ActiveRoles Solutions Guide
ActiveRoles Solutions Guide
Solutions Guide
Copyright 2022 One Identity LLC.
ALL RIGHTS RESERVED.
This guide contains proprietary information protected by copyright. The software described in this
guide is furnished under a software license or nondisclosure agreement. This software may be used
or copied only in accordance with the terms of the applicable agreement. No part of this guide may
be reproduced or transmitted in any form or by any means, electronic or mechanical, including
photocopying and recording for any purpose other than the purchaser’s personal use without the
written permission of One Identity LLC .
The information in this document is provided in connection with One Identity products. No license,
express or implied, by estoppel or otherwise, to any intellectual property right is granted by this
document or in connection with the sale of One Identity LLC products. EXCEPT AS SET FORTH IN THE
TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT,
ONE IDENTITY ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR
STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-
INFRINGEMENT. IN NO EVENT SHALL ONE IDENTITY BE LIABLE FOR ANY DIRECT, INDIRECT,
CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT
LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF
INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF
ONE IDENTITY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. One Identity makes
no representations or warranties with respect to the accuracy or completeness of the contents of this
document and reserves the right to make changes to specifications and product descriptions at any
time without notice. One Identity does not make any commitment to update the information
contained in this document.
If you have any questions regarding your potential use of this material, contact:
One Identity LLC.
Attn: LEGAL Dept
4 Polaris Way
Aliso Viejo, CA 92656
Refer to our Web site (http://www.OneIdentity.com) for regional and international office
information.
Patents
One Identity is proud of our advanced technology. Patents and pending patents may apply to this
product. For the most current information about applicable patents for this product, please visit our
website at http://www.OneIdentity.com/legal/patents.aspx.
Trademarks
One Identity and the One Identity logo are trademarks and registered trademarks of One Identity
LLC. in the U.S.A. and other countries. For a complete list of One Identity trademarks, please visit
our website at www.OneIdentity.com/legal. All other trademarks are the property of their
respective owners.
Legend
ERFM Solution 10
Understanding the problem 10
Understanding the solution 12
AutoProvision 12
Synchronize 13
Synchronized properties 13
Substituted properties 13
Back-synchronized properties 14
Deprovision 14
AutoProvision of distribution list manager 14
Mailbox type conversion 15
Technical description 16
Policy Object 17
Policy settings 18
Container for new shadow accounts 18
Default description for new shadow accounts 18
Attribute to store a reference to shadow account 18
Synchronized properties 19
Substituted properties 19
Back-synchronized properties 24
Policy actions 24
Scheduled Task 26
Deploying the Solution 27
Prerequisite conditions 27
Exchange Server deployment 27
Active Roles deployment 28
Applying the Policy Object 29
Upgrade from an earlier version 30
Examples of Use 31
Configuration 31
About us 140
Contacting us 140
Technical support resources 140
One Identity Active Roles is highly configurable to meet different customer requirements.
The add-on products available as part of Active Roles Solutions extend the Active Roles
native capability to provide extensible solutions to the customer based on their
requirement. For example, specific customer scenarios may involve the following:
l Multi-forest design environments.
l Transfer of Active Roles configuration between different environments.
l Exchange of user, resource, and service provisioning information between SPML-
enabled enterprise applications and Active Directory.
l Administration of Skype for Business Server user accounts.
l Monitoring availability and health of the Active Roles Administration Service and its
information store, Active Roles replication status, and availability of the Active Roles
Web Interface.
Currently, Active Roles provides the following solutions to support customer requirements
in specific environments:
l ERFM Solution
l Configuration Transfer Wizard Solution
l Active Roles SPML Provider
l Skype for Business Server Solution
l Management Pack for SCOM
Active Roles solutions are available as part of the Active Roles package. However, the
solutions can be installed on your system along with Active Roles based on the specific
requirement.
ERFM Solution
The Active Roles Exchange Resource Forest Management Solution extends the Active Roles
capabilities to enable the management of mailbox users in Exchange environments
leveraging the resource forest model.
In the scenario where multiple forests share a single Exchange organization, Exchange
servers are installed only in the Exchange forest. Users have their accounts in accounts
forests and their mailboxes are stored in the Exchange forest. To associate a user with a
mailbox, a disabled user account (shadow account) is created for that user in the Exchange
forest. A mailbox is then created for the shadow account, with a certain attribute on the
shadow account referencing the user’s account held in the accounts forest. This type of
Exchange environment is known as the Exchange resource forest model.
The main advantage of the Exchange resource forest model is a security boundary
between Active Directory and Exchange administration. Also, a single Exchange
organization provides for a single Global Address List (GAL), preserves all Exchange
collaboration capabilities, and uses native Exchange data replication, thus lowering
administrative overhead.
The major problem that arises in the resource forest model is that the separate Exchange
forest and the various accounts forests require directory synchronization between them. A
provisioning process needs to be set up so that each time an administrator creates a user
account in an accounts forest, a shadow account with a mailbox is created in the Exchange
forest. The account properties must also be synchronized between the accounts forest and
the Exchange forest. These processes cannot be automated using native Active Directory
mechanisms, which leads to the need for a third-party solution.
The AutoProvision, Synchronize, and Deprovision processes maintain the shadow accounts
in the Exchange forest in sync with the master accounts upon creation, modification,
deprovisioning, or deletion of master accounts in accounts forests.
AutoProvision
The AutoProvision process creates a shadow account in the Exchange forest upon:
l Creation of a user in the accounts forest if the option to create a mailbox for that user
is selected
l Execution of the Exchange task to create a mailbox for an existing user from the
accounts forest
Then, the AutoProvision process creates a linked mailbox associated with that shadow
account, designating the user from the accounts forest as the linked master account for
that mailbox.
To maintain a link between the master account and shadow account, Exchange Resource
Forest Management assigns the globally unique identifier (GUID) of the shadow account to
a certain attribute of the master account (the adminDescription attribute by default).
Synchronize
The Synchronize process includes the following functions:
l Updating certain properties of shadow accounts based on changes to master
accounts
l Substituting certain properties of master accounts with properties of shadow
accounts
l Updating certain properties of master accounts based on changes to shadow
accounts
Synchronized properties
When you update certain properties of a master account, Exchange Resource Forest
Management updates those properties in both the master account and shadow account.
These properties are referred to as synchronized properties.
Exchange Resource Forest Management performs synchronization of properties upon:
l Creation of shadow accounts
l Modification of master accounts
Substituted properties
When you view or change certain properties of a master account in an accounts forest,
Exchange Resource Forest Management redirects the retrieval or change request to the
properties of the shadow account in the Exchange forest. Such properties are referred to as
substituted properties.
Thus, modification of Exchange-related properties of a master account only results in
updating the corresponding properties of the shadow account. This function ensures that
administration of master accounts properly manipulates Exchange recipient properties in
the Exchange forest.
For the default list of substituted properties, see Substituted properties later in this
document. You can configure Exchange Resource Forest Management to extend that list.
Back-synchronized properties
When you change certain properties of a shadow account, Exchange Resource Forest
Management changes those properties in both the shadow account and master account.
These properties are referred to as back-synchronized properties. By default, the list of
back-synchronized properties consists of a single property—mail (E-mail Address), and
can be modified.
When a back-synchronized property of the shadow account has changed, Exchange
Resource Forest Management replicates the change to the master account. The ability to
replicate property changes from the shadow account to the master account is helpful in a
situation where certain properties are administered on the shadow account rather than the
master account.
Deprovision
The Deprovision process performs the deprovision operation on the shadow account once
the master account is deprovisioned. This causes Active Roles to execute the
deprovisioning policies that are in effect on the shadow account to deprovision the linked
mailbox of the master account. Note that the mailbox deprovisioning policies must be
applied to the container that holds shadow accounts rather than master accounts.
In Active Roles, you can undeprovision the deprovisioned master account. However, this
may not undeprovision the shadow account (and, therefore, undeprovision the linked
mailbox). For undeprovisioning master accounts to have an effect on shadow accounts, the
container that holds deprovisioned master accounts must be in the scope of the Policy
Object provided by Exchange Resource Forest Management.
With Exchange Resource Forest Management, you can use Active Roles to:
l Create a mailbox for a user account from the accounts forest.
You can create a mailbox when creating a user account in the accounts forest. It is
also possible to create a mailbox for a user account that already exists in the
accounts forest. As a result, Active Roles creates a disabled user account (shadow
account) with a linked mailbox in the Exchange forest, and associates the shadow
account and the mailbox with the user account (master account) held in the
accounts forest.
l View or change mailbox properties, and perform Exchange tasks, on a user account
from the accounts forest (master account) that has a linked mailbox in the
Exchange forest.
The pages for managing the master account include all Exchange properties and
tasks that are normally available when the mailbox resides in the same forest as the
managed user account. With Exchange Resource Forest Management, Active Roles
synchronizes the Exchange properties displayed or changed on the pages for
managing the master account with the properties of the linked mailbox.
l View or change the personal or organization-related properties of the master account
while having them synchronized to the respective properties of the shadow account.
When you use Active Roles to change the personal or organization-related properties
of the master account, Exchange Resource Forest Management causes Active Roles
to apply the changes to those properties of the shadow account as well. This function
ensures correct information about the master account in the Exchange address lists.
l Deprovision a master account while having Active Roles deprovision the master
account’s mailbox in the Exchange forest.
For example, you can apply the “Exchange - Recipients Full Control” Access Template
to a container in the accounts forest, which enables the delegated administrator to
create, view or change linked mailboxes in the Exchange forest by managing master
accounts held in that container.
l Enable a master account to update membership list of a distribution group held in the
Exchange forest.
For each master account that meets these conditions, Active Roles updates the master
account with a reference to the shadow account, thereby extending the capabilities of
Exchange Resource Forest Management to that master account and its linked mailbox. As a
result, the linked mailbox falls under the control of Exchange Resource Forest
Management.
Policy Object
Exchange Resource Forest Management uses a Policy Object to implement mailbox
management policy for Exchange resource forest topology. This policy enables Active Roles
to create and manage linked mailboxes in the resource forest by administering linked
master accounts in an accounts forest. The Policy Object is in the
Configuration/Policies/Administration/Builtin container. The name of the Policy
Object is Built-in Policy - ERFM - Mailbox Management.
To enable Exchange Resource Forest Management, you need to apply that Policy Object to
the domain or container that holds linked master accounts you want Active Roles to
administer.
Substituted properties
The policy defines a list of properties that appear on the master account but reflect the
properties of the linked mailbox or shadow account. These properties are referred to as
substituted properties. When you use Active Roles to view properties of a master account,
the policy causes Active Roles to retrieve the values of the master account’s substituted
properties from the shadow account. When you use Active Roles to set or change a
adminDisplayName edsva-MsExch-AllowRecurringMeetings
altRecipient edsva-MsExch-AllRequestInPolicy
altRecipientBL edsva-MsExch-AllRequestOutOfPolicy
authOrig edsva-MsExch-ApplyEmailAddressPolicy
authOrigBL edsva-MsExch-ArchiveMailboxDatabase
autoReply edsva-MsExch-ArchiveMailboxEnabled
autoReplyMessage edsva-MsExch-ArchiveMailboxName
deletedItemFlags edsva-MsExch-ArchiveMailboxQuota
delivContLength edsva-MsExch-
ArchiveMailboxWarningQuota
deliverAndRedirect
edsva-MsExch-AutoReplyExternalAudience
deliveryMechanism
edsva-MsExch-AutoReplyExternalMessage
delivExtContTypes
edsva-MsExch-AutoReplyInternalMessage
displayNamePrintable
edsva-MsExch-AutoReplyState
dLMemDefault
edsva-MsExch-BookingWindowInDays
dLMemRejectPerms
edsva-MsExch-BookInPolicy-DN
dLMemSubmitPerms
edsva-MsExch-BypassModerationFor
dnQualifier
edsva-MsExch-ConflictPercentageAllowed
edsaAdminGroup
edsva-MsExch-DeleteAttachments
edsaAllExchangeTasks
edsva-MsExch-DeleteComments
edsaCreateMsExchMailbox
edsva-MsExch-DeleteNonCalendarItems
edsaDeleteEmail
edsva-MsExch-DeleteSubject
edsaDeleteMailbox
edsva-MsExch-EnableArchiveMailbox
edsaEstablishEmail
edsva-MsExch-EnableCalendarAttendant
edsaEstablishGroupEmail
edsva-MsExch-
edsva-MsExch-ResourceCapacity forwardingAddress
edsva-MsExch-ResourceCapacity garbageCollPeriod
edsva-MsExch-ResourceCustomProperties heuristics
edsva-MsExch-ResourceDelegates-DN homeMDB
edsva-MsExch-RetentionComment homeMTA
edsva-MsExch-RetentionHoldEnabled importedFrom
edsva-MsExch-RetentionPolicy-DN internetEncoding
edsva-MsExch-RetentionUrl language
edsva-MsExch-RoleAssignmentPolicyDN languageCode
edsva-MsExch- legacyExchangeDN
ScheduleOnlyDuringWorkHours mailNickname
edsva-MsExch-SharedMailboxUsers mAPIRecipient
edsva-MsExch-SharingPolicyDN mDBOverHardQuotaLimit
edsva-MsExch-StartDateForRetentionHold mDBOverQuotaLimit
edsva-MsExch-TentativePendingApproval mDBStorageQuota
edsva-MsExch- mDBUseDefaults
UMAnonymousCallersCanLeaveMessages
msExchADCGlobalNames
edsva-MsExch-
UMAutomaticSpeechRecognitionEnabled msExchALObjectVersion
edsva-MsExch-UM- msExchConferenceMailboxBL
CallAnsweringRulesEnabled msExchControllingZone
edsva-MsExch-UM- msExchCustomProxyAddresses
CallsFromNonUsersAllowed
msExchExpansionServerName
edsva-MsExch-UM-DialPlanDN
msExchFBURL
edsva-MsExch-UM-ExtensionNumbers
msExchTUIPassword
edsva-MsExch-UM-FaxEnabled
msExchTUISpeed
NOTE:
l The substitute attribute, mail can now be used optionally instead of using it as a
hard-coded attribute.
l If the mail attribute is removed, then a default value is not set in the master
account during user provisioning. Use a script or a policy to set the mail attribute.
For example,
function onPostCreate($Request)
{
$userDN=$Request.DN
$userObject=Get-QADObject $userDN -IncludeAllProperties
Set-QADObject $userDN -ObjectAttributes @
{mail=$userObject.edsaUPNPrefix+"@<domain>"} -proxy
}
Back-synchronized properties
The policy defines a list of properties to copy from the shadow account to the master
account. By default, the list contains a single property, E-Mail Address (mail). When
the e-mail address has changed on the shadow account (which is normally the case
when Exchange Server creates a linked mailbox), the policy ensures that the e-mail
address is correctly set on the master account by copying the e-mail address form the
shadow account.
Policy actions
The mailbox management policy causes Active Roles to perform the following actions
depending on the change request submitted to the Active Roles Administration Service.
Request Actions
Create a new user with Active Roles creates the new user (in the accounts forest), and
mailbox then performs the following actions:
l Create a shadow account (in the Exchange forest), and
populate its properties with the data found in the
request
l Create a linked mailbox using that shadow account, with
the new user (from the accounts forest) specified as the
linked master account
l Create a reference to the shadow account on the master
account
l Update the master account with the e-mail address of
the linked mailbox
Create a mailbox for an Active Roles retrieves the properties of the existing user (in
existing user the accounts forest), and then performs the following actions:
l Create a shadow account (in the Exchange forest), and
populate its properties with the properties of the existing
user
l Create a linked mailbox using that shadow account, with
the existing user (from the accounts forest) specified as
the linked master account
l Create a reference to the shadow account on the master
account
l Update the master account with the e-mail address of
the linked mailbox
Perform an Exchange Active Roles applies the Exchange task to the shadow account
task on a master of that master account.
account
Deprovision a master Active Roles deprovisions the master account, and then
account deprovisions the shadow account. When deprovisioning the
shadow account, Active Roles executes all deprovisioning
policies that are applied to the container that holds the shadow
account, including the mailbox deprovisioning policies. To
have an effect, mailbox deprovisioning policies must be
applied to the container that holds shadow accounts (rather
than master accounts).
Delete a master account Active Roles deletes the master account, and then performs
the “Disable mailbox” task on the shadow account.
Scheduled Task
Exchange Resource Forest Management includes an Active Roles scheduled task that
complements the mailbox management policy to enforce synchronization of master and
shadow account properties, and to capture existing linked mailboxes whose master account
is put under the control of that policy. The scheduled task object is in the
Configuration/Server Configuration/Scheduled Tasks/Builtin container. The name
of the object is ERFM - Mailbox Management. The task is scheduled to run on a daily
basis. Normally, you do not need to modify that scheduled task.
The operation of the task affects only the user accounts that are in the scope of the Built-in
Policy - ERFM - Mailbox Management Policy Object (or a copy of that Policy Object).
When run, the task performs the following actions on each of those user accounts:
This action ensures that the shadow account properties are updated with the latest
changes to the master account properties and vice versa.
l If the shadow account is the manager (or a secondary owner) who can update
membership list of a particular group, then the task checks that group to see if the
master account can update membership list as well, and, if necessary, gives the
master account the right to update membership list.
This action synchronizes the group manager rights of the master account with the
group manager rights of the shadow account, thereby enabling the mailbox logon
account (which is the master account) to add or remove members from distribution
lists by using Outlook or Outlook Web App.
Prerequisite conditions
This section summarizes the prerequisite conditions that must be met before you deploy
Exchange Resource Forest Management.
You can install these components on member servers in an accounts forest or in the
Exchange forest. For installation instructions, see the Active Roles Quick Start Guide.
When registering a domain, you are prompted to choose which account you want the
Administration Service to use to access the domain. You can either specify a so-called
override account or let the Administration Service use its service account. With either
option, the account must have sufficient rights in the domain you are registering. At a
minimum, the account must have the following rights:
For instructions on how to register domains with Active Roles, see “Adding and removing
managed domains” in the Active Roles Administrator Guide.
Out of the box, the Policy Object has all policy settings configured. You can use the Active
Roles console to view or change policy settings as needed.
For detailed description of the policy settings, see Policy settings earlier in this document.
1. Inspect your current configuration of Quick Connect for Exchange Resource Forests,
and note down the existing policy settings such as:
l The container for new shadow accounts, identified by the Default Mailbox OU
policy parameter.
l The default description for new shadow accounts, identified by the Shadow
account description policy parameter.
l The attribute to store a reference to shadow account, identified by the
Attribute to store back link policy parameter.
l The list of synchronized properties, identified by the Synchronized
Attributes List policy parameter.
l The custom list of substituted properties (if any)), identified by the
Substituted Attributes List policy parameter.
l The list of back-synchronized properties, identified by the Back-synchronized
attributes list policy parameter.
For instructions on how to access policy parameters, see the “Set Up and Apply the
Policy Objects” topic in the Quick Connect for Exchange Resource Forests
Administrator Guide.
2. Uninstall the earlier version of the ERFM add-on from the system.
NOTE: If ERFM (Exchange Resource Forest Management) is installed on the Active
Roles 6.x version, it must be uninstalled before installing Active Roles 7.4, as ERFM
is now part of the product. Failure to uninstall ERFM may result in conflicts and
issueseplace this text with a description of a feature that is noteworthy.
3. Upgrade to Active Roles version 7.5.4. For upgrade instructions, see the Active Roles
7.5.4 Quick Start Guide.
4. Adjust the policy settings in the Exchange Resource Forest Management Policy Object
to match the settings you noted down in Step 1, and then link that Policy Object to
the containers that hold the master accounts you managed using Quick Connect for
Exchange Resource Forests. For instructions on how to configure and link that Policy
Object, see Applying the Policy Object earlier in this document.
Examples of Use
l Configuration
l Mailbox creation
l Account modification
l Account deprovisioning
l Membership management delegation
l Mailbox type conversion
Configuration
The examples in this chapter assume the following configuration of Exchange Resource
Forest Management:
l Accounts is the name of an organizational unit in a managed domain of an
accounts forest.
l Mailboxes is the name of an organizational unit in a managed domain of the
Exchange forest.
l The the Built-in Policy - ERFM - Mailbox Management Policy Object is linked to
the Accounts OU.
l In the policy settings, the Mailboxes OU is selected as the container for new shadow
accounts. Other policy settings are not modified so they have the default values.
In other words, the Accounts OU holds user accounts that are under the control of
Exchange Resource Forest Management; the Mailboxes OU is intended to hold new
shadow user accounts. Once a user account in the Accounts OU is mailbox-enabled, a
shadow account along with a linked mailbox is created in the Mailboxes OU and associated
with the user account from the Accounts OU, to provide access to the mailbox.
Under these assumptions, the following examples are considered:
l Creating a user account in the Accounts OU, with the option to create a mailbox
for that user
Mailbox creation
This section demonstrates how Exchange Resource Forest Management automates creation
of mailboxes in the Exchange forest for user accounts held in an accounts forest. The
following examples are considered:
l Creating a new user account with a mailbox
l Creating a mailbox for an existing user account
NOTE: Mailboxes can be created only for Users, enabling mailbox for a Contact is
not allowed.
1. In the Web Interface, select the Accounts OU, and then choose the New
User command.
2. Fill in the fields on the pages for creating a user account.
3. Select the Create an Exchange mailbox check box, modify the alias if necessary,
and click Browse to select the appropriate mailbox database.
The list in the Select Mailbox Database dialog box contains the mailbox databases
found in the Exchange forest. The list can be restricted by applying an Exchange
Mailbox AutoProvisioning policy to the Mailboxes OU in the Exchange forest.
As a result, a new shadow account with a linked mailbox is created in the Mailboxes OU.
The user account you have created in the Accounts OU is specified as the linked master
account for that mailbox.
1. In the Web Interface, select the user account in the Accounts OU, and then choose
the Create User Mailbox command.
2. On the Mailbox Settings page, modify the alias if necessary, and click Browse to
select the appropriate mailbox database.
The list in the Select Mailbox Database dialog box contains the mailbox databases
found in the Exchange forest. The list can be restricted by applying an Exchange
Mailbox AutoProvisioning policy to the Mailboxes OU in the Exchange forest.
3. Click Finish.
As a result, a new shadow account with a linked mailbox is created in the Mailboxes OU.
The user account you selected in the Accounts OU is specified as the linked master
account for that mailbox.
Account modification
This section demonstrates how Exchange Resource Forest Management handles the
changes you make to a master account. Making changes to certain properties results in
updating data in both the master account and shadow account, whereas modification of
some other properties only updates data in the shadow account. Therefore, two examples
are considered:
l Making changes to synchronized properties
l Making changes to substituted properties
1. In the Web Interface, select a mailbox-enabled user account held in the Accounts
OU, and then choose the General Properties command.
2. On the General tab, make changes to the First name or Last name field.
3. Go to the Organization tab and make changes to the Title, Department, or
Company field.
4. Click Save to apply your changes.
5. Locate the shadow account in the Mailboxes OU—the name of the shadow account is
identical to the name of the master account you have modified in the Accounts OU.
6. Choose the Properties command for the shadow account.
7. Examine data on the General and Organization tabs to verify that the changes you
have made to the master account are also applied to the shadow account.
You can review the updates to the account properties by using the Change History
command on the master account and on the shadow account—the Change History results
provide information on which properties were updated, what changes were made to the
properties, who performed the update, and when.
1. In the Web Interface, select a mailbox-enabled user account held in the Accounts
OU, and then choose the Exchange Properties command.
2. View or change the settings on the following tabs:
l General
l E-mail Addresses
l Mailbox Features
Once you have completed these steps, your changes are applied to the shadow account
associated with the master account you were administering. You can verify this by using
the Change History command on the shadow account. The Change History results
indicate that the changes were actually made to the properties of the shadow account, in
the Mailboxes OU.
Account deprovisioning
When you use Active Roles to deprovision a master account, Exchange Resource Forest
Management causes Active Roles to deprovision the shadow accounts as well. In this way,
Active Roles deprovisions the master account’s mailbox. You can verify this behavior by
using the Active Roles Web Interface.
Once you have completed these steps, the Deprovision command is performed not only
on the master account but also on the shadow account. You can verify this by using the
Deprovisioning Results command on the shadow account in the Mailboxes OU.
The following procedure demonstrates how to delegate the task of managing the DL
membership list to the user account John Smith.
1. In the Active Roles Web Interface for Administrators, open the Exchange
Properties page for the user account John Smith:
l Locate and select the Accounts OU.
l Select the user account John Smith in the list of objects held in that OU.
l Click the Exchange Properties command.
2. On the Exchange Properties page, go to the Shadow Account tab, and click the
Properties button on that tab.
This opens the General Properties page for the shadow account.
3. On the General Properties page, click the Account tab and note down the pre-
Windows 2000 logon name of the shadow account.
4. In the Web Interface, open the Managed by tab for the DL group:
l Locate and select the Mailboxes OU.
l Click the DL group in the list of objects held in that OU.
l Click the Managed by tab on the General Properties page that appears.
5. On the Managed by tab, click the Change button under the Manager box.
This opens the Select Object dialog box allowing you to specify the manager
account.
6. Use the Select Object dialog box to find and select the shadow account:
l In the Name box, type the name of the shadow account you noted
down in Step 3.
l Click Search.
l Click Search.
l In the list of search results, click the name of the shadow account.
l Click OK to close the Select Object dialog box.
7. On the Managed by tab, click Save; then, select the Manager can update
membership list check box, and click Save again.
Although you have specified the shadow account as the manager of the group, Active Roles
updates security settings on the group so that the master account is authorized to add or
remove members from the group by using conventional tools such as Microsoft Outlook.
If you clear the Manager can update membership list check box, or change the
manager of the group, Active Roles updates the security settings to revoke the former
manager’s right to modify the membership list of the group.
After you have specified the shadow account as the manager of the DL group with the
Manager can update membership list option, force Active Roles to give the manager
rights to the master account by executing the scheduled task ERFM - Mailbox
Management held in the Configuration/Server Configuration/Scheduled
Tasks/Builtin container or wait for a scheduled run of that task. Then, you can verify that
1. Log on with the name and password of the John Smith account to the computer
where Microsoft Outlook is configured to connect to the linked mailbox of that
user account.
2. Open Outlook and press Ctrl+Shift+B to display the Address Book.
3. In the Address Book, double-click the DL group.
4. On the General tab in the dialog box that appears, click Modify Members to add or
remove members from the DL group.
1. Open the Active Roles Web Interface for Administrators, and select the mailbox user
account in the Exchange forest (shadow account).
2. Click the Convert to User Mailbox command.
3. Click OK in the confirmation message box that appears.
After mailbox conversion, the mailbox user account remains disabled. To enable the user
account, set the user password by using the Reset Password command, and then click
the Enable Account command.
The domain of the user from the accounts forest must be registered with Active Roles
(managed domain).
1. Open the Active Roles Web Interface for Administrators, and select the user mailbox
in the Exchange forest.
2. Click the Convert to Linked Mailbox command.
3. Click Change under the Linked master account field, and select the user from an
accounts forest.
4. Click Finish.
As a result of these steps, the master account is assigned to the mailbox and the mailbox
user in the Exchange forest becomes the shadow account, linked with the master account.
If the master account is in the scope of the Exchange Resource Forest Management policy,
the properties of the master account and shadow account are synchronized in the same
way as when you configure a mailbox-enabled user in an accounts forest by using the
Exchange Resource Forest Management solution.
For large enterprises which implement a complex administrative structure using Active
Roles, one of the greatest challenges becomes exporting Active Roles configuration from a
test environment to a production environment.
With Active Roles Configuration Transfer Wizard, you can export Active Roles configuration
objects (such as Access Templates, Managed Units, Policy Objects, Policy Type objects,
etc.) to an XML file and then import them from that file to populate another instance of
Active Roles. The export and import operations provide a way to move configuration
objects from a test environment to a production environment.
This document provides information on how to install and use Configuration Transfer
Wizard.
Solution components
Configuration Transfer Wizard includes the following components, which are installed
during the solution setup:
l Configuration Collection wizard
l Configuration Deployment wizard
l ARSconfig command-line tool
Installation requirements
The solution runs on top of Active Roles, and requires the Active Roles Administration
Service to be deployed in your Active Directory environment prior to deploying the solution.
The following versions of the Active Roles Administration Service are supported:
l 7.0.2
l 7.1
l 7.2
l 7.3
l 7.4.x
Depending on whether you use the solution to collect Active Roles configuration data or to
deploy a configuration package, Configuration Transfer Wizard must be installed on a
computer from which you can connect to the Active Roles Administration Service in the
source or destination environment. If the source and destination environments are
physically separated, the solution must be installed in each environment.
Installation procedure
Assuming default security settings, the Domain Admins rights are sufficient to install
the solution.
General considerations
To use this solution, you must have the necessary security permissions. It is sufficient to be
a member of the Active Roles Admin account, in both the source and destination
environments. The Active Roles Admin account is specified during installation of the
Administration Service and defaults to the Administrators group on the computer running
the Administration Service.
IMPORTANT: Before transferring the Active Roles configuration data, ensure that the
Active Directory Organizational Unit (OU) structure in the destination environment is
identical to the OU structure in the source environment.
These are the general steps required to transfer Active Roles configuration data by using
this solution:
NOTE: If an object to deploy already exists in the target configuration, then the
properties of the object are updated during the deployment process.
To perform these steps, you can use either the Configuration Collection Wizard and
Configuration Deployment Wizard, or the ARSconfig command-line tool. Both methods
have the same effect and can be used interchangeably, depending on your requirements.
l You can use this solution to transfer Active Roles configuration objects of the
following categories:
l Access Templates and containers that hold Access Templates
l Managed Units and containers that hold Managed Units
l Policy Objects and containers that hold Policy Objects
l Scheduled Task objects and containers that hold such objects
l Application objects and containers that hold such objects
l Script Modules and containers that hold Script Modules
l Virtual attributes
l Access Template Links (edsACE object type)
l Policy Object Links (edsPolicyObjectLink object type)
l Mail Configuration objects (edsMailConfiguration object type)
l Workflow definition objects (edsWorkflowDefinition object type)
l Automation Workflow definition objects (edsAutomationWorkflowDefinition object
type)
l Policy Type objects (edsPolicyType object type)
l Entitlement Profile Specifier objects and containers (edsOneViewSpecifier or
edsOneViewSpecifiersContainer object type) - requires Active Roles 6.7 or later
l Display specifiers and containers that hold display specifiers (displaySpecifier or
edsDisplaySpecifierContainer object type)
The solution cannot be used to transfer configuration objects of the following categories:
l Built-in objects (the objects that have “built-in” as part of the name)
l Objects held in the Configuration/Application Configuration/Web Interface container
(Web Interface configuration data)
If you need to roll back the changes made to the configuration of the target Active Roles
instance, during the package deployment, you can do this by using the command-line tool
1. Start the wizard by running the Configuration Collection Wizard application from
the Start menu or Start page.
Syntax
Cscript arsconfig.wsf [/?] /task:<'collect' | 'deploy' | 'rollback'>
[/selection:"<filename.xml>"] [/package:"<filename.xml>"] [/map:"<filename.csv>"]
[/verbose] [/log:"<filename>"] [/deletelog] [/server:<servername>]
[/login:<username>] [/password:<userpassword>] [/danglingLinks:<'Stop' | 'Skip' |
'Deploy'>] [/ignoreLinks:<'0' | '1' | '2' | '3'>] [/ignoreErrors] [/upgrade]
Parameters
Table 4: Parameters
Parameter Description
task This is a required parameter which defines the type of task you
want to perform by using this script.
Specify one of these parameter values:
l 'collect' - Collects configuration data from the source
Active Roles environment, and creates a configuration
package file.
l 'deploy' - Populates the target Active Roles instance with
objects from a configuration package created earlier by
Configuration Transfer Wizard.
l 'rollback' - Reverts the configuration of the target Active
Roles instance to the state it was in before deployment of
the configuration package.
selection The path and name of the XML file containing a list of the
source configuration objects to be included in the configuration
package.
This parameter is required when you use this script to create a
configuration package. The XML file you specify in this
parameter must be manually created before you run the script.
log Specifies the name of the trace output file. You can also specify
a target location for the log file.
Add this parameter to create a log file with diagnostic
information.
server The fully qualified domain name of the computer running the
Administration Service to connect to.
If this parameter is not specified, the script attempts a
connection to any available Administration Service.
login The user logon name of the account with which you want to
connect, in the form Domain\UserName, or in the form of a
user principal name.
password Password for the user logon name you specify in the login
parameter.
danglingLinks This parameter takes effect if the task parameter value is set to
'deploy', and specifies whether to deploy Access Template or
Policy Object links, if any found in the package, that refer to
objects which may fail to be resolved in the destination
environment (dangling links). The acceptable parameter values
are:
l 'Stop' - The deployment process is not started if any
dangling links are detected (default setting)
Also, assume that the names of the domains managed by the test (source) Active Roles
instance are test1.company.com and test2.company.com, and the two corresponding
domains managed by the production (target) Active Roles instance are
prod1.company.com and prod2.company.com.
To implement this scenario, complete the following steps:
TF00004281
In the target Active Roles configuration, the solution cannot restore the
edsvaDebuggingServer and edsvaDebuggingServerName properties of Script Module
objects: those attributes are always empty.
WORKAROUND
Manually specify those properties with the use of the Active Roles console.
TF00004581
Configuration Deployment Wizard fails to deploy some of Access Templates. The solution
log file contains the error message similar to the following text:
"Error [4710]: Administrative Policy returned an error. The object <Object
DN> not found."
This error occurs if the source configuration contains nested Access Templates.
WORKAROUND
On the Collect Active Roles Configuration Data page of the wizard, select all the
nested Access Templates you want to collect. If you are using ARSconfig, ensure that the
selection file includes the nested Access Templates into the configuration export package.
TF00004585
After transferring a Policy Object that includes the “User Account Relocation
Deprovisioning” policy entry, the “Description” and the “Error message returned by this
policy” text boxes available on the User Account Relocation Policy Properties dialog
box contain invalid target domain name.
WORKAROUND
After deploying the target configuration, manually edit those text elements using the Active
Roles console.
TF00010732
When collecting Script Modules, Configuration Transfer Wizard may not collect the library
Script Modules that are used by the Script Modules being exported. As a result, the
deployment of the exported Script Modules may cause an error condition in the destination
environment.
WORKAROUND
On the Collect Active Roles Configuration Data page of the wizard, select all the library
TF00039803
When collecting Display Specifiers, Configuration Transfer Wizard may not collect the
Active Roles virtual attributes for which the Display Specifiers are being exported. As a
result, the deployment of the exported Display Specifiers may cause an error condition in
the destination environment.
WORKAROUND
On the Collect Active Roles Configuration Data page of the wizard, select all the Active
Roles virtual attributes for which the Display Specifiers are being exported. If you are using
ARSConfig, ensure that the selection file includes the Active Roles virtual attributes into the
configuration export package.
TF00050511
In a situation where an object to be exported does not exist in the source environment,
Configuration Transfer Wizard stops the export process. As a result, the configuration
export package may not include all objects that were selected for export.
WORKAROUND
Ensure that all objects you selected for export exist in the source environment.
TF00062463
Configuration Transfer Wizard does not provide the ability to export links that involve pre-
defined or built-in objects, nor does it make possible to export pre-defined or built-in
objects. As a result, you do not have the option to transfer, for example, the links of pre-
defined Access Templates.
WORKAROUND
When transferring a configuration that includes any links of pre-defined or built-in objects,
create the required links manually in the destination environment.
TF00125202
When using the Configuration Collection Wizard or Configuration Deployment Wizard, you
may encounter an error message such as “A generic error occurred in GDI+.”
WORKAROUND
Disregard the error message. Click OK to close the error message box.
TF00130489
When using ARSconfig with the 'rollback' task option, you may encounter an error: “This
script module is in use, and cannot be deleted.” This issue is most likely to occur with a
PowerShell based Script Module containing a library script, and is due to the fact that the
Script Module remains locked for a certain time period after all the Script Modules that use
the library script have been deleted.
TF00134074
With the display DPI setting of 'Large size (120 DPI)' you may encounter some minor visual
defects on Configuration Transfer Wizard pages.
WORKAROUND
Use the display DPI setting of 'Normal size (96 DPI)'.
Active Roles SPML Provider is designed to exchange the user, resource, and service
provisioning information between SPML-enabled enterprise applications and Active
Directory.
Active Roles SPML Provider supports the Service Provisioning Markup Language Version 2
(SPML v2), an open standard approved by the Organization for the Advancement of
Structured Information Standards (OASIS). SPML - is an XML-based provisioning request-
and-response protocol that provides a means of representing provisioning requests and
responses as SPML documents. The use of open standards provides the enterprise
architects and administrators with the flexibility they need when performing user
management and user provisioning in heterogeneous environments.
Features
The key features of Active Roles SPML Provider are as follows:
l Support for two operation modes: SPML Provider can be configured to operate in
proxy mode or in direct access mode. In proxy mode, SPML Provider accesses Active
Directory or Active Directory Lightweight Directory Services (AD LDS, formerly
known as ADAM) through Active Roles used as a proxy service, while in direct access
mode, SPML Provider directly accesses Active Directory or AD LDS.
l Support for equivalent LDAP operations: SPML Provider can perform equivalent
LDAP operations such as addRequest, modifyRequest, deleteRequest, and
lookupRequest.
l Support for Azure AD, AD, and AD LDS data management: SPML Provider
enables SPML-conformant applications to read from and write to Azure AD, Active
Directory (AD), and AD LDS.
l Search Capability support: SPML Provider allows SPML-enabled applications to
search for relevant directory objects based on various search criteria.
l Password Capability support: SPML Provider allows SPML-enabled applications to
perform basic password management tasks such as setting and expiring user
passwords.
Use scenarios
SPML Provider can be used for a variety of purposes. Some common scenarios for using
SPML Provider are as follows:
l Non-Windows applications: The systems running non-Windows applications that
need to communicate with Active Directory can do this through SPML Provider. For
example, with SPML Provider, Unix applications can manage Unix-enabled user
accounts in Active Directory. In proxy mode, SPML Provider allows existing SPML-
compatible provisioning systems, such as SUN Java System Identity Manager and
IBM Tivoli Directory Integrator to take advantage of the functionality of Active Roles.
l Web services: The use of directories in Web services is growing rapidly.
Additionally, XML is becoming the default language for use with Web services. SPML
Provider fills the gap between XML documents and Active Directory services,
enabling applications that must provide or use Web services to communicate with
Active Directory.
l Handheld and portable devices: Data-enabled cell phones or PDAs that need an
access to directory data may not contain a client for the ADSI LDAP Provider but
might be able to use the SPML communication protocol to access Active Directory
over the Internet.
l Firewall access: Certain firewalls cannot pass LDAP traffic because they cannot
audit it, but these firewalls can pass XML. In such cases, applications can use SPML
Provider to communicate with Active Directory across a firewall.
The following diagram illustrates the flow of requests and responses through the SPML
Provider environment components:
As shown in the diagram, the client/SPML Provider communications are based on the
simple request/response protocol.
In proxy mode, SPML Provider works in the following way:
1. A client issues a well-formed SPML request using the SOAP over HTTP protocol. This
request goes to a server running IIS, where it is routed to SPML Provider.
2. SPML Provider examines the request for conformance to the SPML format.
3. If the request complies with the SPML format, the SPML Provider submits the request
to Active Roles. Based on the client request, Active Roles retrieves or modifies data in
Active Directory, Azure AD, or in AD LDS.
4. After performing the requested operation, Active Roles sends the result of the
operation back to SPML Provider.
5. SPML Provider then processes this result data and sends the result of the performed
operation back to the client in the form of an SPML response.
1. A client issues a well-formed SPML request using the SOAP over HTTP protocol. This
request goes to a server running IIS, where it is routed to SPML Provider.
2. SPML Provider examines the request for conformance to the SPML format.
If the client request does not conform to the SPML format, the client receives an SPML
response that describes the encountered error.
System requirements
Before installing the Active Roles SPML Provider, ensure your system meets the following
minimum hardware and software requirements.
Hardware requirements
Ensure that the following hardware requirements are met:
l 1 GHz or higher Intel Pentium-compatible CPU.
l At least 1 GB of RAM.
l At least 100 MB of free disk space.
Software requirements
Ensure that the following software requirements are met:
l Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft
Windows Server 2016, or Microsoft Windows Server 2019 operating system.
l Microsoft .NET Framework 4.7.2.
l Microsoft Internet Information Services (IIS). For proxy mode, the IIS server must
be part of an Active Directory forest where Active Roles is deployed.
l For proxy mode, Active Roles Administration Service 7.4 is required.
TIP: If you choose the proxy mode, for performance reasons, we recommend that
you install the Active Roles SPML Provider on the computer running the Active
Roles Administration Service.
NOTE: SPML component cannot be installed on a System with TerminalServer roles and
components enabled.
Use Server Manager to add the required role, role services, and features.
Feature Delegation
Configure Internet Information Services (IIS) to provide Read/Write delegation for the
following features:
l Handler Mappings
l Modules
Use Feature Delegation in Internet Information Services (IIS) Manager to verify that
these features have delegation set to Read/Write.
schemaFile configuration Contains the name of the file that defines the DSML
Profile schema for SPML Provider. By default, the
file name is SPMLSchema.Config. The schema file
must be located in the same folder as the
SPML.Config file.
by Active Roles.
Operation mode
SPML Provider can be configured to operate in:
l Proxy mode In this mode, SPML Provider accesses Active Directory, Azure AD, or
AD LDS using the Active Roles proxy service. In proxy mode, SPML Provider extends
Active Roles. Because SPML Provider uses open standards such as HTTP, XML, and
SOAP, a greater level of interoperability with Active Roles is possible than is available
with the Active Roles ADSI Provider.
l Direct access mode In this mode, SPML Provider directly accesses Active
Directory, Azure AD, or AD LDS.
In proxy mode, SPML Provider can manage objects in Active Directory domains and AD LDS
instances that are registered with Active Roles as managed domains and managed AD LDS
instances, respectively. In direct access mode, SPML Provider can manage only objects in
the domain or AD LDS instance to which SPML Provider is connected using the configuration
setting such as the domain controller or AD LDS server.
For more information about Active Roles controls and for the list of available built-in
controls, see Active Roles SDK.
IMPORTANT: All elements described in this section must be defined at the beginning
of your SPML request. For a sample of use, see later in this document.
xmlns Declares the namespase for all child elements of the controls
element. This attribute must be set to quest:ars:SPML:2:0
The control value in the control element body must be specified as follows:
<control name=%control name%>%control value%</control>
To send an empty control, use the following syntax:
xmlns Declares the namespase for all child elements of the controls
element. This attribute must be set to quest:ars:SPML:2:0
The control elements used to specify controls to return with SPML response must be
defined as follows:
<control name=%control name% />
SPML request
<?xml version="1.0"?>
<soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:xsd="http://www.w3.org/2001/XMLSchema"
xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/">
<soap:Body>
<spml:modifyRequest xmlns:spml="urn:oasis:names:tc:SPML:2:0">
<controls xmlns="quest:ars:SPML:2:0">
<control name="AllowApproval">Confirm</control>
<control name="CustomControl">MyCustomValue</control>
</controls>
<controlsForOutput xmlns="quest:ars:SPML:2:0">
<control name="OperationStatus"/>
<control name="CustomControl"/>
</controlsForOutput>
<spml:psoID ID="CN=JDOE,OU=Users,DC=mycompany,DC=com"/>
<spml:modification>
<modification name="description" operation="replace"
xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value>New description</value>
</modification>
</spml:modification>
</spml:modifyRequest>
</soap:Body>
</soap:Envelope>
Sample SPML request for Azure user, group, and contact creation
</data>
</addRequest>
</soap:Body>
</soap:Envelope>
Sample SPML request for Azure Group Creation.
<?xml version="1.0"?>
<soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:xsd="http://www.w3.org/2001/XMLSchema"
xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/">
<soap:Body>
Supported operations
SPML Provider implements the SPML v2 core protocol and supports core operations that are
required for conformance to the official SPML v2 specification. The following table lists the
core operations supported by SPML Provider.
Operation Description
listTargets Lists targets available for provisioning through SPML Provider and
the SPML Provider's supported set of capabilities for targets.
lookup Obtains the XML that represents the specified object on the target.
In addition to core operations required for conformance to the SPML v2 specification, SPML
Provider supports a set of optional operations (Capabilities) that are functionally related.
The following tables list the Capabilities supported by SPML Provider.
Search capability
Operation Description
iterate Obtains the next set of objects from the result set selected for a
search operation.
closeIterator Informs SPML Provider that the client no longer intends to iterate
the search result.
Suspend capability
Operation Description
active Checks whether the specified object on the target has been
suspended.
Password Capability
Operation Description
Samples of use
SPML Provider implements the SPML v2 core protocol and supports the DSML v2 Profile for
SPML operations. SPML Provider comes with a sample client that includes examples
illustrating how to construct SOAP messages that contain SPML payloads to perform
common directory operations.
1. From the Start menu on the computer on which SPML Provider is installed, select
Active Roles SPML Provider to open the home page of the sample client in your
Web browser.
2. On the Samples of Use home page, under How do I, click the example you
want to examine.
For instance, you might click Create new user to view, modify, and perform the
SPML v2 request that creates a user object.
3. On the page that opens, in the SPMLv2 request box, view the SOAP message that
will be sent to SPML Provider.
You may need to modify the SOAP message in order to adjust it to your environment.
Thus, with the Create new user example, you have to set the ID attribute of the
<ContainerID> element to the distinguished name (DN) of the container where you
want to create a new user.
4. Click the Send Request button to send the SOAP message to SPML Provider.
5. In the SPMLv2 response box, view the SOAP message returned by SPML Provider in
response to your request.
6. To examine another example, return to the home page, and then click the
desired example.
Operation Description
List targets available for This example illustrates how to retrieve the targets
provisioning with SPML available for provisioning with SPML Provider.
Provider
To do this, SPML Provider performs the listTargets
operation.
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP
elements enclose the SPML payload.
l The <listTargetsRequest> element asks SPML
Create new user These examples illustrate how to create a user account
object in two operation modes.
Create new user (using
direct access mode) To create a new object, SPML Provider performs the add
operation.
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP
elements enclose the SPML payload.
l The <addRequest> element asks SPML Provider to
create a new object.
l The <containerID> element specifies the distin-
guished name of the container in which to create the
new object.
l The <data> element encloses the elements that
specify attribute values on the new object. Thus, in
accordance with the objectClass attribute value,
SPML Provider is requested to create a user account.
Create new user (approval This example illustrates how to create a user account if this
aware) operation is subject to approval by designated approvers.
For more information about approval activities and
workflows, refer to Active Roles Help and Active Roles SDK.
Create a user whose logon This example illustrates an attempt to create a new user
name is not in compliance account whose logon name does not conform to the Active
with Active Roles policies Roles policies.
Because the user logon name does not conform to the
Active Roles policies, the creation operation fails and the
operation response includes an error message returned by
Create new group This example illustrates how to create the group object
SPMLGroup in the mycompany.com domain.
To create a new object, SPML Provider performs the add
operation.
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP
elements enclose the SPML payload.
l The <addRequest> element asks SPML Provider to
create a new object.
l The <psoID> element specifies the distinguished
name of the object to be created.
l The <data> element encloses the elements that
specify attribute values on the new object. Thus, in
accordance with the objectClass attribute value,
SPML Provider is requested to create a group object.
Modify user attributes This example illustrates how to modify the description
attribute of the John Smith user object in the
mycompany.com domain.
To modify the object attribute, SPML Provider performs the
modify operation.
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP
elements enclose the SPML payload.
l The <modifyRequest> element asks SPML Provider to
make changes to a specified object.
l The <psoID> element specifies the distinguished
name of the user account to be modified.
l The <modification> element specifies the type of
change as replace, causing the new values to replace
the existing attribute values.
l The <data> element encloses the elements that
specify the new attribute values.
Add user to group This example illustrates how to add the John Smith user
account to the SPMLGroup group object in the
mycompany.com domain.
To do this, SPML Provider preforms the modify operation.
l The request message includes the following XML
elements:
l The <soap:Envelope> and <soap:Body> SOAP
elements enclose the SPML payload.
l The <modifyRequest> element asks SPML Provider to
make changes to a specified object.
l The <psoID> element specifies the distinguished
name of the group object to be modified.
l The <modification> element specifies the type of
change as add, causing the new values to be
appended to the existing attribute values.
l The <data> element encloses the elements that
specify the distinguished name of the user account to
be appended to the existing values of the member
attribute.
Look up user attributes This example illustrates how to get the XML representation
of the John Smith userin the mycompany.com domain.
To get the XML representation of an object, SPML Provider
performs the lookup operation.
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP
elements enclose the SPML payload.
l The <lookupRequest> element asks SPML Provider to
return the XML document that represents a specified
object.
l The <psoID> element specifies the distinguished
name of the object.
Delete user This example illustrates how to delete the John Smith
user account.
To do this, SPML Provider performs the delete operation.
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP
elements enclose the SPML payload.
l The <deleteRequest> element asks SPML Provider to
delete a specified object.
l The <psoID> element specifies the distinguished
name of the user account to delete.
Capability samples
The following tables list all examples included in the Capability samples, grouped by
Capability.
Operation Description
Perform one-level search This example illustrates how to obtain a list of the child
objects (direct descendants) of the Active Directory
Perform subtree search This example illustrates how to obtain a list of objects that
reside below the Active Directory object in the directory
tree. You can use this example to list the objects that reside
in a given domain.
To do this, SPML Provider performs the search operation.
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP elements
enclose the SPML payload.
l The <searchRequest> element asks SPML Provider to
perform a search and return the identifiers of the
objects found.
l The <query> element determines that SPML Provider
is to perform a subtree search (that is, to search any
direct or indirect descendant of the object specified by
<basePsoID>).
l The <basePsoID> element specifies the distinguished
name of the container object to search. For instance,
this could be the distinguished name of a domain that
is registered with Active Roles (managed domain).
Iterate search results This example illustrates how to obtain the next set of
objects from the result set that SPML Provider selected for a
search operation.
In this case, SPML Provider performs the iterate operation.
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP elements
enclose the SPML payload.
l The <iterateRequest> element asks SPML Provider to
return additional objects that matched a previous
search request but that the Provider has not yet
returned to the client.
l The <iterator> element supplies the iterator ID found
either in the original search response or in a
subsequent iterate response.
Stop iterating search This example illustrates how to tell SPML Provider that the
results client has no further need for the search results that a
specific iterator represents.
In this case, SPML Provider performs the closeIterator
operation.
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP elements
enclose the SPML payload.
l The <closeIteratorRequest> element tells SPML
Provider that the client no longer intends to iterate
search results.
l The <iterator> element specifies the ID of the
iterator to close. This could be the iterator ID found in
the original search response or in a subsequent
iterate response.
Find inactive users This example illustrates how to get a list of inactive
(disabled or deprovisioned) user accounts found within a
specified container.
To do this, SPML Provider performs the search operation.
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP elements
enclose the SPML payload.
l The <searchRequest> element asks SPML Provider to
perform a search and return the identifiers of the
objects found.
l The <query> element determines SPML Provider is to
perform a subtree search.
l The <basePsoID> element specifies the distinguished
name of the container object to search. For instance,
this could be the distinguished name of a certain
organizational unit.
l The <filter> element encloses the elements that
direct SPML Provider to search for inactive user
accounts. Thus, the <equalityMatch> elements are
configured so as to limit the search to user accounts;
the <isActive> element combined with the <not>
element causes SPML Provider to select the user
accounts that are inactive.
l The response contains the identifiers (distinguished
names) of the inactive user accounts that exist in the
directory tree below the container object specified by
the <basePsoID> element.
Perform complex search This example illustrates how to have SPML Provider find all
Find only security groups This example illustrates how to obtain a list of security
groups found in a specified container.
In this case, SPML Provider performs the search operation.
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP elements
enclose the SPML payload.
l The <searchRequest> element asks SPML Provider to
perform a search and return the identifiers of the
objects found.
l The <query> element determines that SPML Provider
is to perform a subtree search.
l The <basePsoID> element specifies the distinguished
name of the container object to search. For instance,
this could be the distinguished name of a certain
organizational unit.
Operation Description
Set user password This example illustrates how to set a new password for the
specific user account.
To set a new password, SPML Provider performs the
setPassword operation.
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP elements
enclose the SPML payload.
l The <setPasswordRequest> element asks SPML
Provider to change to a specified value the password
that is associated with a certain user account.
l The <psoID> element specifies the distinguished name
of the user account.
l The <password> element specifies the new password
to assign to the user account.
Expire user password This example illustrates how to force a given user to change
the password at next logon.
To do this, SPML Provider performs the expirePassword
operation.
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP elements
enclose the SPML payload.
Operation Description
Suspend user account This example illustrates how to either disable or deprovision
a specified user account, depending on the SPML Provider
configuration (see the description of the <suspendAction>
element in the “Configuring SPML Provider” section earlier
in this document).
To do this, SPML Provider performs the suspend operation.
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP elements
enclose the SPML payload.
l The <suspendRequest> element asks SPML Provider to
perform the suspend action on a certain user account
(either disable or deprovision, depending on the
configuration of SPML Provider).
l The <psoID> element specifies the distinguished name
of the user account to suspend.
Resume user account This example illustrates how to enable a disabled user
account. This operation requires that the suspend action be
set to disable in the SPML Provider configuration file (see
the description of the <suspendAction> element in the
“Configuring SPML Provider” section earlier in this
document).
In this case, SPML Provider performs the resume operation
in order to enable a disabled user account.
The request message includes the following XML elements:
l The <soap:Envelope> and <soap:Body> SOAP elements
enclose the SPML payload.
In this mode, SPML Provider directly connects to the specified domain or AD LDS instance.
Capabilities
The minimum set of operations that a provider must implement to conform to the official
SPML v2 specification.
A meta-markup language that provides a format for describing structured data. This
facilitates more precise declarations of content and more meaningful search results across
multiple platforms. In addition, XML enables a new generation of Web-based data viewing
and manipulation applications.
Provider
A software component that listens for, processes, and returns the results for well-formed
SPML requests from a known requestor.
Proxy Mode
In proxy mode, SPML Provider accesses directory data using the Active Roles proxy service.
Requestor
SPML
SPML v2
Target
Target Schema
Defines the XML structure of the objects (PSO) that the target may contain.
Resolution
This error has one of the following causes:
Verify that the <value> element specifies the distinguished name of the user that is the
group member. Make sure that the Distinguished Name fields are in upper case.
The following example illustrates how to create a request to remove user Robert Smith
from the Sales group.
<?xml version="1.0"?>
<soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:xsd="http://www.w3.org/2001/XMLSchema"
xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/">
<soap:Body>
<modifyRequest xmlns="urn:oasis:names:tc:SPML:2:0" returnData="everything">
<psoID ID="CN=Sales,OU=SPML2,DC=Mycompany,DC=com"/>
<modification modificationMode="delete">
<data>
<attr name="member" xmlns="urn:oasis:names:tc:DSML:2:0:core">
<value>CN=Robert Smith,OU=Staff,DC=MyCompany,DC=com</value>
</attr>
</data>
</modification>
</modifyRequest>
</soap:Body>
</soap:Envelope>
To resolve this issue, recycle the Default Application Pool or change its settings using
Internet Information Services (IIS) Manager.
What’s new
This version of Active Roles SPML Provider has the same features and functions as the
previous version, 1.4.0. The new version adds support for:
l Active Roles 7.4, allowing you to use the latest version of the Active Roles
Administration Service.
l Adding users, groups, and contacts in Azure AD.
This version of Active Roles SPML Provider requires a 64-bit (x64) operating system,
and cannot be installed on a 32-bit (x86) system (see System requirements earlier in
this document).
The Skype for Business Server User Management solution enables Active Roles to
administer Skype for Business Server user accounts. This solution provides built-in policies
that synchronize user account information between Active Roles and Skype for Business
Server, allowing Skype for Business Server user management tasks to be performed using
Active Roles Web Interface.
l Introducing Skype for Business Server User Management
l Supported Active Directory topologies
l User Management policy
l Master Account Management policy
l Access Templates for Skype for Business Server
Skype for Business Server User Management adds the following elements to Active Roles:
l Built-in Policy Object containing a policy that enables Active Roles to perform user
management tasks on Skype for Business Server.
The Skype for Business Server User Management policy allows you to control the following
factors of Skype for Business Server user creation and administration:
l Rule for generating the SIP user name. When adding and enabling a new Skype for
Business Server user, Active Roles can generate a SIP user name based on other
properties of the user account.
l Rule for selecting a SIP domain. When configuring the SIP address for a Skype for
Business Server user, Active Roles can restrict the list of selectable SIP domains and
suggest which SIP domain to select by default.
l Rule for selecting a Telephony option. When configuring Telephony for a Skype for
Business Server user, Active Roles can restrict the list of selectable Telephony
options and suggest which option to select by default.
l Rule for selecting a Skype for Business Server pool. When adding and enabling a new
Skype for Business Server user, Active Roles can restrict the list of selectable
registrar pools and suggest which pool to select by default. This rule also applies to
selection of the destination pool when moving a Skype for Business Server user from
one pool to another.
Skype for Business Server User Management provides a number of Access Templates
allowing you to delegate the following tasks in Active Roles:
l Add and enable new Skype for Business Server users
l View existing Skype for Business Server users
l View or change the SIP address for Skype for Business Server users
l View or change the Telephony option and related settings for Skype for Business
Server users
l View or change Skype for Business Server user policy assignments
l Disable or re-enable user accounts for Skype for Business Server
l Move users from one Skype for Business Server pool to another
l Remove users from Skype for Business Server
Single forest
The single forest topology assumes that the logon-enabled user accounts managed by
Active Roles are defined in the Active Directory forest in which Skype for Business Server is
deployed. To perform Skype for Business Server user management tasks on a given user
account, Active Roles makes changes to the attributes of that use account, and then, based
on the attribute changes, the Skype for Business Server User Management policy requests
the Skype for Business Server remote shell to update the user account accordingly. For
example, when creating a new Skype for Business Server user, Active Roles sets a virtual
attribute on that user’s account directing the policy to invoke the remote shell command for
enabling the new user for Skype for Business Server. When making changes to an existing
Skype for Business Server user, Active Roles populates the attributes of the user’s account
with the desired changes, causing the policy to apply those changes via the remote shell.
Table 19: Applying the Built-in - Skype for Business - User Management Policy
Object
Note that at least one of your Active Directory domains that hold computers running the
Front End Server or Standard Edition Server must be registered with Active Roles as a
managed domain. Otherwise, Active Roles is unable to discover your Skype for Business
Server deployment, so Skype for Business Server User Management functions are
unavailable.
The rule sets the SIP user name to the string value obtained by calculating each entry and
then concatenating the calculation results so that they form a single string value.
By default, the policy allows the generated name to be modified. The SIP User Name
policy setting provides the option to prevent changing the generated name. If you select
that option, the SIP user name is read-only on the Web Interface page for enabling users
for Skype for Business Server.
Table 20: Applying the Built-in - Skype for Business - Master Account
Management Policy Object
Multiple forests Configure the Forest Mode policy setting by selecting the Resource
Multiple forests Configure the Forest Mode policy setting by selecting the Central
- Central forest forest option, and then apply this Policy Object to
Active Directory domains or containers that hold logon-enabled user
accounts in external forests (master accounts) you want to administer
by using Skype for Business Server User Management in Active Roles.
Synchronized properties
The Master Account Management policy defines a list of properties to copy from the master
account to the shadow account. These properties are referred to as synchronized
properties. When you use Active Roles to set or change a synchronized property of a
master account, the policy causes Active Roles to set or change the value of that property
on both the master account and shadow account.
Substituted properties
The Master Account Management policy defines a list of properties that appear on the
master account but reflect the properties of the shadow account. These properties are
referred to as substituted properties. When you use Active Roles to view properties of a
master account, the policy causes Active Roles to retrieve the values of the master
account’s substituted properties from the shadow account. When you use Active Roles to
set or change a substituted property of a master account, the policy causes Active Roles to
set or change the value of that property on the shadow account.
The policy does not allow you to narrow down the list of substituted properties. However,
you can specify your custom list of substituted properties in addition to the default list. If
you do so, the resulting list of substituted properties includes all properties from both the
default list and your custom list.
Back-synchronized properties
The Master Account Management policy defines a list of properties to copy from the shadow
account to the master account. By default, the list is empty. If you add a property to that
list, the policy ensures that any changes to that property on the shadow account are
replicated to the master account.
Request Actions
Enable an existing Active Roles retrieves the properties of the existing user (in
Active Directory user for the external forest), and then performs the following actions:
Skype for Business
l Create a shadow account in the Skype for Business
Server
Server forest, and populate its properties with the
properties of the user from the external forest
l Enable the shadow account for Skype for Business
Server
l Set the msRTCSIP-OriginatorSID attribute of the shadow
account to the value of the objectSID attribute of the
user from the external forest
l Create a reference to the shadow account on the master
account
Modify Skype for If the change request includes any changes to substituted
Business Server user properties, Active Roles first makes the requested changes to
properties of a master the substituted properties of the shadow account. Next, Active
account Roles makes the requested changes to the properties of the
master account, and then updates the synchronized properties
of the shadow account with the new property values found on
the master account.
Deprovision a master Active Roles deprovisions the master account, and then
account temporarily disables the shadow account for Skype for
Business Server.
Undeprovision a Active Roles undeprovisions the master account and then re-
deprovisioned master enables the shadow account for Skype for Business Server.
account
For undeprovisioning master accounts to have an effect on
shadow accounts, the container that holds deprovisioned
master accounts must be in the scope of the Built-in Policy -
Skype for Business - Master Account Management
Policy Object (or a copy of that Policy Object).
Delete a master account Active Roles deletes the master account, and then removes
the shadow account from Skype for Business Server.
The Master Account Management policy requires that shadow accounts be in the scope of
the User Management policy provided by Skype for Business Server User Management.
Scheduled synchronization
Skype for Business Server User Management includes an Active Roles scheduled task that
complements the Master Account Management policy to enforce synchronization of master
and shadow account properties, and to capture existing Skype for Business Server users
whose master account happens to fall under the control of that policy. The scheduled task
object is in the Configuration/Server Configuration/Scheduled Tasks/Builtin
container. The name of the object is Skype for Business - Master Account
Management. The task is scheduled to run on a daily basis. Normally, you do not need to
modify that scheduled task.
The operation of the task affects only the user accounts that are in the scope of the Built-in
Policy - Skype for Business - Master Account Management Policy Object (or a copy
of that Policy Object). When run, the task performs the following actions on each of those
user accounts:
l If the user account does not have a shadow account that is enabled for Skype for
Business Server, then skip over that user account.
l If the user account has a shadow account that is enabled for Skype for Business
Server but does not store a reference to that shadow account, then create the
reference to the shadow account on that user account.
This action enables Skype for Business Server User Management to administer
exiting Skype for Business Server users, possibly enabled for Skype for Business
Server by using an earlier version of Skype for Business Server User Management or
without the use of Skype for Business Server User Management.
l If the user account has a shadow account that is enabled for Skype for Business
Server and stores a reference to the shadow account, then copy the synchronized
properties from the master account to the shadow account, and copy the back-
synchronized properties from the shadow account to the master account.
This action ensures that the shadow account properties are updated with the latest
changes to the master account properties and vice versa.
Skype for Business Server - Gives permission to perform the following tasks by using
User Full Control Active Roles:
l Add and enable new Skype for Business Server
users
l View existing Skype for Business Server users
l View or change the SIP address
l View or change the telephony option and related
settings
l View or change the user policy assignments in
Skype for Business Server
l Temporarily disable or re-enable users for Skype
for Business Server
l Move users to another server or pool in Skype for
Business Server
l Remove users from Skype for Business Server
Skype for Business Server - Gives permission to perform the following tasks by using
User Telephony Active Roles:
l View existing Skype for Business Server users
l View the SIP address
l View or change the telephony option and related
settings
l View the user policy assignments in Skype for
Business Server
Skype for Business Server - Gives permission to perform the following tasks by using
User Disable/Re-enable Active Roles:
l View existing Skype for Business Server users
l View the SIP address
l View the telephony option and related settings
l View the user policy assignments in Skype for
Business Server
l Temporarily disable or re-enable users for Skype
for Business Server
Skype for Business Server - Gives permission to perform the following tasks by using
User Policies Active Roles:
When applying Access Templates for Skype for Business Server User Management,
consider your Active Directory topology.
Table 25: Applying Access templates for Skype for Business Server User
Management
Single forest Apply Access Templates to Active Directory domains and containers to
which the Built-in Policy - Skype for Business - User
Management Policy Object (or a copy of that Policy Object) is applied,
to allow access to user accounts of Skype for Business Server users
managed by Active Roles.
Multiple forests Apply Access Templates to Active Directory domains and containers in
- Resource external forests to which the Built-in Policy - Skype for Business -
forest Master Account Management Policy Object (or a copy of that Policy
Object) is applied, to allow access to master accounts of Skype for
Business Server uses managed by Active Roles.
You do not need to apply these Access Templates in the Skype for
Business Server forest.
Multiple forests Apply Access Templates to Active Directory domains and containers in
- Central forest external forests to which the Built-in Policy - Skype for Business -
Master Account Management Policy Object (or a copy of that Policy
Object) is applied, to allow access to master accounts of Skype for
Business Server uses managed by Active Roles.
Apply Access Templates to Active Directory domains and containers in
the Skype for Business Server forest to which the Built-in Policy -
Skype for Business - User Management Policy Object (or a copy of
that Policy Object) is applied, to allow access to logon-enabled user
accounts of Skype for Business Server users managed by Active Roles
in the Skype for Business Server forest.
Prerequisite conditions
This section summarizes the prerequisite conditions that must be met before you deploy
Skype for Business Server User Management.
Single forest
In case of single forest, Skype for Business Server must be deployed in the forest that holds
logon-enabled accounts for Skype for Business Server users. For further details, see Single
forest earlier in this document.
Multiple forests
In case of multiple forests, Skype for Business Server must be deployed in the Skype
for Business Server forest only. You don’t need to deploy Skype for Business Server in
external user forests or extend the Active Directory schema with Skype for Business
Server attributes in those forests. For further details about multi-forest topology
options, see Multiple forests - Resource forest and Multiple forests - Central forest
earlier in this document.
The multi-forest topology option requires a one-way trust relationship between the Skype
for Business Server forest and each user forest so that users can authenticate to the user
forest but access services in the Skype for Business Server forest. Create a “forest” trust
instead of an “external” trust because an external trust only supports NTLM, while a forest
trust supports both NTLM and Kerberos, and therefore won’t limit Skype for Business client
authentication options.
In case of central forest deployment, you need to grant Skype for Business Server contact
management rights on the container that is intended to hold shadow accounts (contacts
enabled for Skype for Business Server in the Skype for Business Server forest). Otherwise,
Skype for Business Server security groups do not have sufficient rights to manage contact
objects, which causes an “access is denied” condition when Active Roles attempts to enable
a shadow account for Skype for Business Server.
To grant Skype for Business Server contact management rights, use the following
command in Skype for Business Server Management Shell:
Grant-CsOUPermission -OU "<DN of container>" -ObjectType "contact"
Replace <DN of container> with the Distinguished Name of the container that is intended
to hold shadow accounts, for example: OU=Shadow Accounts,DC=Skype for
BusinessServer,DC=lab. If the domain does not have permission inheritance disabled
(which is the default case), then you can supply the Distinguished Name of the domain
rather than container:
Grant-CsOUPermission -OU "DC=Skype for BusinessServer,DC=lab" -ObjectType
"contact"
You must be a domain administrator in order to run the Grant-CsOUPermission
cmdlet locally.
You can install these components on member servers in a user forest or in the Skype for
Business Server forest. For installation instructions, see the Active Roles Quick Start Guide.
When registering a domain, you are prompted to choose which account you want the
Administration Service to use to access the domain. You can either specify a so-called
override account or let the Administration Service use its service account. With either
option, the account must have sufficient rights in the domain you are registering. At a
minimum, the account must have the following rights:
l In the domain that holds Skype for Business Server computers, a member of the
RTCUniversalUserAdmins group
l In the user domains, a member of the Account Operators group
l In the shadow accounts domain, a member of the Account Operators group
For a central forest deployment, the account must also have the rights to create,
view, modify and delete contact objects in the shadow accounts domain. It will suffice
to make the account a member of the Domain Admins group.
For instructions on how to register domains with Active Roles, see “Adding and
removing managed domains” in the Active Roles Administrator Guide.
Out of the box, the Policy Object has all policy settings configured. You can use the Active
Roles console to view or change policy settings as needed.
For detailed description of the policy settings, see User Management policy settings earlier
in this document.
For detailed description of the policy settings, see Master Account Management policy
settings earlier in this document.
Out of the box, the Policy Object has all policy settings configured. You can use the Active
Roles console to view or change policy settings as needed.
For detailed description of the policy settings, see User Management policy settings earlier
in this document.
1. Identify the Active Directory topology option used by the add-on. The possible
options are:
l Single forest
l Multiple forests - Resource forest
l Multiple forests - Central forest
In case of multiple forests, note down the Distinguished Name of the container in
which the add-on creates shadow accounts.
2. Uninstall the earlier version of the add-on from Active Roles Add-on Manager, and
then uninstall the add-on from the system
3. Upgrade to Active Roles version 7.5.4. For upgrade instructions, see the Active Roles
7.5.4 Quick Start Guide.
4. Deploy Skype for Business Server User Management. Depending on the Active
Directory topology option used by the add-on:
l In case of single forest, follow the Deployment in a single-forest environment
instructions.
l In case of multiple forests, follow the Deployment in a multi-forest
environment instructions. Configure the Built-in Policy - Skype for
Business - Master Account Management Policy Object to match the
topology option and container for shadow accounts you identified in Step 1.
The following instructions elaborate on these steps. The instructions apply to Active Roles
Add-on for Skype for Business Server 2.1.
1. In the Active Roles console tree, select Applications | Active Roles Add-on for
Skype for Business Server.
2. Review the add-on settings in the Configure Add-on area in the details pane:
l The Active Directory topology option is selected in the Active Directory
topology box.
l If a multi-forest option is selected, the Distinguished Name of the container in
which the add-on creates shadow accounts is specified in the Container for
shadow accounts/contacts box.
If the add-on was configured with the resource forest or central forest option, you need to
configure and apply the Built-in Policy - Skype for Business - Master Account
Management Policy Object as follows.
Skype for Business Server User Management recognizes the existing master accounts,
enabling Active Roles to manage their shadow accounts for Skype for Business Server in
the same way as when using the add-on. To expedite the recognition of the existing master
accounts, you might execute the Master Account Management task without waiting for its
scheduled run: In the Active Roles console, navigate to the Configuration/Server
Configuration/Scheduled Tasks/Builtin container, right-click the object Skype for
Business - Master Account Management in that container, point to All Tasks, and
then click Execute.
1. Select the user account in the Active Roles Web Interface for administrators.
2. Click the Enable for Skype for Business Server command.
The command is available if you have sufficient rights in Active Roles to enable users
for Skype for Business Server, and the selected account is in the scope of the policy
provided by Skype for Business Server User Management and is not enabled for
Skype for Business Server; otherwise, the Web Interface does not display the Enable
for Skype for Business Server command.
3. On the page that appears, assign the user to a Skype for Business Server pool,
specify any additional details, assign Skype for Business Server policies to the user as
needed, and then click Finish.
1. In the Active Roles Web Interface for administrators, select the user account that you
want to disable or re-enable.
2. Do one of the following:
l To disable the user account, click the Temporarily Disable for Skype for
Business Server command.
l To re-enable the user account, click the Re-enable for Skype for Business
Server command.
The Web Interface displays the Temporarily Disable for Skype for Business Server
command if you have sufficient rights in Active Roles to perform that command, and the
user account you have selected is in the scope of the policy provided by Skype for Business
Server User Management and is enabled for Skype for Business Server.
The Web Interface displays the Re-enable for Skype for Business Server command if
you have sufficient rights in Active Roles to perform that command, and the user account
you have selected is in the scope of the policy provided by Skype for Business Server User
Management and was disabled by using the Temporarily Disable for Skype for
Business Server command.
1. In the Active Roles Web Interface for administrators, select the user account that you
want to remove from Skype for Business Server.
2. Click the Remove from Skype for Business Server command.
The Web Interface displays the Remove from Skype for Business Server command if
you have sufficient rights in Active Roles to perform that command, and the user account
you have selected is in the scope of the policy provided by Skype for Business Server User
Management and is enabled or temporarily disabled for Skype for Business Server.
1. In the Active Roles Web Interface for administrators, select the user account whose
properties you want to view or change.
2. Click the Skype for Business Server User Properties command.
The Web Interface displays the Skype for Business Server User Properties
command if you have sufficient rights in Active Roles to view Skype for Business
Server user properties of the selected account, and the user account you have
selected is in the scope of the policy provided by Skype for Business Server User
Management and is enabled or temporarily disabled for Skype for Business Server.
Skype for Business Server user account properties allow you to assign certain policies to a
Skype for Business Server user in order to specify particular settings that differ from the
settings defined in policies assigned to other users, such as global policies. These policies
are referred to as user policies.
In Skype for Business Server, deploying and assigning user policies is optional. It is
possible to deploy only global policies or site policies. If user policies are deployed, they
must be assigned to users explicitly. When managing Skype for Business Server user
settings, you can select the appropriate user policy from a list. The list also includes the
<Automatic> entry. If <Automatic> is selected, the global policy (or, if defined, the site
policy) is assigned to the user.
To move a Skype for Business Server user account to a different server or pool
1. In the Active Roles Web Interface for administrators, select the user account you
want to move.
2. Click the Move to Skype for Business Server Pool command.
The Web Interface displays the Move to Skype for Business Server Pool
command if you have sufficient rights in Active Roles to perform that command, and
the user account you have selected is in the scope of the policy provided by Skype for
3. On the page that appears, select the server or pool to which you want to move the
Skype for Business Server user.
4. Click Finish.
The Active Roles Management Pack for Microsoft System Center Operations Manager
(SCOM) provides a basic solution for monitoring availability and health of the Active Roles
Administration Service and its information store, Active Roles replication status, and
availability of the Active Roles Web Interface. By detecting, alerting on, and automatically
responding to critical events, the Management Pack helps indicate, correct, and in many
cases prevent outages of the Administration Service and Web Interface.
Features
The Management Pack provides the features that you need to monitor your Active Roles
environment, such as automated discovery, availability and performance monitoring, and
replication monitoring. The Management Pack alerts you to the following error conditions:
l Administration Service is not responding
l Active Roles replication failure has occurred
l Connection to the Active Roles database has been lost
l Administration Service failed to update a Dynamic Group
l Administration Service failed to update a Group Family
l Active Roles Web Interface is unavailable
Monitoring views
The monitoring views are used to centrally monitor availability and health of the Active
Roles components in the Operations Manager console’s Monitoring pane. The Management
Pack provides the following views:
l Alerts Displays the alerts on the computers running the Active Roles Administration
Service or Web Interface.
Getting started
Install the Management Pack by importing the ActiveRoles.SCOM.MP.xml file into System
Center Operations Manager (SCOM). You can install this Management Pack on the following
SCOM versions:
l System Center Operations Manager 2007 R2
l System Center 2012 - Operations Manager
l System Center Operations Manager 2016
l System Center Operations Manager 2019
For more information, and details on how resolve replication-related problems, refer to the
“Troubleshooting” section in the Replication: Best Practices and Troubleshooting document,
which is part of the Active Roles product documentation set.
Availability - Script
This rule uses a script to check the availability of the Web Interface. The script invokes a
self-diagnostic script built into the Web Interface so as to verify the Web Interface
configuration, including the customization settings, and to check whether the
Administration Service is available.
The rule ensures that both the default and customized Web Interface sites are monitored
properly if customization is performed by using the point-and-click tools included in the
Web Interface.
The rule does not check the availability of the Web Interface functions that are based on
custom ASP files integrated with the Web Interface, if any. An additional, custom rule
needs to be implemented in Operations Manager to monitor such functions.
By default, this rule is scheduled to run every 30 minutes. The schedule can be adjusted by
managing rule properties in the Operations Manager console.
Availability - Alert
This rule generates an alert when the Availability script detects that the Web Interface is
unavailable.
l Possible causes of the alert include:
l Web Interface is not running
l Web Interface is not configured properly
l Administration Service is unavailable
AD changes processed/sec
This rule collects AD changes processed/sec counter samples for the AR
Server:External Changes performance object. A sample of the counter is the number of
changes received from Active Directory and processed by the Active Roles Administration
Service per second.
Connected clients
This rule collects Connected clients counter samples for the AR Server:Miscellaneous
performance object. A sample of the counter is the current number of the clients connected
to the Active Roles Administration Service.
LDAP operations/sec
This rule collects LDAP operations/sec counter samples for the AR Server:LDAP
Operations performance object. A sample of the counter is the number of LDAP operations
executed by the Active Roles Administration Service per second.
Private bytes
This rule collects Private Bytes counter samples for the Process performance object
specific to the Active Roles Service (arssvc) process. A sample of the counter is the amount
of virtual memory (in bytes) that the Active Roles Administration Service process allocates
(process private bytes).
Requests in progress
This rule collects Requests in progress counter samples for the AR Server:Requests
performance object. A sample of the counter is the current number of the client requests
Requests/sec
This rule collects Requests/sec counter samples for the AR Server:Requests
performance object. A sample of the counter is the number of requests received by the
Active Roles Administration Service per second.
About us
One Identity solutions eliminate the complexities and time-consuming processes often
required to govern identities, manage privileged accounts and control access. Our solutions
enhance business agility while addressing your IAM challenges with on-premises, cloud and
hybrid environments.
Contacting us
For sales and other inquiries, such as licensing, support, and renewals, visit
https://www.oneidentity.com/company/contact-us.aspx.