ActiveRoles-8 1 5-QuickStartGuide
ActiveRoles-8 1 5-QuickStartGuide
Introduction 1
Active Roles components 1
System requirements 7
Deployment considerations 80
Business workflow 80
Hardware requirements 81
Web Interface: IIS Server required 82
Availability and redundancy 82
Major sites 82
Remote sites 83
Replication traffic 83
Locations and number of services 84
Centralized 84
Distributed with no remote management 86
Distributed with remote management 88
Physical design 90
Deploying for fault tolerance and load balancing 91
Centralized deployment 91
DC focusing 93
Distributed deployment 93
DC focusing 95
SQL database 96
Web Interface 98
About us 140
Contacting us 140
Technical support resources 140
Introduction
Active Roles simplifies and streamlines creation and ongoing management of user accounts
and groups in Windows Active Directory (AD) environments by automating user and group
account creation in AD, Azure AD, mailbox creation in Exchange and Exchange Online,
group population, and resource assignment in Windows.
It provides strictly enforced security, rich capabilities for automating directory
management tasks, change approval and easy-to-use Web interfaces, to achieve practical
user and group account management for the Windows enterprise.
This document is for individuals responsible for deploying Active Roles in their organization.
It provides step-by-step instructions for preparing the environment and installing the
Active Roles components.
The presentation components include client interfaces for the Windows platform and the
Web, which allow users with appropriate rights to perform a precisely defined set of
administrative activities. Active Roles also includes the reporting solution to generate
reports on the administrative activities.
The service components constitute a secure layer between administrators and managed
data sources. It ensures consistent policy enforcement, provides automation capabilities,
and enables the integration of business processes for administration of Active Directory,
Exchange and other corporate data sources.
The main component of Active Roles is the Administration Service—a powerful rules-based
proxy for the management of network data sources. The Administration Service features
advanced delegation capabilities and provides the ability to enforce administrative policies
that keep data current and accurate. The Administration Service acts as a bridge between
the presentation components and network data sources. In large networks, multiple
instances of the Administration Services can be deployed to improve performance and
ensure fault tolerance.
The Administration Service uses the configuration database to store configuration data that
includes definitions of objects specific to Active Roles, assignments of administrative roles
and policies, and procedures used to enforce policies.
The Administration Service provides a complete audit trail by creating records in the Active
Roles event log. The log shows all actions performed and by whom, including actions that
were not permitted. The log entries display the success or failure of each action, as well as
which attributes were changed while managing objects in data sources.
ActiveRoles.exe The executable file allows you to start the Setup wizard and install the
Active Roles components.
Components Provides separate installer files for the following Active Roles
components which enables you to install the default Active Roles
components individually:
l ADSI Provider
l Configuration Center
l Management Shell
l MMC Console
l Administration Service
l Web Interface
l ActiveRoles Synchronization Service
Redistributables Provides the pre-requisite redistributables for the latest Active Roles
version
Solutions Provides the installer files for the following additional components:
l Add-in for Outlook
l Add-on Manager
l Collector and Report Pack
l Configuration Transfer Wizard
l Diagnostic Tools
Release Notes Provides information about the latest Active Roles release and the
hardware and software requirements for Active Roles and its
components.
1. Before installing Active Roles and its components, make sure that all installation
prerequisites are met. For information on the hardware and software requirements
for each component, see System Requirements in the Active Roles Release Notes.
NOTE: Installing the requisite Active Roles components to an offline Active Roles
server (with no internet connection available) requires manual installation steps.
For more information, see Knowledge Base Article 299533.
2. Navigate to the location of the Active Roles distribution package, double-click
ActiveRoles.exe and start the Setup wizard.
3. Follow the instructions in the Setup wizard.
Based on the components selected, the Administration Service, Configuration Center,
Web Interface, Management Shell, MMC Console, and ADSI Provider are installed on
the system.
Alternatively, you can also download the installer file and install individual
components manually from the respective component folder.
4. Configure the Administration Service and other installed components.
NOTE: The Administration Service must be configured and running to configure and
start any other Active Roles components.
NOTE: For more information on extending the Active Roles provisioning and account
administration capabilities to your cloud applications, click Learn More in the Setup
Progress window.
1. On the system where Active Roles is installed, go to the Control Panel, and navigate
to Programs| Programs and Features.
2. In the list of installed programs, right-click on One Identity Active Roles, and click
Uninstall/Change.
The Active Roles Setup window is displayed.
3. Click Remove.
The Active Roles Setup - Ready to Remove dialog box is displayed.
NOTE: Alternatively, click Modify to add or remove the Active Roles components. Click
Repair to re-install the corrupt files in Active Roles.
System requirements
The Active Roles Release Notes document, included on the Active Roles distribution media,
provides information about the hardware and software requirements for each of these
components.
The Active Roles distribution media includes separate installation packages for additional
components, such as Add-in for Outlook, Collector and Report Pack. The system
requirements for these components are as follows:
Table 2:
Active Roles Add-in for Outlook requirements
Requirement Details
Requirement Details
SQL Server Reporting Any SQL Server version listed in requirements for
Services Administration Service
Active Roles ADSI Provider Management Tools of the current Active Roles version must
be installed
Use the following checklist to ensure that you are ready to install the Administration
Service.
SQL Server The Administration Service requires Microsoft SQL Server. One
Identity recommends to have SQL Server and the Administration
Service on different systems with reliable network connection.
Administration Service can now be configured on Azure databases
namely Azure SQL database, Azure SQL Managed Instance and
Azure SQL Elastic Pool. One Identity recommends to have proper
network topology to allow the Azure database configuration.
Administration The Administration Service logs on with the account that you specify
Service account during installation. The account must have sufficient rights for Active
Roles to function properly.
Active Roles uses the Administration Service account when accessing
a managed domain unless an override account is specified when
registering the domain with Active Roles. Therefore, the
Administration Service account must have the appropriate rights in
any domain for which an override account is not specified.
Additionally, the Administration Service account must have sufficient
permissions to publish the Administration Service in Active Directory.
Information about how to configure the Administration Service
Account used for When installing the Administration Service you may configure it to
connection to SQL use
Server
Windows authentication or SQL Server authentication or Azure AD
authentication.
If you choose Windows authentication, the connection is established
using the Administration Service account. In this case, the service
account must at minimum be a member of the db_owner fixed
database role and have the default schema of dbo in the Active Roles
database.
If you choose SQL Server authentication, the connection is
established with the login you are prompted to specify when
installing the Administration Service. This login must at minimum be
a member of the db_owner fixed database role and have the default
schema of dbo in the Active Roles database.
For connecting to Azure SQL database variants like SQL database
and Elastic Pool database using SQL server authentication,the login
must be a member of the dbmanager fixed database role and have
the default schema of dbo in the Active Roles database.
If you choose Azure Active Directory authentication, the connection
is established with the login you are prompted to specify when
installing the Administration Service.
For more information on what permissions must be granted to the
account for connection to SQL Server, see SQL Server permissions.
Active Roles Active Roles Admin is a group for which Active Roles does not
Admin perform permission checking. If the Administration Service itself has
sufficient rights to perform a certain task, then Active Roles Admin
can also perform that task using Active Roles.
In addition, Active Roles Admin is authorized to perform any task
related to the Active Roles configuration, such as adding managed
domains and managing replication settings. Therefore, the
membership in the Active Roles Admin group should be restricted to
highly trusted individuals.
By default, Active Roles Admin is the Administrators local group on
the computer running the Administration Service. You can change
this setting when installing the Administration Service.
Along with the mentioned permissions, the service account (or the override account, if
specified), must have these permissions on the Aelita sub-container of the System
container in every managed domain. If an account has the domain administrator rights,
then it has the required permissions by default. Otherwise, provide the permissions to
the account by using the ADSI Edit console. The following instructions apply to the ADSI
Edit console that ships with Windows Server 2016, Windows Server 2019, or Windows
Server 2022.
1. Open the ADSI Edit console and connect to the Domain naming context.
2. In the console tree, expand the System container, right-click the Aelita subcontainer,
and then click Properties. If the Aelita container does not exist, create it: right-click
System, point to New, click Object, and then, in the Create Object wizard, select the
Container class and specify Aelita for the cn value.
3. On the Security tab in the Properties dialog box, click Advanced.
4. On the Permissions tab in the Advanced Security Settings dialog box, click Add.
5. On the Permission Entry page, configure the permission entry:
l Click the Select a principal link, and select the desired account.
l Verify that the Type box indicates Allow.
l Verify that the Applies onto box indicates This object and all descendant
objects.
l In the Permissions area, select the Create container objects and Create
serviceConnectionPoint objects check boxes.
l Click OK
6. Click OK to close the Advanced Security Settings dialog box, and then click OK to
close the Properties dialog box.
NOTE: When registering a domain with Active Roles, you can specify an override account.
If you specify an override account, the Administration Service uses the override account
rather than the service account to access the domain.
For instructions for Exchange 2019, see “Add Members to a Role Group” at
https://technet.microsoft.com/en-in/library/jj657492(v=exchg.160).aspx.
4. Ensure that the account can read Exchange configuration data (see Permission to
read Exchange configuration data).
5. Restart the Administration Service after you have changed the configuration of the
account: Start Active Roles Configuration Center (see “Running Configuration
Center” in the Active Roles Administration Guide), go to the Administration
Service page in the Configuration Center main window, and then click the Restart
button at the top of the Administration Service page.
NOTE:
l For instructions for the supported Microsoft Exchange versions, see the relevant
Microsoft Exchange pages at https://technet.microsoft.com/en-us/library. For the
list of Exchange Server versions supported by Active Roles, see System
requirements in the Active Roles Release Notes.
l The Active Roles service account must be a part of Recipient Management
group to run Exchange hybrid commands.
The Exchange 2016 management tools are not required on the computer running the
Administration Service.
To perform Exchange recipient management tasks, Active Roles requires read access to
Exchange configuration data in Active Directory. This requirement is met if the service
account (or the override account, if specified) has administrator rights (for example, is a
member of the Domain Admins or Organization Management group). Otherwise, you
should give the account the Read permission in the Microsoft Exchange container. You
can do this by using the ADSI Edit console as follows (these instructions apply to the ADSI
Edit console that ships with Windows Server 2016, Windows Server 2019, or Windows
Server 2022):
When performing Exchange recipient management tasks on Exchange Server, Active Roles
uses remote Exchange Management Shell to communicate with Exchange Server, so you
do not need to install the Exchange management tools on the computer running the
Administration Service.
To use remote Exchange Management Shell, the Administration Service must be running
on a computer that has:
l A Windows Server version supported by Active Roles (see System requirements in
the Active Roles Release Notes).
l Microsoft .NET Framework 4.7.2 installed see https://www.microsoft.com/en-
us/download/details.aspx?id=53321).
l Windows Management Framework 5.1 installed (see “Windows Management
Framework 5.1” at https://www.microsoft.com/en-
us/download/details.aspx?id=54616).
To allow Active Roles full access to the AD LDS instance, add the account to the
following group:
l Administrators (CN=Administrators,CN=Roles) in the configuration partition
If you add the account to the Administrators group, you don’t need to add it to the
Instances or Readers group.
The service account or override account must be configured so that it has sufficient rights
to perform the operations provided for by those policies: create, modify (including the
In addition, viewing BitLocker recovery passwords in a given domain requires the following:
l The domain must be configured to store BitLocker recovery information (see
http://technet.microsoft.com/en-us/library/dd875529.aspx).
l The computers protected by BitLocker must be joined to the domain.
l BitLocker Drive Encryption must be enabled on the computers.
The BitLocker recovery information is displayed on the BitLocker Recovery tab in the
computer object’s Properties dialog box, in the Active Roles console. It is also possible to
perform domain-wide searches for BitLocker recovery passwords.
Operation permissions
The Administration Service accesses its database with the account specified during
configuration:
In either case, the account must have sufficient rights on SQL Server to retrieve data from,
and make changes to, the database. The required rights vary depending on the role of the
Administration Service’s database server in the Active Roles replication environment.
NOTE: Active Roles does not support replication on Azure SQL databases.
Standalone mode
When initially installed, the Administration Service’s database is configured not to
participate in Active Roles replication. This configuration is referred to as standalone
Administration Service. The account that the standalone Administration Service uses to
access the database must at a minimum be a member of the db_owner fixed database
role and have the default schema of dbo in that database.
Publisher mode
If the Administration Service’s database server holds the role of the Publisher in Active
Roles replication, then the account the Administration Service uses to access the database
must at a minimum be a member of the db_owner fixed database role and have the
default schema of dbo in that database. Additional rights are required if you want to see
the replication status information and error messages in the Active Roles console. These
additional rights are as follows:
l Default schema of dbo in the msdb system database.
l SELECT permission on the sysjobs, sysjobsteps and MSagent_parameters
system tables in the msdb system database.
l SELECT permission on the sysservers system view in the master system database.
l EXECUTE permission on the xp_sqlagent_enum_jobs system extended stored
procedure in the master system database.
l SELECT permission on the MSmerge_agents, MSmerge_history, MSmerge_
sessions, MSsnapshot_agents and MSsnapshot_history system tables in the
distribution database (AelitaDistributionDB database by default).
Subscriber mode
If the Administration Service’s database server holds the role of a Subscriber in Active
Roles replication, then the account that the Administration Service uses to access the
Active Roles does not store the login name and password of this account. It only uses the
login name and password of this account to configure the Publisher.
The same permissions are required for removing (demoting) the Publisher.
Active Roles does not store the login name and password of this account. It only uses the
login name and password of this account to configure the Subscriber.
The same permissions are required for removing a Subscriber.
The account used to connect to the Subscriber must at minimum be a member of the db_
owner fixed database role in the subscription database (the Active Roles database on the
Subscriber).
By default, the security settings of a Merge Agent configured by Active Roles are as follows:
This means that, by default, Active Roles requires that the account of the SQL Server Agent
service have all permissions the Merge Agent needs to make connections both to the
Publisher/Distributor and to the Subscriber.
When adding a Subscriber, you have the option to supply a separate login for connection to
the Subscriber. If you choose that option, the Merge Agent will use the login you supply
(rather than the account of the SQL Server Agent service) to make connections to the
Subscriber. In this case, it is the login you supply that must have db_owner rights in the
subscription database. The SQL Server Agent service does not need to have any rights in
the subscription database. However, it still must have all permissions the Merge Agent
needs to make connections to the Publisher and Distributor.
1. Log on with a user account that has administrator rights on the computer.
2. Navigate to the location of the Active Roles distribution package, and start the Setup
wizard by double-clicking ActiveRoles.exe.
3. Accept the license agreement and click Next.
4. On the Component Selection page, make sure that the Administration Service
component is selected, and click Next.
The Setup wizard only installs the files. After you have completed the Setup wizard, you
need to configure the newly installed Administration Service instance by using Active
Roles Configuration Center that opens automatically if you select the I want to
perform configuration check box on the Completion page in the Setup wizard.
Another way to open Configuration Center is by selecting Active Roles 8.1.5
Configuration Center on the Apps page or Start menu, depending upon the version
of your Windows operating system.
The database options are related to setting up the database for the Administration Service
you are configuring.
This section covers the database-related steps of the Configure Administration Service
wizard in a scenario where you are configuring the first Administration Service in your
environment.
5. Click Next, and follow the instructions in the wizard to complete the configuration.
When you configure the initial Administration Service, Configuration Centers creates a
database along with a secret key that the Administration Service will use to encrypt and
decrypt sensitive data in the database, such as the credentials of the override accounts for
managed domains, Azure administrator user password.
The secret key, also referred to as encryption key, is stored in the database using
asymmetric cryptography so that it can only be retrieved and decrypted by the
Administration Service that knows the private portion of the asymmetric key pair. Storing
the secret key in this way ensures the optimal level of protection for security-sensitive data
in the Active Roles database.
As the retrieval of the secret key requires knowing the private key related to the public key
that was used to encrypt the secret key, you may encounter a situation where a new
Administration Service instance attached to an existing Active Roles database is unable to
retrieve the secret key. Typically, this is the case when you:
If the Administration Service cannot retrieve the secret key from the database, you need a
backup copy of the secret key. Configuration Center prompts you to create a backup of the
secret key whenever you perform initial configuration of the Administration Service with
the option to create a new database.
On the Encryption Key Backup page, the Configure Administration Service wizard
specifies a file to store a backup copy of the secret key. You can encrypt the backup by
protecting the file with a password.
NOTE:
l The encryption key is only used to encrypt passwords for domain override
accounts (including AD LDS instances). Other than passwords, we do not encrypt
any other data.
l By default, the encryption key will be created in the following folder: C:\Pro
gramData\One Identity\Active Roles with a default name of
ARServiceEncryptionKey-dj-ars<version>.bin.
l If you lose your encryption key, you can still use Active Roles using one of
the following:
l Since the encryption key is used for the Managed Domain password
encryption, you can simply install Active Roles and use a new database and
import the settings from the old database. You will be prompted to create a
new encryption key file.
l Another method is to bring up an additional Active Roles service. It can
retrieve the encryption key from an already running Active Roles service
machine (you will be presented with the option to do so during installation).
l In case you do not have the encryption file for your original Active Roles
service, you can still upgrade to 6.9 from 6.x. You must create a new key
if required.
l If you have multiple Active Roles services sharing one database, you really
do not need the encryption key as Active Roles can pull the encryption
information from the existing running system.
l Encryption key file is not used during upgrade.
l You need Active Roles encryption key in the following cases:
l To add another Active Roles service to existing shared database
l There are no services connected to the same database up and running
l You cannot afford re-typing passwords for managed domains
Additional Information
1. If you want to change the name or location of the backup file, click the Browse
button and specify the desired file name and location. The wizard will save a copy of
the secret key to the file specified.
2. If you want to encrypt the backup, select the Protect the backup file with a
password check box, and then type and confirm a password. You will have to enter
the specified password to retrieve the key from the backup file. If you lose or forget
the password, it cannot be recovered.
If you select the Existing Active Roles database option on the Database Options
page, the Configure Administration Service wizard causes the new Administration Service
instance to connect to the database of an existing Administration Service instance. The new
instance automatically becomes a replica of the existing one.
This option allows you to centralize the Active Roles configuration storage. You can deploy
multiple Administration Service instances of the same configuration without having to
synchronize them via replication. Rather, you have the option for multiple Administration
Service instances to share configuration data held in a single database on centrally
deployed SQL Server.
This option also ensures that the newly deployed Administration Service instance can
immediately be used as a replacement for the existing one. Switching between
Administration Service instances is transparent to Active Roles users as both instances of
the Administration Service have the same configuration.
Specify the SQL Server instance in the form <Computer>\<Instance> (for named
instance) or <Computer> (for default instance), where <Computer> stands for the
short name of the computer running SQL Server.
Advanced scenarios
This section covers the database-related steps of the Configure Administration Service
wizard in the following scenarios:
l Using the database of an earlier Administration Service installation
l Using a pre-created, blank database
When you deploy the Administration Service, you may need to configure it to use the
database of an earlier installation of the Administration Service instead of creating a new
database. You may need to do so in the following scenarios:
l Restoring the Active Roles database from a backup, and then configuring the
Administration Service to use the restored database.
l Repairing the Active Roles installation by using Programs and Features in
Control Panel.
l Installing a maintenance release of Active Roles to update the existing Administration
Service instance.
NOTE:These scenarios assume that the database has the same version as the Admin-
istration Service you are configuring. If the Administration Service version is greater than
the database version, create a new database and import data from the existing database.
For more information, see Importing configuration data.
When you choose the option to create a new Active Roles database, the Configure
Administration Service wizard uses default values for database properties, such as the
location and other parameters of the database files and transaction log files. If you need
specific database properties, then you can use SQL Server tools to create a blank database
with the properties that meet your requirements, and have the wizard create the new
Active Roles database by adding the Active Roles tables and data to that blank database.
The following steps assume that you have a blank database already created.
If you enter a value less outside the specified range, an error is displayed.
4. Select the check box Enable faster failover for all Availability Groups and
Failover Cluster instances to enable MultiSubnetFailOver.
5. On the MHDatabase Options page, select the New Active Roles database
option, select the Use a pre-created blank database check box, and then
click Next.
6. On the Connection to MH Database page, specify the Database type, Database
Server name and the name of the database. Select the desired authentication option
for the Administration Service connection to the management history database.
7. Click Next, and follow the instructions in the wizard to complete the configuration.
When deploying the Administration Service, you may need to import configuration data
from an existing database in order to ensure that the new Administration Service instance
has the same configuration as the existing one. Importing configuration data to a newly
created database instead of attaching the Administration Service to an existing database is
necessary if the version of the Administration Service you are deploying is greater than the
version of the database you want to use. Some examples of such a situation are as follows:
l Upgrading the Administration Service while preserving its configuration.
l Restoring configuration data from a backup copy of the database whose version does
not match the version of the Administration Service.
The Services association page allows you to configure the Administration services for
executing Dynamic Groups, Group Families, and Scheduled tasks from the drop-down list.
2. On the Settings page, in the Active Roles database area, click Import
configuration.
3. On the Source database page in the Import configuration wizard that appears,
specify the database from which you want to import the configuration data
(source database):
a. Select the required Database Type. In the Database Server name box,
specify the SQL Server instance that hosts the source database.
b. In the Database box, specify the name of the source database.
4. Under Connect using, select the appropriate authentication option:
l If your Windows logon account has sufficient rights to write data to the
destination database, click Windows authentication.
5. On the Destination database page, under Connect using, select the appropriate
authentication option:
l If your Windows logon account has sufficient rights to write data to the
destination database, click Windows authentication.
l If you have a SQL Server login with sufficient rights, click SQL Server
authentication and enter the login name and password.
l If you have an Azure AD login with sufficient rights, click Azure Active
Directory authentication and enter the login name and password.
6. Click Next.
7. On the Add-on advisor page, the add-ons for the earlier version of Active Roles
are displayed.
NOTE: The Add-ons must be uninstalled manually from the earlier version using the
Active Roles Add-on Manager and from the system where ever applicable, before
continuing configuration import.
8. Click Next. then, on the Import of Encrypted Data page, select one of the
following options:
l If you have a backup of the secret key for the source database (see Backup of
encryption key), click Use a backup of encryption key to import
encrypted data and then click Browse to specify the backup file. If the
backup file is password-protected, type the password in the Password box.
l If you do not have a backup of the secret key for the source database, click
Do not import encrypted data. In this case, the encrypted data from the
source database, such as the override account password for managed
domain registrations, will not be available in the destination database.
Because of this, you will need to re-enter the override account password in
the managed domain registrations with the Administration Service that uses
the destination database.
9. The Services association page allows you to configure the Administration
services for executing Dynamic Groups, Group Families, and Scheduled tasks from
the drop-down list.
10. View the Summary page to review database configuration and Service
association details.
11. Click Next, and follow the instructions in the wizard to complete the import
operation.
Active Roles provides user interfaces for the Windows system and the Web, allowing users
with appropriate rights to perform administrative activities. The user interfaces include:
l Web Interface A customizable Web application for directory administration.
l MMC Interface A desktop console for Active Roles configuration and directory
administration.
By default, the Active Roles Setup wizard installs all core Active Roles components,
including the console (MMC Interface) and Web Interface. You can choose to install
individual components, if needed.
1. Log on with a user account that has administrator rights on the computer.
2. Navigate to the location of the Active Roles distribution package, and start the Setup
wizard by double-clicking ActiveRoles.exe.
3. Follow the instructions in the Setup wizard.
4. On the Component Selection page, ensure that the Console (MMC Interface)
component is selected, and click Next.
By default, all components are selected. If you only want to install the console, clear
the check boxes that denote unwanted components.
Once you have installed the console, you can start it by selecting Active Roles 8.1.5
Console on the Apps page or Start menu, depending upon the version of your Windows
operating system.
Prerequisites
Before you begin installing and configuring the Web Interface component, make sure you
meet the following requirements on the computer(s) where you will install the component:
Requirement Description
type
Operating You can install the Active Roles Web Interface component on the
system following operating systems:
l Windows Server 2022
l Windows Server 2019
l Windows Server 2016
Internet Make sure that the computer where the Web Interface is installed has
Services the Web Server (IIS) server role installed, with the following role
services:
l Web Server/Common HTTP Features/
l Default Document
l HTTP Errors
l Static Content
l HTTP Redirection
l Web Server/Security/
l Request Filtering
l Basic Authentication
l Windows Authentication
l Web Server/Application Development/
l .NET Extensibility
Feature deleg- Make sure that Internet Information Services (IIS) provides
ation Read/Write delegation for the following features:
l Handler Mappings
l Modules
.NET Trust Make sure that the .NET Trust Level is set to Full (internal) on every
Levels computer where the Web Interface component will be installed.
To configure this setting:
NOTE: Setting the .NET Trust Level to any other value will result in a
failure when attempting to load any of the configured Active Roles
Web Interface sites.
1. Login with an administrator account to the computer where you want to install the
Web Interface component.
2. Mount the Active Roles .iso file, and start the setup wizard by double-clicking
ActiveRoles.exe.
3. In the Component Selection step, select Web Interface, then click Next.
4. In the Ready to Install step, review the installation settings, install any of the
prerequisites if needed, then click Install.
5. In the Completion step, make sure that I want to perform configuration is
selected, and click Finish.
Once the installation completes, to configure the Web Interface service, use the Active
Roles Configuration Center. This procedure has two main stages:
l Initial configuration: During this stage, the Administration Service creates the three
default Web Interface sites (Self-Service, Helpdesk and Admin), based on the default
configuration templates.
l Additional configuration: During this stage, you can create additional sites, and
modify or delete existing sites.
Initial configuration
During initial configuration, you must configure the Administration Service instance in the
Active Roles Configuration Center that the Web Interface component will use. You can
configure the Web Interface to use:
l The Administration Service instance that runs on the same computer as the
Web Interface.
l An Administration Service instance running on a specific computer.
l Any available Administration Service instance in a specified replication group.
Before performing the initial configuration of the Web Interface, ensure that the
Administration Service instance you want to use is configured and started. Otherwise, the
configuration will fail in the Active Roles Configuration Center.
TIP: To check the state of the Administration Service, in the computer where the process
is running, launch Active Roles Configuration Center, then open the Administration
Service page. The page must indicate the process in a Ready for use state.
1. Login with an administrator account to the computer where you want to configure the
Web Interface component.
2. Open the Active Roles Configuration Center.
The Active Roles Configuration Center then creates three Web Interface sites based on the
following configuration templates:
l Default Site for Administrators: Creates the default Administration Site. This site
supports a broad range of tasks, including the management of directory objects and
computer resources.
l Default Site for Help Desk: Creates the default Helpdesk Site. This site supports
performing tasks typical to the duties of Helpdesk operators, such as
enabling/disabling accounts, resetting passwords, and modifying select properties of
users and groups.
l Default Site for Self-Administration: Creates the default Self-Service Site. This
site provides the User Profile Editor, allowing end-users to manage their personal or
emergency data through a simple-to-use Web Interface.
After the initial configuration is complete, you can modify the Web Interface configuration
further with the Active Roles Configuration Center. This includes creating new Web
Interface sites, modifying an existing site (for example, changing the web application
alias), or deleting sites.
TIP: You can apply existing site configurations when creating new Web Interface sites.
This is useful, for example, if you need to deploy another instance of the Web Interface to
another web server, but you already have a Web Interface site that meets the require-
ments of the new site.
Creating a new site based on an existing configuration saves time, as the newly-created
site will contain the same set of menus, commands and pages right from the start as
other existing sites based off the same configuration. For more information on how to
create a site based on an existing configuration, see the following procedure.
1. In the Active Roles Configuration Center, on the Dashboard page, click Web
Interface > Manage Sites.
Alternatively, on the side bar, click Web Interface.
2. On the Web Interface page, click the applicable button:
l To create a new site, click Create.
l To modify an existing site, select it from the list, then click Modify.
l To delete an existing site, select it from the list, then click Delete.
3. (Optional) If you selected to Create or Modify a site, in the Web Application step,
configure the following settings:
l IIS Web site: Specifies the IIS website containing the web application that
implements the Web Interface site. The list is populated from the websites
defined on the web server.
l Alias: Specifies the alias of the web application that implements the Web
Interface site. The alias defines the virtual path used in the address of the Web
Interface site on the web server.
4. (Optional) If you selected to Create or Modify a site, in the Configuration step,
specify how to set the configuration of the new website. The website configuration
contains all customizable settings of the user interface elements, such as the website
menus, commands, and web page forms that appear on the Web Interface.
l Keep the current configuration: Uses the configuration currently assigned
to the site. Select this option if you do not want to assign a different
configuration to the site.
NOTE: This setting is only available when modifying an existing site.
Once you configured a new site or modified an existing one, you can access it from your
browser by using the specified web application alias in the following format:
http://<website>/<alias>
In this alias, <website> identifies the IIS website containing the web application that
implements the Web Interface site, while <alias> is the alias of the web application as
specified in the Configuration Center. For example, if the web application is contained in the
default website, the address will be the following:
http://<computer>/<alias>
In this example, <computer> is the network name of the computer (web server) running the
Web Interface.
By default, you can connect to Web Interface sites via the HTTPS protocol, which encrypts
the data transferred from the web browser to the Web Interface. If your organization does
not require a secure protocol for accessing the Web Interface sites, you can disable using
the HTTPS protocol in the Active Roles Configuration Center.
The HTTPS protocol uses SSL protection provided by the web server for data encryption.
For more information on how to enable SSL on your web server, see Configuring Secure
Sockets Layer in IIS 7 in the Microsoft Windows Server documentation.
To configure the Web interface for secure communication for the first time
4. To enable the force SSL redirection, switch between the Enable Force SSL
Redirection states. Turn it on.
5. In the Available HTTPS Bindings field, click the drop-down list and select the
required binding for the web site.
6. Click Modify.
After successful completion of configuration changes, in the Web Interface window,
the Force SSL Redirection configuration state for the selected web site is displayed as
green and enabled.
7. Click Finish.
NOTE: The browser cache must be cleared after any changes are made to
SSL settings.
For the configured web site, any HTTP communication is now redirected to HTTPS
automatically.
After disabling the Force SSL Redirection, all communication is now redirected
to HTTP.
For more information on secure communication and Federated Authentication, see Working
with Federated Authentication.
In addition to the Administration Service, MMC Interface and Web Interface, Active Roles
allows you to install the following components:
l Active Roles Management Shell Provides commands based on the Windows
PowerShell platform for managing users, group, computers and other objects in
Active Directory via Active Roles; administering certain Active Roles objects; and
configuring Active Roles Administration Service instances and Web Interface sites.
l ADSI Provider Enables custom applications and scripts to access directory data via
Active Roles by using standard COM interfaces. Documentation for ADSI Provider can
be found in the Active Roles SDK.
l Active Roles SDK Provides developers with documentation and samples to help
them customize Active Roles by creating custom client applications and user
interfaces, and implementing business rules and policies based on custom scripts.
l Collector Gathers data required for reporting. Retrieves data from specified data
sources through the Administration Service, and stores the data on database server.
l Report Pack A comprehensive suite of report definitions that cover various
administrative actions available in Active Roles.
l Diagnostic Tools A package that provides optional tools for checking system
requirements, logs and changes in your Active Directory domain.
l Add-on Manager An application for installing and managing add-ons for Active
Roles. You can also create new addons with the solution's Add-on Editor.
1. Log on with a user account that has administrator rights on the computer.
2. Navigate to the location of the Active Roles distribution package, and start the Setup
wizard by double-clicking ActiveRoles.exe.
3. Follow the instructions in the Setup wizard.
4. On the Component Selection page, clear all check boxes except Management
Tools, and click Next.
5. To start installation, on the Ready to Install page, click Install.
6. On the Completion page, click Finish.
Once you installed the Management Tools, you can open the Management Shell or view the
SDK documentation (including the ADSI Provider documentation). Depending on the
version of your Windows operating system, select the following on the Apps page or the
Start menu:
l To open the Management Shell, select Active Roles 8.1.5 Management Shell.
l To view the SDK documentation, select Active Roles 8.1.5 SDK.
After you opened the Management Shell, you can view its reference manual by typing
QuickRef. The manual describes all commands provided by the Management Shell.
Installing Collector
The Active Roles Collector is used to prepare data for reporting, allowing you to configure,
schedule, and run data collection jobs. Collector stores report data in a database on an on-
premises SQL Server or Azure SQL database. For best results, use Microsoft SQL Server
2012 or a later version of SQL Server to host the Collector’s database.
NOTE: Collector can now store data in Azure database.
1. Install Active Roles Management Tools. For installation instructions, see Steps to
install only the Shell, ADSI Provider and SDK.
2. In the Active Roles distribution package, navigate to the Solutions/Collector and
Report Pack folder, and double-click the .msi file held in that folder.
3. Follow the instructions in the Setup wizard.
4. Wait while the wizard completes the installation.
Once you have installed Collector, you can start the Collector wizard by selecting Active
Roles 8.1.5 Collector and Report Pack on the Apps page or Start menu, depending upon
the version of your Windows operating system.
Report Pack requires Microsoft SQL Server Reporting Services (SSRS). Make sure that you
have SSRS deployed in your environment. When deploying Report Pack, the Collector
wizard prompts you for the address (URL) of the Report Server Web service. You can find
this address on the Web Service URL page in the Reporting Services Configuration
Manager tool on the server where SSRS is installed.
2. On the Select Task page, click Deploy reports to Report Server, and then
click Next.
3. On the Report Server page, type the URL of your SSRS Report Server in the Report
Server Web Service URL box. Click Next.
By default, the URL is http://<serverName>/ReportServer. You can use the
Reporting Services Configuration Manager tool to confirm the server name and URL.
For more information about URLs used in Reporting Services, see the topic
“Configure Report Server URLs (SSRS Configuration Manager)” at
http://msdn.microsoft.com/library/ms159261.aspx.
4. (Optional) on the Data Source page, configure the data source for the Active
Roles reports:
a. Click the Configure Data Source button.
b. Use the Configure Data Source dialog box to specify the database server
instance that hosts the database you have prepared by using Collector, the
name of the database, database type, and the authentication method to use for
connection to the database.
Configuring the data source is an optional step. If you do not have a database
prepared by Collector, you can configure the data source later, after you have
5. Click Next and wait while the wizard deploys the Report Pack.
You can create and view Active Roles reports using Report Manager, a Web-based tool
included with SSRS. For instructions, see “Generating and viewing a report” in the Active
Roles Administration Guide.
1. Mount the Active Roles installation .iso file, and navigate to the Solutions >
Diagnostic Tools folder.
2. Run the ActiveRolesDiagnosticTools .msi file, and follow the on-screen
instructions of the Setup wizard.
1. Mount the Active Roles installation .iso file, and navigate to the Solutions > Add-
on Manager folder.
2. Run the ActiveRolesAddonManager .exe file, and follow the on-screen instructions
of the Setup wizard.
3. In the configuration wizard that appears after installation completes, select how to
register Add-on Manager to the Active Roles Administration Service.
l Any available Administration Service: Select this option to register Add-on
Manager with the nearest Administration Service, connecting to that
Administration Service instance with the credentials of your current logon
account. To apply this option, your current logon account must be an Active
Roles Admin.
l Administration Service on this computer: Select this option to register
Add-on Manager with the Administration Service that runs on the computer you
specify. The wizard will then connect to that Administration Service with the
user name and password you supply. Make sure that you specify the user name
and password of the Active Roles Admin.
4. To apply your change, click Register.
You can upgrade from Active Roles 7.5 or later to the latest version of Active Roles using
one of the following methods:
l In-place upgrade: Install the latest version of Active Roles on the computer without
removing the earlier version.
l New installation with import of database from earlier version: Install the latest
version of Active Roles and import the database from the earlier version of
Active Roles.
NOTE:
l To perform a clean installation of Active Roles, uninstall the currently installed
version before installing Active Roles 8.1.5.
l Active Roles supports selection of custom installation path only during a fresh
installation. During an in-place upgrade, Active Roles does not support changing
the custom installation path.
For information on importing configuration data from the database of an earlier version of
Active Roles, see Import Configuration under Upgrading the Administration Service.
NOTE: Before upgrading to the latest version of Active Roles, the add-ons of the earlier
versions must be uninstalled.
Upgrading from Active Roles 6.9 version to a newer version is a side-by-side upgrade. To
ensure smooth upgrade to the new Active Roles version, first upgrade the Administration
Service, then upgrade the Web Interface.
The service account that is used for performing the in-place upgrade or the import or
migration operation should have the following permissions in the SQL Server to perform
the operation:
l db_datareader fixed database role in the source database.
l db_owner fixed database role and the default schema of dbo in the
destination database.
l sysadmin fixed server role in the destination database.
If a limited SQL access account is used for performing the in-place upgrade, a manual
action is required to pre-create the new Active Roles databases. For more information,
see Knowledge Base Article 4303098 on the One Identity Support Portal.
By default, the database users, permissions, logins, and roles are imported to the
destination database. You can clear the Copy database users, permissions, logins,
and roles check box in the following locations depending on the operation:
l During in-place upgrade: in the Upgrade configuration window.
l Importing configuration: Import Configuration > Source Database >
Configure advanced database properties.
l Importing management history: Import Management History > Source
database > Configure advanced database properties.
To upgrade existing Active Roles 7.5 or later version to the latest version, perform the
following steps.
NOTE: Before performing the in-place upgrade, One Identity recommends to approve all
pending approval activities.
NOTE: Before performing the in-place upgrade, One Identity recommends backing up the
Active Roles database. For more information on general best practices, see Create a Full
Database Backup in the Microsoft SQL documentation.
One Identity recommends backing up the current Web Interface instances if any
customizations have been implemented.
Any Web Interface sites that were created in Active Roles 7.5 or later will continue to
function in 8.1.5. However, it is recommended to thoroughly test before upgrading, as
some customizations may not work as expected in newer versions of Active Roles.
The in-place upgrade of Active Roles 7.5 upgrades the Active Roles 7.5 Administration
Service and Web Interface components.
The in-place upgrade of Active Roles 7.5 does not upgrade the Active Roles solution
components such as SPML Provider, Add-on Manager, Add-ins for Outlook, Diagnostic
Tools, and so on. To upgrade the solution components installed with Active Roles, use the
respective installers available in the Active Roles installation package.
During Active Roles upgrade, if the Active Roles database is not split into Configuration
and Management History databases, the upgrade process creates a Management History
database by default.
NOTE: If a limited SQL access account is used for performing the in-place upgrade, you
must pre-create the new Active Roles databases manually. For more information, see
Knowledge Base Article 4303098 on the One Identity Support Portal.
1. Log in with a user account that has administrator rights on the computer.
2. Navigate to the location of the Active Roles distribution package, and to start the
Setup wizard, double-click ActiveRoles.exe.
3. Follow the instructions in the Setup wizard.
a. To continue, click Next.
b. To accept the license agreement, select I accept the terms in the license
agreement, and click Next.
c. Review the summary and warning. If the Office 365 Add-On is installed in the
7.5 instance, uninstall it before continuing.
d. On the Ready to Upgrade page, make sure that the prerequisite software are
installed, then click Upgrade.
e. On the Completion page, click Finish.
NOTE: After upgrading the Active Roles package to 8.1.5, perform the steps of Config-
uring Active Roles during in-place upgrade.
a. (Optional) To change the default names of the new databases, click Click here
to change or provide existing database names.
b. Select the check box to confirm that you have read the instructions in this
document about the in-place upgrade process, and click Next.
NOTE: By default, during in-place upgrade, in the Upgrade configuration
window, the Copy database users, permissions, logins, and roles
option is selected.
3. The Reauthenticate Tenants page lists the configured Azure tenants in the source
database. To reauthenticate a tenant, click Reauthenticate next to its name.
After the database upgrade is complete, the Active Roles Service is ready for use.
NOTE: To upgrade multiple Active Roles Service instances, log in to the individual
systems where Active Roles Service was upgraded, and perform the in-place upgrade
steps for each Service.
NOTE: Before upgrading to the latest version of Active Roles, the add-ons of the
earlier versions must be uninstalled.
1. After upgrading the Active Roles package to 8.1.5, you are prompted to
restart the system.
2. After the system restarts, the Configuration Center opens by default, displaying the
Upgrade configuration wizard.
The fields in the wizard are auto-populated. The database name for Configuration
and Management history are suggested, by default. However. if you want to update
the database name, click Click here to change or provide existing database
names link.
3. Select the check box on the Upgrade configuration wizard, to confirm that you have
read the instructions in the Quick Start guide regarding "Configuring Active Role for
in-place upgrade".
4. Click Next.
NOTE: If you click Next without selecting the check box, an error is displayed
prompting you to follow the instructions given against the check box and
select the check box.
The upgrade starts and the Execution tab displays the Progress bar for the upgrade.
After the database upgrade is complete, the Active Roles Service is automatically started
and ready for use.
You can upgrade from Active Roles 7.5 or later to Active Roles 8.1.5 using in-place upgrade
or a new installation of Active Roles with importing the database from an earlier version.
Upgrading from Active Roles 6.9 version to a newer version is a side-by-side upgrade. To
ensure smooth upgrade to the new Active Roles version, first upgrade the Administration
Service, then upgrade the Web Interface.
1. Log on with a user account that has administrator rights on the computer.
2. Navigate to the location of the Active Roles distribution package, and start the Setup
wizard by double-clicking ActiveRoles.exe.
3. Follow the instructions in the Setup wizard.
4. On the Component Selection page, ensure that the Administration Service
component is selected, and click Next.
5. On the Ready to Install page, click Install to perform installation.
6. On the Completion page, select the I want to perform configuration check box,
and click Finish.
The Setup wizard only installs the files. After you have completed the Setup wizard, you
need to configure the newly installed Administration Service instance by using Active Roles
Configuration Center. The Configuration Center opens automatically if you select the I
want to perform configuration check box on the Completion page in the Setup wizard.
Another way to open Configuration Center is by selecting Active Roles Configuration
Center on the Apps page or Start menu, depending upon the version of your Windows
operating system.
Import configuration
After you have installed and initially configured the Administration Service of the new
version, import the configuration data from the database used by your Administration
Service of the earlier version. To import configurations, you must identify that database. To
identify the database:
1. Open the Active Roles console and connect to your Administration Service of the
earlier version (see “Connecting to the Administration Service” in the Active Roles
Administration Guide).
2. Select the console tree root, and then, on the page in the details pane, expand the
Configuration Databases and Replication area.
You can identify the database name, SQL Server name, and database type from
the first string in the Configuration Databases and Replication area that
has the following format: Database <name> on SQL Server <name> Database
Type <type>.
NOTE: When an import configuration is performed from Active Roles version 7.5 to
8.1.5, the Web Interface does not get upgraded. However, the Configuration
Center or any client report the Active Roles Web Interface version incorrectly as
8.1.5. To upgrade the Web Interface to the latest version, see Creating Web
interface sites and importing configuration.
1. Open the Active Roles console and connect to your Administration Service of the
earlier version (see “Connecting to the Administration Service” in the Active Roles
Administration Guide).
2. Select the console tree root, and then, on the page in the details pane, expand the
Management History Databases and Replication area.
Identify the database name, SQL Server, database type name from the first string in
the Management History Databases and Replication area that has the following
format: Database <name> on SQL Server <name> Database Type <type>.
After identifying the database, perform the import. You can do this using the Import
Management History wizard of the Configuration Center. On the Source database
page in the Import Management History wizard, supply the database name and SQL
Server name you have identified. For more information, see Importing management
history data.
As a result of these steps, multiple Administration Service instances of the new version use
a single database updated with the configuration and management history data of your
earlier Active Roles version.
1. Once Active Roles is installed, open the Active Roles Configuration Center in
Windows. The Upgrade configuration wizard will automatically appear.
2. To reauthenticate existing Azure tenants, proceed to the Reauthenticate tenants
step and click Reauthenticate next to each Azure tenant.
To reconfigure Azure tenants after upgrading from Active Roles 7.4.1 or 7.4.3 to
Active Roles 8.1.5
3. To make the configured Azure tenant appear in the Active Roles Web Interface, you
must restart the Administration Service. Click Administration Service on the left
pane, then either click Restart, or first click Stop and then Start.
To reconfigure Azure tenants when upgrading from Active Roles 7.4.4 to 8.1.5
1. For each Web Interface site of your earlier Active Roles version, identify and note
down the name of the configuration object that the Administration Service uses to
store the site’s configuration data.
2. Install and configure the Web Interface instance of the latest Active Roles version,
choosing the new Administration Service to which you have imported configuration of
your earlier Active Roles version. For more information, see Upgrading the
Administration Service.
3. On the new Web Interface instance that you installed and configured, create sites
based on information you noted previously, importing data from the configuration
objects used by your earlier Web Interface version. Those configuration objects were
copied to the new Administration Service during configuration data import. For more
information, see Import configuration.
4. Optionally, delete the default sites that were created when you configured the Web
Interface in Step 2. The default sites are unaware of your existing site
customizations, and have the default configuration of menus, command, forms and
other elements.
If you no longer need the Web Interface of the earlier version, you can uninstall it using
Programs and Features in Control Panel: Right-click Web Interface in the list of
installed programs, and then click Uninstall.
To identify the configuration object of the Web Interface site of an earlier Active
Roles version
1. On the Web server running your Web Interface of the earlier Active Roles version,
start the Web Interface Sites Configuration wizard.
To start the wizard, select Web Interface Sites Configuration on the Apps page
or Start menu, depending upon the version of the Windows operating system on the
Web server.
2. Proceed to the Web Interface Configuration page in the Web Interface Sites
Configuration wizard.
The page lists your Web Interface sites of the earlier Active Roles version.
3. On the Web Interface Configuration page, click the list item representing the
desired site, and then click the Edit button.
You can distinguish sites by alias, shown in the Virtual Directory column on the
Web Interface Configuration page. The alias defines the virtual path used in the
address of the Web Interface site on the Web server.
4. Note down the name of the site’s configuration object shown in the Configuration
settings area of the dialog box that appears.
The name of the object is displayed in the Name box under the Use existing
configuration option, and includes the version number.
To identify the configuration object of the Web Interface site of the current
Active Roles version
For more information, see the Web Interface management tasks section in the One Identity
Active Roles Administration Guide.
Identify the configuration object for each of your existing Web Interface sites, and note
down the name of each object. You will need these names when creating the Web Interface
sites of the new Active Roles version.
1. Log on with a user account that has administrator rights on the computer.
2. Navigate to the location of the Active Roles distribution package, and start the Setup
wizard by double-clicking ActiveRoles.exe.
3. Follow the instructions in the Setup wizard.
4. On the Component Selection page, ensure that the Web Interface component is
selected, and click Next.
5. On the Ready to Install page, click Install to perform installation.
6. On the Completion page, confirm that the I want to perform configuration
check box is selected, and click Finish.
3. Click the Configure button, and wait while the wizard completes the configuration.
8. Click the Create button, and wait while the wizard creates the new Web
Interface site.
Perform these steps for each of your Web Interface sites of the earlier version, selecting the
appropriate object name in Step 7b.
Collector
To upgrade, first uninstall your earlier version of Collector and then install the new version.
To uninstall Collector, use the Programs and Features list of the Windows Control Panel.
Once you uninstalled your earlier version of Collector, install the new version. For
installation instructions, see Steps to install Collector and Report Pack.
Report Pack
To upgrade, first uninstall your earlier version of the Report Pack and then install the new
version. The Report Pack should be uninstalled on the computer that was initially used to
install the Report Pack. You can uninstall the Report Pack by using Programs and
Features in Control Panel.
Once you have uninstalled your earlier version of the Report Pack, deploy the new version.
For instructions, see Deploying Report Pack.
Collector’s database
The new version of the Report Pack is incompatible with the database of an earlier Collector
version. To create reports based on the events held in that database, you need to import
the events to the database of the new Collector version, and then specify the database of
2. On the Select Task page, click Import events from an earlier database
version, and then click Next.
3. On the Source database page, click Specify, and supply the name, database type
and the database server of the database used by your Collector of an earlier version.
Click Next.
4. On the Target Database page, click Specify, and supply the database type,
database server, and database name of the database used by your Collector of the
current version.
5. Click Next, and wait while the wizard performs the import.
Synchronization Service
If you have synchronization workflows configured and run by Quick Connect (predecessor
of Synchronization Service), or earlier versions of Synchronization Service, then you can
transfer those synchronization workflows to Active Roles and have them run by
Synchronization Service.
You can transfer synchronization workflows from the following Quick Connect or
Synchronization Service versions:
l Quick Connect Sync Engine 5.2.0, 5.3.0, 5.4.0, 5.4.1, or 5.5.0
l Quick Connect Express for Active Directory 5.3.0, 5.4.0, 5.4.1, 5.5.0, or 5.6.0
l Quick Connect for Cloud Services 3.3.0, 3.4.0, 3.5.0, 3.6.0, 3.6.1, 3.6.2, or 3.7.0
l Quick Connect for Base Systems 2.2.0, 2.3.0, or 2.4.0
l Synchronization Service 7.0, 7.1, 7.2, or 7.3
1. Create an instance of the new Administration Service. For instructions, see Upgrading
the Administration Service.
You can install the Administration Service of version Active Roles side-by-side with
the Administration Service of version 6.9, on the same computer. Another option is to
install the new Administration Service on a different computer.
2. Import the configuration data from the database used by your production
Administration Service of the earlier Active Roles version, to the new Administration
Service you created in the previous step.
You can import the configuration data using the Import configuration wizard of
the Configuration Center. On the Source database page in the Import
configuration wizard, specify the database used by your production Administration
Service of the earlier Active Roles version. For more information, see Import
configuration data.
Optionally, you can import the management history data from the database of your
production Administration Service, in addition to the configuration data (see Import
management history data).
1. Install and configure the new Administration Service on a computer running the
operating system you want. When performing initial configuration, specify the
desired SQL Server instance. You are not required to specify the SQL Server instance
that hosts the database of your production Administration Service of the earlier
Active Roles version. You can choose any SQL Server version that meets the system
requirements for the new Active Roles version.
2. Import the configuration data and, optionally, management history data, from the
database of your production Administration Service of the earlier Active Roles version
to the new Administration Service you created in the previous step.
1. For each of your production Web Interface sites of the earlier Active Roles version,
identify and note down the name of the configuration object used by that site.
You can identify your existing site configuration objects by using the Web Interface
Sites Configuration wizard on the computer running your production Web
Interface. For detailed instructions, see Identify configuration objects.
2. Create an instance of the new Web Interface, and configure it to use the
Administration Service instance you have deployed for your pilot project. For details,
see Install and configure the Web Interface.
You can install the Web Interface of version Active Roles side-by-side with the Web
Interface of version 6.9, on the same computer. Another option is to install the new
Web Interface on a different computer.
3. On the Web Interface instance you created, create Web Interface sites, importing site
configuration data from the configuration objects you identified previously. For more
information, see Create sites based on old configuration objects.
Optionally, delete the default sites that were created when you configured the Web
Interface. The default sites cannot detect existing site customizations, and have the default
configuration of menus, command, forms and other elements. For more information on
deleting the default Web Interface sites, see Delete default sites.
Deployment considerations
This section addresses issues concerning the deployment of the Active Roles Administration
Service. Information for this section was collected from:
l Feedback from our current customers who have enterprise class deployments with
multiple sites/locations
l Extensive testing of Active Roles in our software development labs
l Comparisons and testing of Active Roles to competitors’ solutions
When an organization has gathered and assessed the information above, it will be able to
determine the locations and number of Administration Services to be installed. The last
sub-section provides network diagrams that illustrate potential Active Roles deployments.
Business workflow
This factor focuses on Active Directory (AD) data management processes and practices,
including who will perform these tasks and from where they access the management
services. Generally, these tasks will be divided among several groups, which might
include both high- and low-level administrators, a Help Desk, HR personnel, and work
group managers.
Possible business workflows for AD data management processes might be:
Hardware requirements
After calculating the resource usage of an Administration Service and mapping the business
workflow of the network sites, an organization will have the necessary information to start
assessing any need for additional hardware.
There is no technical need for installing the Administration Service on dedicated hardware.
In fact, current customers do not use only dedicated hardware. They use a combination of
dedicated and shared hardware to host the Administration Service. For example, a current
customer manages 2,000,000 AD objects in a global deployment with a total of five
Administration Services, two of which are dedicated and the other three are shared with
other applications.
An organization’s current infrastructure, including existing servers, sites and connections,
will greatly determine the need for additional hardware to run Active Roles. The
Administration Service can be installed on any server, although organizations should
consider these two guidelines:
l It is not recommended that the Administration Service be installed on a domain
controller.
l Typically, organizations install the Administration Service on other application, file, or
print servers.
Depending on service level agreements or goals, if existing servers are currently fully
loaded or overloaded, then a new server should be purchased, and the Administration
Service and additional services should be moved onto the new equipment. Not only will this
enable Active Roles deployment, it will also improve the performance of the currently
deployed services. Since Active Roles is often deployed during migration to Active
Directory, Active Roles deployment can be included in planning for new hardware and
server consolidation.
Major sites
Two guidelines should be followed for major sites:
l Our customers typically deploy two Administration Services per major location/site
where AD data administration and user management is performed. This redundant
service solution would be effective if both the primary Administration Service and all
connections to other sites failed.
Again, organizations should use their administration framework and their experience
with other management services, such as SMS, to determine the need for an
Administration Service at a site.
l Most customers do not place all of their Administration Services at one location/site.
If access to that one location/site should fail, all Administration Service of AD would
stop. Instead, they install Administration Services at two or sometimes more sites.
In most scenarios, even if the server hosting the Administration Service fails,
connections to other sites will be maintained. Administrators can access
Administration Services at another site and force AD replication to make the changes
appear on the local domain controller as soon as possible.
Replication traffic
Active Roles employs the Microsoft SQL Server to maintain the configuration database. The
replication capabilities of SQL Server facilitate the implementation of multiple equivalent
configuration databases used by different Administration Services.
Replication traffic can be judged by considering what is replicated and what is not. Active
Roles configuration information is replicated only if it is changed. This means that if
administrators are not creating Managed Units, Access Templates, Policies and delegating
permissions that often, there is not much replication traffic.
Centralized
This diagram shows a centralized network and workflow (the ARS abbreviation refers to the
Active Roles Administration Service).
In this scenario, AD data management is performed at all locations. These locations can be
campuses or single locations connected by LAN/WAN connections. The work is done by a
Physical design
This section covers two typical installation configurations for Active Roles. In both
installations the architecture is designed to maximize the effectiveness of the Active
Roles software based on how the network is configured and how administrative duties
are assigned.
Several software components must be considered when deploying Active Roles:
l AR Service The Active Roles Administration Service (AR Service) communicates
directly with an Active Directory domain controller (DC), and is responsible for
making all changes to Active Directory. The DC to which the AR Service speaks is
selected automatically and can be changed by the Active Roles user. The ARS
Service is also responsible for performing access checks to prevent non-authorized
users from connecting to Active Roles interfaces and to ensure that authorized users
are performing tasks according to the role they hold and the rules that have been
put in place.
l Console the Active Roles console provides an MMC-based interface to configure
Active Roles as well as perform administration of Active Directory. The Console
only connects to the AR Service and is not capable of making changes directly in
Active Directory.
The decision where to place servers running the Active Roles software components should
leverage the strengths of the existing network and the associated IT Service structure.
Centralized deployment
The first installation configuration is known as the Centralized model. In this model
administration is controlled from a single larger site. In the centralized model the
deployment places servers in one physical location. This allows all the AR Service instances
to share a single configuration and management history database, or replicate their
DC focusing
Normally, the Active Roles Administration Service (AR Service) itself chooses the Active
Directory domain controller (DC) to communicate with, which is the nearest DC by default.
With a centralized deployment model, this means that the AR Service will select DC found
in the same location where the corresponding AR instance resides, so even the regionally
local changes calls (those submitted from the EMEA or APAC location) are performed
against DC located in North America (rather than a locally-placed DC) thereby causing an
additional slow-down due to Active Directory replication latency.
The preferred behavior would be as follows:
l Regionally local changes calls are executed against locally-placed DC.
l Cross-site changes calls are executed against DC located at the target site.
The appropriate choice of DC would ensure that the changes appear on the target site
without an Active Directory replication related slow-down. Active Roles users can choose an
appropriate DC by using the Change Operational DC command on the menu for the
domain object, in the Active Roles console or Web Interface. If operational DC is explicitly
specified by the user, the AR Service submits the change requests to that DC instead of the
nearest DC.
Distributed deployment
The second installation configuration is the Distributed model where servers are deployed
by analysis of how the network is configured and how administrative duties are assigned
and performed.
In a distributed environment there are three primary criteria for the determination of the
placement of Active Roles:
Total of six Active Roles instances are deployed across the world-wide enterprise, with two
instances located in each of three major regions—North America, EMEA (Europe, Middle
East and Africa), and APAC (Asia Pacific). This per-site deployment model provides an
efficient way for Active Directory data changes initiated via Active Roles to take effect by
minimizing wait time for cross-site Active Directory replication.
All Active Roles instances provide the same Active Directory access delegation workflow
and can be treated as a single delegation mechanism. Sharing the same configuration
settings between instances is achieved by means of SQL replication.
Each region has two Active Roles instances for failover and load balancing purposes. For
failover purposes each instance is independent from a hardware and software standpoint
by having its own dedicated AR Service, Web Interface (IIS) and SQL Server. This
deployment is flexible in regards to hardware extension: new hardware can be added into
the project for load balancing or troubleshooting purposes without changing the
deployment.
By default, the AR Service chooses the same domain controller to hold the role of both the
Operational DC and DirSync DC.
The AR Service is permanently listening to the DirSync DC for changes related to Active
Roles dynamic configuration objects, such as Dynamic Groups and Managed Units. Every
operation that involves the retrieval or modification of Active Directory data, requested by
Active Roles client interfaces or by AR Service internal logic, is performed against this DC.
The user can specify another DC for the client operations, by using the Change
Operational DC command in the Active Roles console or Web Interface.
SQL database
Total of six SQL Server instances are deployed across the world-wide enterprise to host the
Active Roles database, with two instances located in each of three major regions—North
America, EMEA, and APAC. Each AR instance has a separate SQL database. The databases
are synchronized by means of SQL Server replication function. One of the database servers
holds the Publisher role while the others are Subscribers to that Published.
Active Roles normally uses the same database to store both the Configuration and
Management History data. The Configuration data applies to the delegation and workflow
Web Interface
Each of the six AR instances has a separate Web Interface installation, with the AR Service
and Web Interface components running together, on the same server. A design where both
the AR Service and Web Interface are installed on a single server takes advantage of
integrated authentication, which allows domain users to access the Web Interface without
being prompted for their user name and password.
You can use these templates to create new Web Interface sites and then customize each of
the new sites as needed. Thus, you may deploy multiple Help Desk sites, having each
customized individually. To create new Web Interface sites and site configurations Active
Roles provides the Web Interface Sites Configuration wizard. You can open the wizard from
the Start menu on any server running the Web Interface. The wizard is mainly intended to:
l Create a new Web Interface site with an existing configuration. This option only
allows you to select a Web Interface site configuration that already exists in your
Active Roles environment. Use this option when deploying a new Web Interface
instance to add an existing custom Web Interface site to that instance.
l Create a new Web Interface site with a new configuration. This option only allows you
to select one of the three built-in website templates, and creates a new Web
Interface site configuration based on the template you select. Use this option to
create a new Web Interface site on one of your Web Interface instances. On the other
instances the new site should be deployed by selecting the site configuration you
have created.
When deploying a new Web Interface instance, it is important to understand that only three
default Web Interface sites are installed out of the box. To add a custom Web Interface site
to a newly installed Web Interface instance, you should use the Web Interface Sites
Configuration wizard.
Active Roles supports Command line options for the installation of Active Roles Server. The
following is a list of command line options available with Active Roles Server 8.1.5:
l ActiveRoles.exe
Launches the Setup wizard.
l ActiveRoles.exe /quiet [parameters]
Quiet mode, no user interaction. Also known as a silent or unattended installation.
l Parameter syntax
/parameter [properties]
Use a space character to separate properties.
l Properties
ADDLOCAL=
Comma-separated list of Active Roles components to install.
REMOVE=
Comma-separated list of Active Roles components to remove.
TARGETDIR=
Path to the desired install folder.
l Component names
l ALL - all components
l Service - Administration Service
l Web - Web Interface
l Console - Console (MMC Interface)
l Tools - Management Tools
l SyncService - Synchronization Service
When a user signs up for a Microsoft cloud service such as Azure Active Directory, details
about the user’s organization and the organization’s Internet domain name registration are
provided to Microsoft. This information is then used to create a new Azure AD instance for
the organization. The same directory is used to authenticate sign in attempts when you
subscribe to multiple Microsoft cloud services.
The Azure AD instance of the organization, also called the Azure AD tenant, stores the
users, groups, applications, and other information pertaining to an organization and its
security. To access the Azure AD tenant, we need an application that is registered with the
tenant. Active Roles uses this application, also called the Azure AD application, to
communicate to Azure AD tenant after providing the required consent.
The Active Roles Web Interface and Management Shell can be used to perform the
Azure AD configuration tasks. The new feature in Active Roles enables you to add or
modify existing tenants to the management scope through the web interface and
Management Shell.
The latest release of Active Roles supports Multiple tenants model.
NOTE: Administrative users or users with sufficient privileges only can view Azure
configuration.
The following section guides you through the Active Roles web interface and Management
Shell to configure Azure AD tenants and applications and synchronize existing AD objects
to Azure AD.
l Configuring Active Roles to manage Azure AD using the Web Interface
l Configuring Active Roles to manage Hybrid AD using Management Shell
l Active Roles Configuration steps to manage Hybrid AD objects
l Active Roles Configuration to synchronize existing AD objects to Azure AD
l Changes to Azure O365 Policies in Active Roles after 7.4.1
Prerequisites
The Active Roles Administration Service must be already running. If the service is not
running, then:
TIP: If the Active Roles Administration Service is not running, the Azure AD Config-
uration page indicates it with an on-screen warning.
To configure a new Azure tenant (or tenants) and set Active Roles as a
consented Azure application
1. In the Active Roles Configuration Center, on the left pane, click Azure AD
Configuration.
2. From the drop-down list, select the type of domain assigned to the new Azure
AD tenant:
l Non-Federated Domain: When selected, on-premises domains are not
registered in Azure AD, and Azure AD Connect is not configured. Azure
users and Azure guest users are typically created with the
onmicrosoft.com UPN suffix.
l Federated Domain: On-premises domains are registered in Azure AD and
Azure AD Connect. Also, Active Directory Federation Services (ADFS) is
configured. Azure users and Azure guest users are typically created with the
UPN suffix of the selected on-premises domain.
l If you have not used any Azure AD administrator accounts yet on the PC (for
example, because you are configuring a fresh Active Roles installation), specify
NOTE: Do not specify an account that has already been used to add an Azure
tenant. You can only add a single Azure tenant with the same Azure AD account.
Specifying an administrator account that is already linked to an Azure tenant will
result in an error.
Upon successful authentication, the new Azure tenant appears in the list.
5. To manage the Azure tenant and its contents in the Active Roles Web Interface, you
must consent Active Roles as an Azure application. To do so, click Consent next to
the Azure tenant.
6. Authenticate your Azure AD administration account again. Depending on the type of
Microsoft pop-up that appears (Pick an account or Sign in), either select the Azure
AD account you used for adding the Azure tenant, or specify its user name and
password again.
NOTE: Make sure to specify the account used for adding the Azure tenant (that is,
the account name listed under the Name column of the Azure tenant). Authentic-
ating with another account will result in an error.
7. The standard Microsoft Permissions requested pop-up appears, listing all the
permissions required for configuring Active Roles as an Azure application. To finish
creating the Azure application, click Accept.
In such cases, clicking either Yes or No could freeze the pop-up dialog, but consent-
ing the Azure tenant will finish without problem.
This issue can occur in case the computer running Active Roles has incorrect
browser settings. As a workaround, to get an up-to-date status of the state of the
Azure tenant, close and restart the Active Roles Configuration Center after clicking
Yes in the Security Warning pop-up.
TIP: Once the Azure tenant or tenants are configured, and Active Roles is also set as a
consented Azure AD application for it, you can view and modify the configured tenant(s)
and their settings at the following locations:
l To change the domain type or OneDrive provisioning settings of an Azure tenant, in
the Active Roles Configuration Center, navigate to Azure AD Configuration,
select the Azure tenant, and click Modify. For more information, see Viewing or
modifying the Azure AD tenant type.
l To check the connectivity status of the Azure configuration, in the Active Roles Web
Interface, navigate to Directory Management > Tree > Azure > Azure Config-
uration > Azure Health Check. For more information, see View Azure Health for
Azure AD tenants and applications.
l To check the Azure Licenses Report, in the Active Roles Web Interface, navigate to
Directory Management > Tree > Azure > Azure Configuration > Azure
Licenses Report. For more information, see View Azure Licenses Report.
l To check the Office 365 Roles Report, in the Active Roles Web Interface, navigate
to Directory Management > Tree > Azure > Azure Configuration > Office
365 Roles Report. For more information, see View Office 365 Roles Report.
1. Stop the Active Roles Administration Service. To do so, in the Active Roles
Configuration Center, on the left pane, navigate to Administration Service and
click Stop.
2. Once the Active Roles Administration Service stopped, open the Import
configuration wizard by clicking Active Roles databases > Import
configuration.
4. Once the import procedure finished, start the Active Roles Administration Service by
clicking Start in the Administration Service page.
5. In the Active Roles Configuration Center, on the left pane, click Azure AD
Configuration.
The list of imported Azure tenants appears.
NOTE: Make sure to specify the account used for adding the Azure tenant (that is,
the account name listed under the Name column of the Azure tenant). Authentic-
ating with another account will result in an error.
8. To manage the Azure tenant and its contents in the Active Roles Web Interface, you
must consent Active Roles as an Azure application. To do so, click Consent next to
the Azure tenant.
9. Authenticate your Azure AD administration account again. Depending on the type of
Microsoft pop-up that appears (Pick an account or Sign in), either select the Azure
In such cases, clicking either Yes or No could freeze the pop-up dialog, but consent-
ing the Azure tenant will finish without problem.
This issue can occur in case the computer running Active Roles has incorrect
browser settings. As a workaround, to get an up-to-date status of the state of the
Azure tenant, close and restart the Active Roles Configuration Center after clicking
Yes in the Security Warning pop-up.
11. To make the configured Azure tenant(s) appear in the Active Roles Web Interface,
you must restart the Administration Service, as indicated on the user interface. Click
Administration Service on the left pane, then either click Restart, or first click
Stop and then Start.
TIP: Once the Azure tenant or tenants are configured, and Active Roles is also set as a
consented Azure AD application for it, you can view and modify the configured tenant(s)
and their settings at the following locations:
l To change the domain type or OneDrive provisioning settings of an Azure tenant, in
the Active Roles Configuration Center, navigate to Azure AD Configuration,
select the Azure tenant, and click Modify. For more information, see Viewing or
modifying the Azure AD tenant type.
l To check the connectivity status of the Azure configuration, in the Active Roles Web
Interface, navigate to Directory Management > Tree > Azure > Azure Config-
uration > Azure Health Check. For more information, see View Azure Health for
Azure AD tenants and applications.
l To check the Azure Licenses Report, in the Active Roles Web Interface, navigate to
Directory Management > Tree > Azure > Azure Configuration > Azure
Licenses Report. For more information, see View Azure Licenses Report.
l To check the Office 365 Roles Report, in the Active Roles Web Interface, navigate
to Directory Management > Tree > Azure > Azure Configuration > Office
365 Roles Report. For more information, see View Office 365 Roles Report.
1. In the Active Roles Configuration Center, on the left pane, click Azure AD
Configuration.
The list of existing Azure AD tenants appears.
2. Select the Azure AD tenant you want to view or modify, then click Modify.
The Tenant details window appears.
1. In the Active Roles Configuration Center, on the left pane, click Azure AD
Configuration.
The list of existing Azure tenants appears.
l If you have not used any Azure AD administrator accounts yet on the PC (for
example, because you are configuring a fresh Active Roles installation), specify
NOTE: Make sure to specify the account used for adding the Azure tenant (that is,
the account name listed under the Name column of the Azure tenant). Authentic-
ating with another account will result in an error.
5. The Azure tenant and all the related domains and applications are then deleted upon
successful login.
6. To apply the changes, you must restart the Administration Service, as indicated on
the user interface. To restart the Administration Service, open the Configuration
Center, click Administration Service on the left pane, then either click Restart, or
first click Stop and then Start.
7. (Optional) If you want to force the deletion of the Active Roles Azure application on
the Azure Portal for the removed Azure tenant, click Remove Azure Application
and log in with the credentials of the removed Azure tenant.
This is typically recommended as an extra housekeeping and security measure if the
removed Azure tenant has been previously managed either in earlier Active Roles
versions or on other machines as well, but the Azure tenant has not been removed
from those Active Roles installations prior to uninstalling them (leaving their client
secret intact on the Azure Portal).
8. To confirm removal, check if the removed Azure tenant has disappeared from the list
of Azure tenants in the Azure AD Configuration page of the Active Roles
Configuration Center, and from the Directory Management > Tree > Azure node
of the Active Roles Web Interface.
Description
Usage Recommendations
Parameters
Required true
Position named
l name (string): Sets the name attribute to the value of this parameter on the new
object created by New-QADAzureConfigObject in the directory.
Required true
Position named
l AzureTenantId (string): Specifies the Azure AD tenant ID obtained from the default
tenant (created after subscribing to Microsoft Azure).
NOTE: The Azure AD ID value configured for this parameter must match the tenant
ID configured on the Azure AD side. Otherwise, attempts to create an Azure AD
application or manage Azure AD objects will fail.
Required true
Position named
Table 9: AzureTenantDescription
Required false
Position named
l AzureAdminUserID: Specifies the administrative user name for Microsoft Azure AD.
NOTE: The administrative user must have the required privileges (for example,
License Administrator, User Administrator or Groups Administrator roles) to
perform license management or Azure user, guest user, and group management.
For more information on the available privileges and for an overview of the various
Azure and Azure AD administrative roles, see Azure AD built-in roles and Classic
subscription administrator roles, Azure roles, and Azure AD roles in the official
Microsoft documentation.
Required true
Position named
Required true
Position named
Required true
Position named
Examples
See the following use cases for examples on how to use this cmdlet.
To create a new Azure AD tenant with a specific user and then disconnect
2. Connect to the local Administration Service with a specific user of your choice:
C:\PS> disconnect-qadService
l type (string)
Use this parameter to specify the object class of the directory object to be created.
This is the name of a schema class object, such as User or Group. The cmdlet creates
a directory object of the object class specified by the value of this parameter.
Required true
Position named
l name (string)
Use this parameter to set the 'name' attribute to this parameter value on the new
object created by this cmdlet in the directory.
Required true
Position named
l AzureTenantId (string)
Use this parameter to enter the Azure AD tenant ID obtained from the default tenant
created after subscribing for Microsoft Azure.
NOTE: The values entered for configuring Azure AD tenant must exactly match the
values configured for Azure AD, else Azure AD application creation and manage-
ment of Azure AD objects fail.
Required true
Position named
l Displayname (string)
Use this parameter to specify the 'displayName' attribute to this parameter value.
Required false
Position named
l AzureAppPermissions
Use this parameter to specify the permission scope for applications for Azure AD.
Required true
Position named
l AzureApplicationDescription
Use this parameter to specify the description of the Azure AD application.
Required false
Position named
Example
Connect to any available domain controller with the credentials of the locally logged on
user, and create a new Azure AD application:
C:\PS> New-QADAzureConfigObject -type 'AzureApplication' -name
'AzureApplication' -DisplayName 'ApplicationDisplayName' -AzureTenantId
'AzureTenantGUID' -AzureAppPermissions 'ApplicationPermission'
Example
Connect to the local Administration Service with the credentials of a specific user, create a
new Azure AD tenant and then disconnect:
C:\PS> $pw = read-host "Enter password" -AsSecureString
C:\PS> connect-qadService -service 'localhost' -proxy -ConnectionAccount
'company\administrator' -ConnectionPassword $pw
C:\PS> New-QADAzureConfigObject -type 'AzureApplication' -name
'AzureApplication' -DisplayName 'ApplicationDisplayName' -AzureTenantId
'AzureTenantGUID' -AzureAppPermissions 'ApplicationPermission'
C:\PS> disconnect-qadService
NOTE:
l After an upgrade the edsvaAzureOffice365Enabled is not available for viewing
or editing from Organizational Unit | Advanced Properties or through the
management shell command-let, however the organizational unit container
continues to be an Azure enabled container as the azure policy is already applied.
For more information on Azure custom policies, see Changes to Azure O365 Policies in
Active Roles after 7.4.1.
NOTE: This feature is officially supported starting from Active Roles 8.1.3 SP1 (build
8.1.3.10). It is not supported on Active Roles 8.1.3 (build 8.1.3.2) and earlier versions.
Active Roles supports deployment and configuration in the Amazon cloud to manage AWS
Managed Microsoft AD instances hosted via AWS Directory Service.
This allows you to:
l Perform Active Directory management tasks in your AWS Managed Microsoft AD
environment.
l Synchronize directory data from an on-premises AD environment to AWS Managed
Microsoft AD.
l Synchronize passwords from an on-premises Active Directory to AWS Managed
Microsoft AD (with certain limitations).
For more information about the Active Roles features supported with AWS Managed
Microsoft AD, see Support for AWS Managed Microsoft AD in the Active Roles
Feature Guide.
NOTE: Support for AWS Managed Microsoft AD by Active Roles was tested only in this
configuration. Active Roles does not officially support managing AWS Managed Microsoft
AD environments in a hybrid deployment, that is using an on-premises Active Roles
and/or SQL Server installation and hosting AD via AWS Directory Service.
Connectivity requirements
Infrastructure requirements
To deploy and configure Active Roles for AWS Managed Microsoft AD, you must have access
to the following AWS services and resources:
l AWS Managed Microsoft AD deployed via AWS Directory Service.
l One or more Amazon Elastic Compute Cloud (EC2) instance(s) hosting the Active
Roles services and components.
The EC2 instance(s) must have, at minimum:
l 2 vCPUs running at 2.0 GHz.
l 4 GB of RAM.
TIP: One Identity recommends hosting the main Active Roles services and compon-
ents (the Active Roles Service and Console, and the Active Roles Web Interface) on
separate EC2 instances. If you deploy all Active Roles services and components in a
single EC2 instance, use a more powerful instance to ensure a better user exper-
ience for the product.
NOTE: AWS Managed Microsoft AD support was tested with a single t2.large
EC2 instance.
l An Amazon Relational Database Service for SQL Server (RDS for SQL Server).
Make sure that all these components are discoverable or visible to each other.
TIP: For consistency, once you logged in to the EC2 instance, rename the virtual machine
to the same name that you originally defined for the EC2 instance in the AWS console.
TIP: If the domain join process ends with an error, check the specified DNS addresses
and Domain Admin credentials in the AWS console.
Prerequisites
Before starting the procedure, make sure that the following requirements are met:
l The EC2 and RDS instances are connected.
l Microsoft SQL Server Management Studio (SSMS) is installed on the EC2 instance. If
you followed the steps of Verifying connectivity between the EC2 and RDS instances,
SSMS must already be installed on the EC2 instance.
After installing Active Roles, configure the Active Roles Administration Service.
1. Start Microsoft SQL Server Management Studio (SSMS), and connect to your the RDS
for SQL Server instance as described in Verifying connectivity between the EC2 and
RDS instances.
2. With SSMS, under the Databases node of the Object Explorer, create two new
empty databases to be used later for configuring Active Roles:
l A database for the Management History database (name it, for example, ARMH).
l A database for the Active Roles Configuration database (name it, for
example, ARConfig).
3. Still in SSMS, create a new user that Active Roles will use to connect to the SQL
database in the RDS instance. To do so, right-click the Security > Logins node of
the Object Explorer, then select New login and specify the following details:
a. Under General > Login name, specify the name of the user (for example,
sql-activeroles). Then, select SQL Server authentication.
b. Under User Mapping, select the databases that you created previously (in this
example, ARMH and ARConfig), and assign the db_owner role to both of them.
After you configured the Active Roles Administration Service, you can also configure the
Active Roles Console to manage your AWS Managed Microsoft AD instance.
This section outlines the recommended steps for deploying Active Roles in the Windows
Azure Infrastructure Services environment. After you complete these steps, you have the
following services deployed in Windows Azure using Windows Azure virtual machines:
l SQL Server 2012 or later to host the Active Roles database
l Active Roles Administration Service
l Active Roles Web Interface
Step 1. Prerequisites
This guide assumes that you already have the following prerequisites:
l Microsoft account with at least one valid, active Windows Azure subscription
l At least one writable replica domain controller installed in your Windows Azure
account
For instructions on how to install a replica domain controller, see Install a Replica
Active Directory Domain Controller in Windows Azure Virtual Networks.
1. Create a virtual machine based on an SQL Server image published in Windows Azure.
When creating the virtual machine, on the Virtual machine configuration page,
select the Create a new cloud service option and choose the Virtual Network used
by your replica domain controller in Windows Azure.
For more information on how to deploy an SQL Server in Microsoft Azure, see Create
SQL Server on a Windows virtual machine in the Azure portal in the Microsoft Azure
documentation.
2. Join the newly created virtual machine to your Active Directory domain.
3. Connect to the virtual machine using Remote Desktop, and run the Active Roles
Setup wizard to install the Active Roles Administration Service (see Steps to deploy
the Administration Service earlier in this document).
When prompted for the service account, specify the appropriate user account defined
in your Active Directory domain. Ensure that this user account is a member of the
Administrators local group on the virtual machine where you are installing the
Administration Service. For example, this could be a domain user account that
belongs to the Domain Admins group of your Active Directory domain.
When prompted for SQL Server, specify the name of the SQL Server you deployed in
Deploying Microsoft SQL Server.
4. Run the following Windows PowerShell command on the virtual machine where
you have installed the Active Roles Administration Service, to configure
Windows Firewall:
$allowedClientSubnets = @('10.0.0.0/8', '172.16.0.0/12',
'192.168.0.0/16');
New-NetFirewallRule -DisplayName "Active Roles" -Direction Inbound `
-Action Allow -Service 'aradminsvc' -RemoteAddress
$allowedClientSubnets `
-Enabled True
2. Join the newly created virtual machine to your Active Directory domain.
3. Connect to the virtual machine using Remote Desktop, and run the Active Roles setup
to install the Active Roles Web Interface (see Installing and configuring the Web
Interface).
When prompted, choose the option to connect to the Administration Service on the
specified computer, and specify the fully qualified domain name of the virtual
machine you deployed in Step 3. Deploy Active Roles Administration Service.
About us
One Identity solutions eliminate the complexities and time-consuming processes often
required to govern identities, manage privileged accounts and control access. Our solutions
enhance business agility while addressing your IAM challenges with on-premises, cloud and
hybrid environments.
Contacting us
For sales and other inquiries, such as licensing, support, and renewals, visit
https://www.oneidentity.com/company/contact-us.aspx.