy.
l Location policy Identifies the location policy currently assigned to the Skype
for Business Server user, and allows you to assign a different location policy.
l Mobility policy Identifies the mobility policy currently assigned to the Skype
for Business Server user, and allows you to assign a different mobility policy.
l Persistent Chat policy Identifies the persistent chat policy currently
assigned to the Skype for Business Server user, and allows you to assign a
different persistent chat policy.
l Client policy Identifies the client policy currently assigned to the Skype for
Business Server user, and allows you to assign a different client policy.

Skype for Business Server user account properties allow you to assign certain policies to a
Skype for Business Server user in order to specify particular settings that differ from the
settings defined in policies assigned to other users, such as global policies. These policies
are referred to as user policies.
In Skype for Business Server, deploying and assigning user policies is optional. It is
possible to deploy only global policies or site policies. If user policies are deployed, they
must be assigned to users explicitly. When managing Skype for Business Server user
settings, you can select the appropriate user policy from a list. The list also includes the
<Automatic> entry. If <Automatic> is selected, the global policy (or, if defined, the site
policy) is assigned to the user.

Move a user to another server or pool in Skype for


Business Server
For a user account that is enabled or temporarily disabled for Skype for Business Server,
you can use the Active Roles Web Interface to move the user account to a specific
Enterprise Edition Front End pool or Standard Edition server.

To move a Skype for Business Server user account to a different server or pool

1. In the Active Roles Web Interface for administrators, select the user account you
want to move.
2. Click the Move to Skype for Business Server Pool command.
The Web Interface displays the Move to Skype for Business Server Pool
command if you have sufficient rights in Active Roles to perform that command, and
the user account you have selected is in the scope of the policy provided by Skype for

Active Roles 7.5.4 Solutions Guide


120
Skype for Business Server Solution
Business Server User Management and is enabled or temporarily disabled for Skype
for Business Server.

3. On the page that appears, select the server or pool to which you want to move the
Skype for Business Server user.
4. Click Finish.

Active Roles 7.5.4 Solutions Guide


121
Skype for Business Server Solution
6

Management Pack for SCOM

The Active Roles Management Pack for Microsoft System Center Operations Manager
(SCOM) provides a basic solution for monitoring availability and health of the Active Roles
Administration Service and its information store, Active Roles replication status, and
availability of the Active Roles Web Interface. By detecting, alerting on, and automatically
responding to critical events, the Management Pack helps indicate, correct, and in many
cases prevent outages of the Administration Service and Web Interface.

Features
The Management Pack provides the features that you need to monitor your Active Roles
environment, such as automated discovery, availability and performance monitoring, and
replication monitoring. The Management Pack alerts you to the following error conditions:
l Administration Service is not responding
l Active Roles replication failure has occurred
l Connection to the Active Roles database has been lost
l Administration Service failed to update a Dynamic Group
l Administration Service failed to update a Group Family
l Active Roles Web Interface is unavailable

Monitoring views
The monitoring views are used to centrally monitor availability and health of the Active
Roles components in the Operations Manager console’s Monitoring pane. The Management
Pack provides the following views:
l Alerts Displays the alerts on the computers running the Active Roles Administration
Service or Web Interface.

Active Roles 7.5.4 Solutions Guide


122
Management Pack for SCOM
l Computers Shows information about the state of the computers running the Active
Roles Administration Service or Web Interface.
l Events Displays the events on the computers running the Active Roles
Administration Service or Web Interface.
l Performance Shows performance information collected from the computers
running the Active Roles Administration Service or Web Interface.
l Service Level Exceptions Displays the unresolved alerts that have exceeded
service levels on the computers running the Active Roles Administration Service or
Web Interface.
l Task Status Shows information indicating task results on the computers running
the Active Roles Administration Service or Web Interface.
l Discovery Contains separate views allowing you to examine the state of the
computers running the Web Interface, computers running the Administration
Service, and computers running the Web Interface or Administration Service.
l Services Monitoring Contains the views allowing you to monitor availability, health
and performance of the Administration Service instances in your environment.
l Web Interfaces Monitoring Contains the views allowing you to monitor
availability and health of the Web Interface instances in your environment.

Getting started
Install the Management Pack by importing the ActiveRoles.SCOM.MP.xml file into System
Center Operations Manager (SCOM). You can install this Management Pack on the following
SCOM versions:
l System Center Operations Manager 2007 R2
l System Center 2012 - Operations Manager
l System Center Operations Manager 2016
l System Center Operations Manager 2019

Monitoring Active Roles Administration


Service
This section briefly discusses the processing rules that the Management Pack uses to
monitor availability and health of the Active Roles Administration Service:
l General response
l Replication monitoring
l Monitoring of connection to configuration database

Active Roles 7.5.4 Solutions Guide


123
Management Pack for SCOM
l Monitoring of Dynamic Group-related operations
l Monitoring of Group Family-related operations
l Internal error
l Critical error on startup
l License system failure

Monitoring of general response and replication is performed by using custom, script-based


processing rules. Those rules run on a scheduled basis, analyzing information returned by
the scripts and raising an appropriate event if an error situation is detected. The schedule is
stored as part of rule configuration data, and can be adjusted by managing rule properties
in the Operations Manager console.

General response - Script


This rule uses a script to check the responsiveness of the Administration Service by
periodically issuing a simple request to the Service. By default, this rule is scheduled to run
every 10 minutes. The schedule can be adjusted by managing rule properties in the
Operations Manager console.

General response - Alert


This rule generates an alert when the General response script detects that the
Administration Service is unavailable.
Possible causes of the alert include:
l Administration Service is not running
l Administration Service is not configured properly
l Administration Service has encountered a critical error
l Administration database is unavailable

Replication monitoring - Script


This rule uses a script to check the status of Active Roles replication. The script is intended
to run on the Publisher Administration Service so as to verify the replication status of the
Publisher and Subscribers. By default, this rule is scheduled to run every 30 minutes. The
schedule can be adjusted by managing rule properties in the Operations Manager console.

Active Roles 7.5.4 Solutions Guide


124
Management Pack for SCOM
Replication monitoring - Alert
This rule generates an alert when the Replication monitoring script detects that the
Active Roles replication status indicates a replication failure.
Possible causes of the alert include:
l The SQL Server Agent service is not started on the computer running the
Publisher SQL Server
l The Snapshot Agent or a Merge Agent is not started at the Publisher SQL Server
l The Merge Agent uses incorrect credentials when connecting to the Publisher or
a Subscriber
l The Snapshot Agent uses incorrect credentials when connecting to the Publisher

For more information, and details on how resolve replication-related problems, refer to the
“Troubleshooting” section in the Replication: Best Practices and Troubleshooting document,
which is part of the Active Roles product documentation set.

Monitoring connection to configuration


database
This category includes the event-based processing rules to monitor health of the
connection to the configuration database:
l Connection to database has been lost Administration Service has lost
connection to the configuration database, and is making attempts to re-establish the
connection.
l Connection to database has been restored Administration Service has restored
connection to the configuration database.

The following sub-sections elaborate on each of these processing rules.

Connection to database has been lost - Alert


This rule generates an alert indicating that the Administration Service has lost a
connection to the configuration database, and is making attempts to restore the
connection. For details, refer to the alert description generated by this rule. Losing the
connection to the database does not affect the directory management functions of the
Administration Service. All operations related to Active Directory management continue to
work as expected.
Until after the connection has been restored, unavailable are the functions of the
Administration Service that require access to the database. These include:

Active Roles 7.5.4 Solutions Guide


125
Management Pack for SCOM
l Collecting data related to change history and user activity
l Retrieving and updating configuration data
l Retrieving changes to configuration data made by other Administration Services
(both directly and via replication)
l Retrieving and updating virtual attributes stored in the configuration database

Connection to database has been restored - Alert


This rule generates an alert indicating that the Administration Service has restored the
connection to the configuration database. For details, refer to the alert description
generated by this rule. Once the connection has been restored, available are all the
functions of the Administration Service that require access to the database.

Monitoring of Dynamic Group-related


operations
This category includes the event-based processing rules to monitor the background
activities of Active Roles related to Dynamic Groups:
l Rebuilding has been started Administration Service has been forced to re-
calculate (rebuild) the membership list of a Dynamic Group.
l Failed to add object to Dynamic Group Administration Service failed to add an
object to a Dynamic Group.
l Failed to remove object from Dynamic Group Administration Service failed to
remove an object from a Dynamic Group.
l Failed to process membership rule Administration Service failed to apply a
query-based membership rule when updating the membership list of a
Dynamic Group.
l Failed to update membership list Administration Service failed to update the
membership list of a Dynamic Group in accordance with the membership rules.
l Failed to update membership list of nested group Administration Service
failed to update the membership list of an additional (nested) group generated to
accommodate extra members of a Dynamic Group.
l Failed to update membership rule upon deletion of object When updating a
Dynamic Group, Administration Service failed to delete or update a membership rule
of a Dynamic Group upon deletion of an object.
l Failed to look up object when updating When updating a Dynamic Group,
Administration Service failed to locate an object that is referred to by a certain
membership rule. The object may have been deleted.

Active Roles 7.5.4 Solutions Guide


126
Management Pack for SCOM
l Failed to retrieve information from domain Administration Service failed to
retrieve information about Dynamic Groups from a certain domain.
l Membership rule domain unavailable When updating a Dynamic Group,
Administration Service failed to apply a membership rule because the rule applies to
a domain unavailable on the network.
l Membership rule failed When updating a Dynamic Group, Administration Service
failed to apply one of the membership rules, which prevented all rules from being
applied and stopped changes to the members list of the Dynamic Group.

The following sub-sections elaborate on each of these processing rules.

Dynamic Group - Rebuilding has been started -


Alert
This rule generates an alert indicating that an administrator has forced Active Roles to re-
calculate (rebuild) the membership list of a Dynamic Group. For details, refer to the alert
description generated by this rule.
The administrator could start the rebuilding of a Dynamic Group from the Members tab in
the Properties dialog box for that Dynamic Group, in the Active Roles console.

Failed to add object to Dynamic Group - Alert


This rule generates an alert indicating that the Administration Service failed to add an
object to a Dynamic Group due to a certain problem. The object is missing from the
Dynamic Group until after the problem has been resolved. For details, refer to the alert
description generated by this rule.
Try to force rebuilding of the Dynamic Group from the Members tab in the Properties
dialog box for that Dynamic Group, in the Active Roles console.

Failed to remove object from Dynamic Group -


Alert
This rule generates an alert indicating that the Administration Service failed to remove an
object from a Dynamic Group due to a certain problem. The object remains in the Dynamic
Group until after the problem has been resolved. For details, refer to the alert description
generated by this rule.
Try to force rebuilding of the Dynamic Group from the Members tab in the Properties
dialog box for that Dynamic Group, in the Active Roles console.

Active Roles 7.5.4 Solutions Guide


127
Management Pack for SCOM
Dynamic Group - Failed to process membership
rule - Alert
This rule generates an alert indicating that the Administration Service failed to apply a
query-based membership rule when updating the membership list of a Dynamic Group. The
failed rule is not taken into account, so the membership list may be incompliant with the
membership rules. For details, refer to the alert description generated by this rule.
Try to force rebuilding of the Dynamic Group from the Members tab in the Properties
dialog box for that Dynamic Group, in the Active Roles console. Check membership rules by
using the Membership Rules tab in that dialog box.

Dynamic Group - Failed to update membership


list - Alert
This rule generates an alert indicating that the Administration Service failed to update the
membership list of a Dynamic Group in accordance with the membership rules. The
membership list may be incompliant with the membership rules. For details, refer to the
alert description generated by this rule.
Try to force rebuilding of the Dynamic Group from the Members tab in the Properties
dialog box for that Dynamic Group, in the Active Roles console.

Dynamic Group - Failed to update membership list


of nested group - Alert
This rule generates an alert indicating that the Administration Service failed to update the
membership list of an additional (nested) group generated to accommodate extra
members of a Dynamic Group. The membership list of the nested group may be
incompliant with the membership rules. For details, refer to the alert description generated
by this rule.
Try to force rebuilding of the Dynamic Group from the Members tab in the Properties
dialog box for that Dynamic Group, in the Active Roles console.

Dynamic Group - Failed to update membership


rule upon deletion of object - Alert
This rule generates an alert indicating that the Administration Service failed to delete or
update a membership rule of a Dynamic Group upon deletion of a certain object. The
membership rule could be one of the following:

Active Roles 7.5.4 Solutions Guide


128
Management Pack for SCOM
l Implicit inclusion or exclusion of that object from the Dynamic Group
l Query with a filter referring to that object
l Inclusion or exclusion of the members of the group represented by that object

For details, refer to the alert description generated by this rule.


To resolve these issues, delete or update membership rules by using the
Membership Rules tab in the Properties dialog box for that Dynamic Group, in the
Active Roles console. Then, force rebuilding of the Dynamic Group from the Members
tab in that dialog box.

Dynamic Group - Failed to look up object when


updating - Alert
This rule generates an alert indicating that the Administration Service failed to locate an
object when updating the membership list of a Dynamic Group in accordance with the
membership rules. The object may have been deleted. The object could be referred to by:
l A membership rule to explicitly include or exclude that object from the
Dynamic Group
l A query-based membership rule (the object may represent the base of a search or be
a member of the search result set)
l A membership rule to include or exclude the members of a certain group (the object
may represent the domain of that group)
l A directory synchronization (DirSync) query (this may be one of the objects returned
by that query)

For details, refer to the alert description generated by this rule.


The membership rules referring to that object are inoperative and are not taken into
account when updating the Dynamic Group, so the membership list may be incompliant
with the membership rules.
To prevent issues with the membership list of the Dynamic Group, check membership rules
by using the Membership Rules tab in the Properties dialog box for that Dynamic Group,
in the Active Roles console. Then, force rebuilding of the Dynamic Group from the
Members tab in that dialog box.

Dynamic Group - Failed to retrieve information


from domain - Alert
This rule generates an alert indicating that the Administration Service failed to retrieve
information about Dynamic Groups from a certain domain. The Dynamic Groups contained
in that domain are inoperative until after the problem has been resolved. For details, refer
to the alert description generated by this rule.

Active Roles 7.5.4 Solutions Guide


129
Management Pack for SCOM
Dynamic Group - Membership rule domain
unavailable - Alert
This rule generates an alert indicating that Active Roles failed to update the members list of
the Dynamic Group in accordance with one of the membership rules. The failed
membership rule applies to a domain that is currently unavailable. The membership rule is
disregarded, so the members list of the Dynamic Group may be incompliant with the
membership rules. For details, refer to the alert description generated by this rule.
Ensure that the domain is available on the network, and then update the Dynamic Group by
clicking Rebuild on the Members tab in the Properties dialog box for that group in the
Active Roles console or wait for Active Roles to update the Dynamic Group on a schedule.

Dynamic Group - Membership rule failed - Alert


This rule generates an alert indicating that Active Roles failed to update the members list of
the Dynamic Group in accordance with one of the membership rules. As one of the
membership rules failed, no membership rules are applied until the issue is resolved, so the
members list of this Dynamic Group remains unchanged. For details, refer to the alert
description generated by this rule.
Try forcing update of the Dynamic Group by clicking Rebuild on the Members tab in the
Properties dialog box for that group in the Active Roles console. Check the membership
rules on the Membership Rules tab in that dialog box.

Monitoring of Group Family-related


operations
This category includes the event-based processing rules to monitor the background
activities of Active Roles related to Group Families:
l Cannot find configuration storage group Administration Service failed to run a
Group Family due to the following problem: The Group Family configuration storage
group cannot be found.
l Failed to retrieve configuration data Administration Service failed to run a
Group Family due to the following problem: Group Family configuration data cannot
be retrieved from the Group Family configuration storage group.
l Incorrect configuration data Administration Service failed to run a Group Family
due to the following problem: Incorrect configuration data was encountered in the
Group Family configuration storage group.
l Failed to retrieve configuration data for controlled group Administration
Service encountered an error when running a Group Family, failed to retrieve

Active Roles 7.5.4 Solutions Guide


130
Management Pack for SCOM
configuration data for a controlled group. Changes to the controlled group may not be
applied until a subsequent run of the Group Family.
l Failed to retrieve data from container Administration Service encountered an
error when running a Group Family, failed to search a certain container within the
Group Family scope. Until a subsequent run, Group Family does not consider
information about objects held in that container.
l Failed to update configuration data Administration Service encountered an error
when running a Group Family, failed to update data in the Group Family configuration
storage group. Information about controlled groups may be incorrect until a
subsequent run of the Group Family.
l Failed to update configuration data for controlled group Administration
Service encountered an error when running a Group Family, failed to update
configuration data for a controlled group. The controlled group is not linked with the
Group Family until a subsequent run of the Group Family.
l Cannot find controlled group Administration Service encountered an error when
running a Group Family, failed to find a controlled group. Changes to the controlled
group, if any, are not applied until a subsequent run of the Group Family.
l Failed to create controlled group Administration Service encountered an error
when running a Group Family, failed to create a controlled group. Administration
Service will attempt to create that controlled group during a subsequent run of the
Group Family.
l Failed to update membership list of controlled group Administration Service
encountered an error when running a Group Family, failed to update membership
data for a controlled group. The membership list of the controlled group may be
incorrect until a subsequent run of the Group Family.
l Failed to create run task Administration Service failed to create a task to run a
Group Family. The Group Family is inoperative until the task is created.
l Failed to modify run task Administration Service failed to update a task to run a
Group Family. The Group Family runs in accordance with the earlier schedule settings
of that task.
l Failed to delete run task Administration Service failed to delete a task to run a
Group Family. The Group Family continues to run in accordance with the schedule
settings of that task.
l Run task has been started manually A task to run a Group Family was
started manually.
l Group Family run has been completed Administration Service has completed a
run of a Group Family.

Group Family - Cannot find configuration storage


group - Alert
This rule generates an alert indicating that the Administration Service failed to run a Group
Family due to the following problem: The Group Family configuration storage group cannot

Active Roles 7.5.4 Solutions Guide


131
Management Pack for SCOM
be found. The Administration Service cannot run the Group Family until the problem is
resolved.
The configuration storage group may have been either inaccessible or deleted. For details,
refer to the alert description generated by this rule.

Group Family - Failed to retrieve configuration


data - Alert
This rule generates an alert indicating that the Administration Service encountered the
following problem when running a Group Family: Group Family configuration data cannot
be retrieved from the configuration storage group. The Administration Service cannot run
the Group Family until the problem is resolved. For details, refer to the alert description
generated by this rule.

Group Family - Incorrect configuration data -


Alert
This rule generates an alert indicating that the Administration Service failed to run a Group
Family due to the following problem: Incorrect configuration data was encountered in the
Group Family configuration storage group. The configuration storage group may have been
corrupted. The run of the Group Family has been canceled. For details, refer to the alert
description generated by this rule.

Group Family - Failed to retrieve configuration


data for controlled group - Alert
This rule generates an alert indicating that the Administration Service encountered the
following problem when running a Group Family: Failed to retrieve configuration data for a
certain group that is under the control of the Group Family (controlled group). Changes to
the controlled group may not be applied until a subsequent run of the Group Family. For
details, refer to the alert description generated by this rule.

Group Family - Failed to retrieve data from


container - Alert
This rule generates an alert indicating that the Administration Service encountered the
following problem when running a Group Family: Failed to search a certain container within
the Group Family scope. The groupings that were calculated during this run of the Group
Family may not take into account information about some objects held in that container.
For details, refer to the alert description generated by this rule.

Active Roles 7.5.4 Solutions Guide


132
Management Pack for SCOM
During a subsequent run of the Group Family, the Administration Service will attempt to
search the entire Group Family scope, including the failed container, in order to re-calculate
the Group Family groupings.

Group Family - Failed to update configuration


data - Alert
This rule generates an alert indicating that the Administration Service encountered the
following problem when running a Group Family: Failed to update configuration data in the
Group Family configuration storage group. The Active Roles console may display incorrect
information about results of the Group Family run and about groups that are under the
control of the Group Family (controlled groups). For details, refer to the alert description
generated by this rule.
During a subsequent run of the Group Family, the Administration Service will attempt to
update configuration data in the configuration storage group.

Group Family - Failed to update configuration


data for controlled group - Alert
This rule generates an alert indicating that the Administration Service encountered the
following problem when running a Group Family: Failed to update configuration data for a
certain group that is under the control of the Group Family (controlled group). The group is
removed from the control of the Group Family. For details, refer to the alert description
generated by this rule.
During a subsequent run of the Group Family, the Administration Service will attempt to
locate the failed group and put it under the control of the Group Family.

Group Family - Cannot find controlled group -


Alert
This rule generates an alert indicating that the Administration Service encountered the
following problem when running a Group Family: Cannot find a certain group that is under
the control of the Group Family (controlled group). Some changes to the controlled group
may not be applied. For details, refer to the alert description generated by this rule.
During a subsequent run of the Group Family, the Administration Service will attempt to
locate the controlled group and apply the changes, if any, to that group.

Active Roles 7.5.4 Solutions Guide


133
Management Pack for SCOM
Group Family - Failed to create controlled group
- Alert
This rule generates an alert indicating that the Administration Service encountered the
following problem when running a Group Family: Failed to create a certain group to be put
under the control of the Group Family (controlled group). For details, refer to the alert
description generated by this rule.
During a subsequent run of the Group Family, the Administration Service will attempt to
create the controlled group and apply the changes, if any, to that group.

Group Family - Failed to update membership list


of controlled group - Alert
This rule generates an alert indicating that the Administration Service encountered the
following problem when running a Group Family: Failed to update the membership list of a
certain group that is under the control of the Group Family (controlled group). Some
changes to the membership list of the controlled group may not be applied. For details,
refer to the alert description generated by this rule.
During a subsequent run of the Group Family, the Administration Service will attempt
to locate the controlled group and apply the changes, if any, to the membership list
of that group.

Group Family - Failed to create run task - Alert


This rule generates an alert indicating that the Administration Service failed to create a task
to run a Group Family. The Group Family is inoperative until the task is created. For details,
refer to the alert description generated by this rule.

Group Family - Failed to modify run task - Alert


This rule generates an alert indicating that the Administration Service failed to update a
task to run a Group Family. The Group Family continues to run in accordance with the
earlier schedule settings of that task. For details, refer to the alert description generated
by this rule.
Try to adjust the schedule settings by using the Schedule tab in the Properties dialog box
for the Group Family configuration storage group, in the Active Roles console.

Active Roles 7.5.4 Solutions Guide


134
Management Pack for SCOM
Group Family - Failed to delete run task - Alert
This rule generates an alert indicating that the Administration Service failed to delete a task
to run a Group Family while the configuration storage group of that Group Family was
successfully deleted. The Group Family continues to run in accordance with the schedule
settings of that task, which may cause an error situation. For details, refer to the alert
description generated by this rule.
Delete the run task manually. You can do this by switching the Active Roles console into
Raw view mode, and then deleting the appropriate task from the Configuration/Server
Configuration/Scheduled Tasks/Group Family container.

Group Family - Run task has been started


manually - Alert
This rule generates an alert indicating that an administrator has forced Active Roles to run a
Group Family. For details, refer to the alert description generated by this rule.
The administrator could start the run task for a Group Family by using the Force
Run command on the configuration storage group of that Group Family, in the Active
Roles console.

Group Family run has been completed - Alert


This rule generates an alert indicating that the Administration Service has completed
the run task for a Group Family. For task results, refer to the alert description
generated by this rule.
The alert description also includes the name of the Group Family configuration storage
group, so you could use the Properties dialog box for that group in order to examine task
results in more detail.

Internal error - Alert


This rule generates an alert when a fatal error occurs at Administration Service run time.
Normally, the alert indicates that Administration Service execution stopped.

Critical error on startup - Alert


This rule generates an alert when a fatal error occurs at Administration Service startup
time. The alert includes information detailing the error.

Active Roles 7.5.4 Solutions Guide


135
Management Pack for SCOM
License system failure - Alert
This rule generates an alert when a failure occurs in the Administration Service licensing
system. The alert includes information detailing the problem.

Monitoring Active Roles Web Interface


This section briefly discusses the processing rules that you can use to monitor availability of
the Active Roles Web Interface.

Availability - Script
This rule uses a script to check the availability of the Web Interface. The script invokes a
self-diagnostic script built into the Web Interface so as to verify the Web Interface
configuration, including the customization settings, and to check whether the
Administration Service is available.
The rule ensures that both the default and customized Web Interface sites are monitored
properly if customization is performed by using the point-and-click tools included in the
Web Interface.
The rule does not check the availability of the Web Interface functions that are based on
custom ASP files integrated with the Web Interface, if any. An additional, custom rule
needs to be implemented in Operations Manager to monitor such functions.
By default, this rule is scheduled to run every 30 minutes. The schedule can be adjusted by
managing rule properties in the Operations Manager console.

Availability - Alert
This rule generates an alert when the Availability script detects that the Web Interface is
unavailable.
l Possible causes of the alert include:
l Web Interface is not running
l Web Interface is not configured properly
l Administration Service is unavailable

Active Roles 7.5.4 Solutions Guide


136
Management Pack for SCOM
Monitoring performance
This section provides information on the processing rules based on performance counters
that allow you to evaluate performance of the Administration Service:
l AD changes processed/sec
l Changes queue length (AD + Database)
l Connected clients
l Database changes processed/sec
l LDAP operations in progress
l LDAP operations/sec
l Private bytes
l Queued post-processing policies
l Requests in progress
l Requests/sec
l Script module average execution time
l Script modules executing

AD changes processed/sec
This rule collects AD changes processed/sec counter samples for the AR
Server:External Changes performance object. A sample of the counter is the number of
changes received from Active Directory and processed by the Active Roles Administration
Service per second.

Changes queue length (AD + Database)


This rule collects Changes queue length (AD + Database) counter samples for the
AR Server:External Changes performance object. A sample of the counter is the number
of unprocessed changes that the Active Roles Administration Service received from Active
Directory and from the Active Roles database.

Connected clients
This rule collects Connected clients counter samples for the AR Server:Miscellaneous
performance object. A sample of the counter is the current number of the clients connected
to the Active Roles Administration Service.

Active Roles 7.5.4 Solutions Guide


137
Management Pack for SCOM
Database changes processed/sec
This rule collects Database changes processed/sec counter samples for the AR
Server:External Changes performance object. A sample of the counter is the number of
changes received from the Active Roles database and processed by the Active Roles
Administration Service per second.

LDAP operations in progress


This rule collects LDAP operations in progress counter samples for the AR
Server:LDAP Operations performance object. A sample of the counter is the current
number of the LDAP operation requests that are in progress on the Active Roles
Administration Service.

LDAP operations/sec
This rule collects LDAP operations/sec counter samples for the AR Server:LDAP
Operations performance object. A sample of the counter is the number of LDAP operations
executed by the Active Roles Administration Service per second.

Private bytes
This rule collects Private Bytes counter samples for the Process performance object
specific to the Active Roles Service (arssvc) process. A sample of the counter is the amount
of virtual memory (in bytes) that the Active Roles Administration Service process allocates
(process private bytes).

Queued post-processing policies


This rule collects Queued post-processing policies counter samples for the
AR Server:Miscellaneous performance object. A sample of the counter is the number of
the post-processing policy operations queued by the Active Roles Administration Service.

Requests in progress
This rule collects Requests in progress counter samples for the AR Server:Requests
performance object. A sample of the counter is the current number of the client requests

Active Roles 7.5.4 Solutions Guide


138
Management Pack for SCOM
being processed by the Active Roles Administration Service.

Requests/sec
This rule collects Requests/sec counter samples for the AR Server:Requests
performance object. A sample of the counter is the number of requests received by the
Active Roles Administration Service per second.

Script module average execution time


This rule collects Script module average execution time counter samples for the
AR Server:Script Modules performance object. A sample of the counter is the
average execution time of all script module instances run by the Active Roles
Administration Service.

Script modules executing


This rule collects Script modules executing counter samples for the AR Server:Script
Modules performance object. A sample of the counter is the current number of the script
module instances being executed by the Active Roles Administration Service.

Active Roles 7.5.4 Solutions Guide


139
Management Pack for SCOM
About us

About us

One Identity solutions eliminate the complexities and time-consuming processes often
required to govern identities, manage privileged accounts and control access. Our solutions
enhance business agility while addressing your IAM challenges with on-premises, cloud and
hybrid environments.

Contacting us
For sales and other inquiries, such as licensing, support, and renewals, visit
https://www.oneidentity.com/company/contact-us.aspx.

Technical support resources


Technical support is available to One Identity customers with a valid maintenance contract
and customers who have trial versions. You can access the Support Portal at
https://support.oneidentity.com/.
The Support Portal provides self-help tools you can use to solve problems quickly and
independently, 24 hours a day, 365 days a year. The Support Portal enables you to:
l Submit and manage a Service Request
l View Knowledge Base articles
l Sign up for product notifications
l Download software and technical documentation
l View how-to videos at www.YouTube.com/OneIdentity
l Engage in community discussions
l Chat with support engineers online
l View services to assist you with your product

Active Roles 7.5.4 Solutions Guide


140
About us

You might also like