OneIM AzureActiveDirectory Administration
OneIM AzureActiveDirectory Administration
One Identity Manager Administration Guide for Connecting to Azure Active Directory
Updated - 03 June 2022, 00:21
Version - 8.2.1
Contents
About us 243
Contacting us 243
Technical support resources 243
Index 244
One Identity Manager offers simplified user account administration for Azure Active
Directory. One Identity Manager concentrates on setting up and editing user accounts and
providing the required permissions. To equip users with the required permissions, One
Identity Manager maps subscriptions, service plans, groups, and administration roles. This
makes it possible to use Identity and Access Governance processes, including attestation,
Identity Audit, user account management and system entitlements, IT Shop, or report
subscriptions for Azure Active Directory tenants.
One Identity Manager provides company employees with the user accounts required to
allow you to use different mechanisms for connecting employees to their user accounts.
You can also manage user accounts independently of employees and therefore set up
administrator user accounts.
Additional information about the Azure Active Directory core directory, such as tenants and
verified domains, is loaded into the One Identity Manager database by data
synchronization. There are limited options for customizing this information in One Identity
Manager due to the complex dependencies and far-reaching effects of any changes.
For more information about the Azure Active Directory structure, see the Azure Active
Directory documentation from Microsoft.
NOTE: The Azure Active Directory module must be installed as a prerequisite for
managing One Identity Manager in Azure Active Directory Module For more information
about installing, see the One Identity Manager Installation Guide.
Architecture overview
To access Azure Active Directory tenant data, the Azure Active Directory connector is
installed on a synchronization server. The synchronization server ensures data is
compared between the One Identity Manager database and Azure Active Directory. The
Azure Active Directory connector uses the Microsoft Graph API for accessing Azure Active
Directory data.
The Azure Active Directory connector must authenticate itself on the Azure Active Directory
tenant to access Azure Active Directory tenant data. Authentication is carried out by an
Table 1: Users
User Tasks
if required.
l Specify which application roles for target system
managers are mutually exclusive.
l Authorize other employees to be target system
administrators.
l Do not assume any administrative tasks within the target
system.
One Identity Manager One Identity Manager administrator and administrative system
administrators users Administrative system users are not added to application
roles.
One Identity Manager administrators:
Product owners for the Product owners must be assigned to the Request &
IT Shop Fulfillment | IT Shop | Product owners application role or
a child application role.
Users with this application role:
NOTE: Synchronization of the following national cloud deployments with the Azure Active
Directory connector is not supported.
l Set up synchronization to import initial data from Azure Active Directory tenant to
the One Identity Manager database.
l Adjust a synchronization configuration to synchronize different Azure Active
Directory tenants with the same synchronization project, for example.
l Start and deactivate the synchronization.
l Analyze synchronization results.
TIP: Before you set up synchronization with an Azure Active Directory tenant, familiarize
yourself with the Synchronization Editor. For more information about this tool, see the
One Identity Manager Target System Synchronization Reference Guide.
To load Azure Active Directory tenant objects into the One Identity Manager
database for the first time
1. Ensure the Azure Active Directory tenant has a license for the SharePoint
Online service.
NOTE: If no such license is available, an error will occur when loading the Azure
Active Directory user accounts. For more information, see Possible errors when
synchronizing an Azure Active Directory tenant on page 231.
2. Register an One Identity Manager application in your Azure Active Directory tenant.
Depending on how the One Identity Manager application is registered in the Azure
Active Directory tenant, either a user account with sufficient permissions or the
secret key is required.
3. The One Identity Manager components for managing Azure Active Directory tenants
are available if the TargetSystem | AzureAD configuration parameter is set.
l In the Designer, check if the configuration parameter is set. Otherwise, set the
configuration parameter and compile the database.
NOTE: If you disable the configuration parameter at a later date, model
components and scripts that are not longer required, are disabled. SQL
procedures and triggers are still carried out. For more information about the
behavior of preprocessor relevant configuration parameters and conditional
compiling, see the One Identity Manager Configuration Guide.
l Other configuration parameters are installed when the module is installed.
Check the configuration parameters and modify them as necessary to suit your
requirements.
4. Install and configure a synchronization server and declare the server as a Job server
in One Identity Manager.
5. Create a synchronization project with the Synchronization Editor.
l Registering an enterprise application for One Identity Manager in the Azure Active
Directory tenant on page 17
l Users and permissions for synchronizing with Azure Active Directory on page 20
l Setting up the Azure Active Directory synchronization server on page 21
l Creating a synchronization project for initial synchronization of an Azure Active
Directory tenant on page 25
l Customizing synchronization projects to invite guest users on page 32
l Configuration parameters for managing an Azure Active Directory environment
on page 233
l Default project template for Azure Active Directory on page 237
l Register the One Identity Manager application in the Microsoft Azure portal
(https://portal.azure.com/) or in the Azure Active Directory admin center
(https://admin.microsoft.com/).
NOTE: An application ID is created when you add One Identity Manager as an
application to Azure Active Directory. You need the application ID for setting up the
synchronization project.
For more information about registering an application, see
https://docs.microsoft.com/de-de/azure/active-directory/develop/quickstart-
register-app.
l There are two different ways to authenticate the application.
l Authentication in the directory user context (delegated permissions)
Authentication in the context of a directory user is recommended, as this is the
only way to reset user passwords.
If you use authentication in the directory user context, you need a user account
with sufficient permissions when setting up the synchronization project.
l Authentication in the application context (application permissions)
If you use authentication in the context of an application, you need the value of
the secret when setting up the synchronization project. The secret is generated
1. In the Microsoft Azure portal, select your app under App registrations.
2. Configure the following settings under Manage > Authentication.
a. In the Platform configurations section, click Add a platform and, under
Configure platforms, select the Mobile and desktop applications tile.
i. Under Custom redirect URIs, you can specify any URI.
ii. Click Configure.
b. In the Supported account types section, select Accounts in this
organization directory only (single tenant).
c. In the Advanced settings section, enable the Allow public client
flows option.
3. Configure the permissions under Manage > API permissions.
a. In the Configured permissions section, click Add a permission.
i. Under Request API permissions > Microsoft APIs, select the tile
Microsoft Graph.
ii. Select Delegated permissions and select the following permissions:
l Directory.AccessAsUser.All (Access directory as the signed
in user)
l Directory.ReadWrite.All (Read and write directory data)
l User.ReadWrite.All (Read and write all users’ full profile)
l Group.ReadWrite.All (Read and write all groups)
l openid (Sign users in)
iii. Click Add permissions.
b. In the Configured permissions section, click Grant admin consent for ...
and confirm the security prompt with Yes.
This enables the configured permissions.
1. In the Microsoft Azure portal, select your app under App registrations.
2. Configure the following settings under Manage > Authentication.
a. In the Platform configurations section, click Add platform, and under
Configure platforms, select the Web tile.
Related topics
l Users and permissions for synchronizing with Azure Active Directory on page 20
l Creating a synchronization project for initial synchronization of an Azure Active
Directory tenant on page 25
User Permissions
User for Depending on how the One Identity Manager application is registered in
accessing the Azure Active Directory tenant, either a user account with sufficient
Azure Active permissions or the secret is required.
Directory
l If you use authentication in the context of a directory user
or (delegated permissions), you require a user account that is a
The secret's member in the Global administrator Azure Active Directory
value administration role when you set up the synchronization project.
Use the Azure Active Directory Admin Center to assign the Azure
Active Directory administrator role to the user account. For more
information on managing permissions in Azure Active Directory, see
the Microsoft documentation.
NOTE: The user account used to access Azure Active Directory
must not use multifactor authentication to allow automated logins
in a user context.
l If you use authentication in the context of an application (application
entitlements), you need the value of the secret when you set up the
synchronization project. The secret is generated when the One
Identity Manager application is registered with the Azure Active
Directory tenant.
NOTE: The key is only valid for a limited period and must be
renewed when it expires.
One Identity The user account for the One Identity Manager Service requires user
Manager permissions to carry out operations at file level (adding and editing
Service user directories and files).
account
The user account must belong to the Domain users group.
The user account must have the Login as a service extended user
permissions.
The user account requires permissions for the internal web service.
NOTE: If the One Identity Manager Service runs under the network
service (NT Authority\NetworkService), you can grant permissions
for the internal web service with the following command line call:
netsh http add urlacl url=http://<IP address>:<port number>/
user="NT AUTHORITY\NETWORKSERVICE"
The user account needs full access to the One Identity Manager Service
installation directory in order to automatically update One Identity
Manager.
In the default installation, One Identity Manager is installed under:
Related topics
l Registering an enterprise application for One Identity Manager in the Azure Active
Directory tenant on page 17
Property Value
NOTE: If several target system environments of the same type are synchronized under
the same synchronization server, it is recommended that you set up a Job server for
each target system for performance reasons. This avoids unnecessary swapping of
connections to target systems because a Job server only has to process tasks of the
same type (re-use of existing connections).
Use the One Identity Manager Service to install the Server Installer. The program runs the
following steps:
NOTE: The program performs a remote installation of the One Identity Manager Service.
Local installation of the service is not possible with this program.
2. On the Database connection page, enter the valid connection credentials for the
One Identity Manager database.
3. On the Server properties page, specify the server on which you want to install the
One Identity Manager Service.
a. Select a Job server from the Server menu.
- OR -
To create a new Job server, click Add.
b. Enter the following data for the Job server.
l Server: Name of the Job server.
l Queue: Name of the queue to handle the process steps. Each Job server
within the network must have a unique queue identifier. The process
steps are requested by the Job queue using this exact queue name. The
queue identifier is entered in the One Identity Manager Service
configuration file.
l Full server name: Full server name in accordance with DNS syntax.
Syntax:
<Name of servers>.<Fully qualified domain name>
NOTE: You can use the Extended option to make changes to other properties
for the Job server. You can also edit the properties later with the Designer.
Related topics
Related topics
l Registering an enterprise application for One Identity Manager in the Azure Active
Directory tenant on page 17
l Users and permissions for synchronizing with Azure Active Directory on page 20
l Setting up the Azure Active Directory synchronization server on page 21
If you run the project wizard in expert mode or directly from the Synchronization Editor,
additional configuration settings can be made. Follow the project wizard instructions
through these steps.
NOTE: Just one synchronization project can be created per target system and default
project template used.
1. Start the Launchpad and log in on the One Identity Manager database.
NOTE: If synchronization is run by an application server, connect the database
through the application server.
2. Select the Target system type Azure Active Directory entry and click Start.
This starts the Synchronization Editor's project wizard.
3. On the System access page, specify how One Identity Manager can access the
target system.
l If access is possible from the workstation on which you started the
Synchronization Editor, do not change any settings.
l If access is not possible from the workstation on which you started the
Synchronization Editor, you can set up a remote connection.
Enable the Connect using remote connection server option and select the
server to be used for the connection under Job server.
4. On the Azure Active Directory tenant page, enter the following information:
l Deployment: Select your cloud deployment. Select from Microsoft Graph
global service or Microsoft Cloud for US Government (L4) .
l Application ID: Enter the application ID. The application ID was generated
when registering the One Identity Manager application in the Azure Active
Directory tenant.
l Login domain: Enter the base domain or a verified domain of your Azure
Active Directory tenant.
5. On the Authentication page, select the type of login and enter the required login
data. The information is required depends on how the One Identity Manager
application is registered with the Azure Active Directory tenant.
7. On the One Identity Manager Connection tab, test the data for connecting to the
One Identity Manager database. The data is loaded from the connected database.
Reenter the password.
NOTE:
l If you use an unencrypted One Identity Manager database and have not yet
saved any synchronization projects to the database, you need to enter all
connection data again.
l This page is not shown if a synchronization project already exists.
8. The wizard loads the target system schema. This may take a few minutes depending
on the type of target system access and the size of the target system.
9. On the Select project template page, select the Azure Active Directory
Synchronization template.
10. On the Restrict target system access page, specify how system access should
work. You have the following options:
Option Meaning
11. On the Synchronization server page, select the synchronization server to run the
synchronization.
If the synchronization server is not declared as a Job server in the One Identity
Manager database yet, you can add a new Job server.
a. Click to add a new Job server.
b. Enter a name for the Job server and the full server name conforming to
DNS syntax.
c. Click OK.
The synchronization server is declared as Job server for the target system in
the One Identity Manager database.
d. NOTE: After you save the synchronization project, ensure that this server is
set up as a synchronization server.
Related topics
l Users and permissions for synchronizing with Azure Active Directory on page 20
l Information required for Azure Active Directory synchronization projects on page 25
l Registering an enterprise application for One Identity Manager in the Azure Active
Directory tenant on page 17
l Setting up the Azure Active Directory synchronization server on page 21
l Configuring the synchronization log on page 29
l Adjusting the synchronization configuration for Azure Active Directory
environments on page 30
l Running synchronization on page 46
l Tasks following synchronization on page 50
l Possible errors when synchronizing an Azure Active Directory tenant on page 231
l Default project template for Azure Active Directory on page 237
l Azure Active Directory connector settings on page 241
1. To configure the synchronization log for target system connection, select the
Configuration > Target system category in the Synchronization Editor.
- OR -
To configure the synchronization log for the database connection, select the
Configuration > One Identity Manager connection category in the
Synchronization Editor.
2. Select the General view and click Configure.
3. Select the Synchronization log view and set Create synchronization log.
4. Enable the data to be logged.
l In the Designer, enable the DPR | Journal | LifeTime configuration parameter and
enter the maximum retention period.
Related topics
l To use One Identity Manager as the primary system during synchronization, create a
workflow with synchronization in the direction of the Target system.
l You can use variables to create generally applicable synchronization configurations
that contain the necessary information about the synchronization objects when
synchronization starts. Variables can be implemented in base objects, schema
classes, or processing method, for example.
l Use variables to set up a synchronization project for synchronizing different clients.
Store a connection parameter as a variable for logging in to the clients.
l To specify which Azure Active Directory objects and database objects are included in
synchronization, edit the scope of the target system connection and the One Identity
Manager database connection. To prevent data inconsistencies, define the same
scope in both systems. If no scope is defined, all objects will be synchronized.
l Update the schema in the synchronization project if the One Identity Manager
schema or target system schema has changed. Then you can add the changes to
the mapping.
For more information about configuring synchronization, see the One Identity Manager
Target System Synchronization Reference Guide.
Related topics
Related topics
To send guest user invitations, you must alter the variables in the synchronization project.
Variable Description
GuestInviteRedirectUrl URL to reroute guest users after they have accepted the
invitation and registered.
Default: http://www.office.com
To edit a variable
Related topics
l General main data of Azure Active Directory user accounts on page 178
l Editing connection parameters in the variable set on page 35
1. Extend the One Identity Manager schema by the custom columns. Use the Schema
Extension program to do this.
For more information about extending the One Identity Manager schema, see the
One Identity Manager Configuration Guide.
2. Use the Synchronization Editor to update the target system schema in your
synchronization project and the One Identity Manager connection's schema.
For more information about updating schema in the Synchronization Editor, see the
One Identity Manager Target System Synchronization Reference Guide.
3. In the Synchronization Editor, extend the mappings in your synchronization project
by the respective property mapping rules for schema extensions.
For more information about editing property mapping rules in the
Synchronization Editor, see the One Identity Manager Target System
Synchronization Reference Guide.
a. Specify a specialized variable set and change the values of the affected variables.
The default values remain untouched in the default variable set. The variables can be
reset to the default values at any time. (Recommended action).
b. Edit the target system connection with the system connection wizard and change the
effected values.
The system connection wizard supplies additional explanations of the settings. The
default values can only be restored under particular conditions.
For detailed information about using variables and variable sets, or restoring default
values and adding base objects, see the One Identity Manager Target System
Synchronization Reference Guide.
In both these cases, the system connection wizard overwrites the default values. They
cannot be restored at a later time.
5. Follow the system connection wizard instructions and change the relevant properties.
6. Save the changes.
Related topics
Updating schemas
All the schema data (schema types and schema properties) of the target system schema
and the One Identity Manager schema are available when you are editing a synchronization
project. Only a part of this data is really needed for configuring synchronization. If a
synchronization project is finished, the schema is compressed to remove unnecessary data
from the synchronization project. This can speed up the loading of the synchronization
project. Deleted schema data can be added to the synchronization configuration again at a
later point.
To edit a mapping
Speeding up synchronization
The Azure Active Directory connector supports delta synchronization to speed up Azure
Active Directory synchronization. The method is based on the delta query function from
Microsoft Graph. It supports the schema types User (user account), Group (group), and
1. An initial query is run for a schema type (user account, group, administrator role).
The initial query returns a complete list for the schema type, such as all user
accounts, including the queried properties. This also returns a state token. This token
represents the state of the data at the time of the query in Azure Active Directory.
Restrictions
With respect to the stability of repetitions, the difference query method has certain
limitations. If a state token has been used once, it is generally invalid and the query cannot
be run again. If an error occurs processing the return date, the respective change cannot
be loaded until the next time synchronization is scheduled to run. For example, this
happens to new group memberships if the member themselves has not been loaded yet.
Another disadvantage is the runtime of the initial query and initial data processing. This
process is not recommended. However, because initial processing is meant to be carried
out during scheduled synchronization, it is recommended to set the DoNotProcessOffset
parameter in the process steps to True (default).
You should also take into account that not all properties can be queried using the Microsoft
Graph API delta query.
If the data in the delta token file does not match the calling parameters of a query, the
existing file is renamed to <alterName>.backup in order not to lose the state token and a new
file is created. In this case, a new initial query is run. This also happens if the file does not
exist or is empty.
The following tables contain the supported schema types and their supported properties. As
long as new objects are imported into the database, the mandatory properties in the delta
synchronization must be queried.
AccountEnabled
AgeGroup
BusinessPhones
City
CompanyName
ConsentProvidedForMinor
Country
Department
DisplayName X
ExternalUserState
ExternalUserStateChangeDateTime
GivenName
ID X
JobTitle
LastPasswordChangeDateTime
LegalAgeGroupClassification
MailNickname
Manager
MobilePhone
OfficeLocation
OnPremisesDistinguishedName
OnPremisesDomainName
OnPremisesImmutableId
OnPremisesLastSyncDateTime
OnPremisesSamAccountName
OnPremisesSecurityIdentifier
OnPremisesSyncEnabled
OnPremisesUserPrincipalName
PostalCode
PreferredLanguage
ProxyAddresses
State
StreetAddress
Surname
UsageLocation
UserDomain x
UserPrincipalName x
UserType x
Description
DisplayName x
GroupTypes x
ID x
MailEnabled x
MailNickName x
OnPremisesSecurityIdentifier
OnPremisesSyncEnabled
ProxyAddresses
SecurityEnabled x
Description
DisplayName x
ID x
l Memberships are saved as an object property in list form in the target system.
Example: List of user accounts in the Member property of an Azure Active Directory
group (Group)
l Memberships can be modified in either of the connected systems.
l A provisioning workflow and provisioning processes are set up.
If one membership in One Identity Manager changes, by default, the complete list of
members is transferred to the target system. Therefore, memberships that were
previously added to the target system are removed in the process and previously deleted
memberships are added again.
To prevent this, provisioning can be configured such that only the modified membership is
provisioned in the target system. The corresponding behavior is configured separately for
each assignment table.
1. In the Manager, select the Azure Active Directory > Basic configuration data
> Target system types category.
2. In the result list, select the Azure Active Directory target system type.
3. Select the Configure tables for publishing task.
4. Select the assignment tables that you want to set up for single provisioning. Multi-
select is possible.
5. Click Merge mode.
NOTE:
l This option can only be enabled for assignment tables that have a base table
with a XDateSubItem column.
l Assignment tables that are grouped together in a virtual schema property in
the mapping must be marked identically.
Example: AADUserInGroup and AADGroupInGroup
6. Save the changes.
For each assignment table labeled like this, the changes made in One Identity Manager are
saved in a separate table. Therefore, only newly added and deleted assignments are
processed. During modification provisioning, the members list in the target system is
compared to the entries in this table. This means that only modified memberships are
provisioned and not the entire members list.
NOTE: The complete members list is updated by synchronization. During this process,
objects with changes but incomplete provisioning are not handled. These objects are
logged in the synchronization log.
You can restrict single provisioning of memberships with a condition. Once merge mode
has been disabled for a table, the condition is deleted. Tables that have had the condition
deleted or edited are marked with the following icon: . You can restore the original
condition at any time.
1. Select the auxiliary table for which you want to restore the condition.
2. Right-click on the selected row and select the Restore original values
context menu item.
3. Save the changes.
NOTE: To create the reference to the added or deleted assignments in the condition, use
the i table alias.
Example of a condition on the AADUserInGroup assignment table:
exists (select top 1 1 from AADGroup g
where g.UID_AADGroup = i.UID_AADGroup
and <limiting condition>)
For more information about provisioning memberships, see the One Identity Manager
Target System Synchronization Reference Guide.
Prerequisites
l A synchronization step exists that can import the changes to the changed object into
One Identity Manager.
l The path to the base object of the synchronization is defined for the table that
contains the changed object.
Single object synchronization is fully configured for synchronization projects created using
the default project template. If you want to incorporate custom tables into this type of
synchronization project, you must configure single object synchronization for these tables.
For more information about this, see the One Identity Manager Target System
Synchronization Reference Guide.
To define the path to the base object for synchronization for a custom table
1. In the Manager, select the Azure Active Directory > Basic configuration data
> Target system types category.
2. In the result list, select the Azure Active Directory target system type.
3. Select the Assign synchronization tables task.
4. In the Add assignments pane, assign the custom table for which you want to use
single object synchronization.
5. Save the changes.
6. Select the Configure tables for publishing task.
7. Select the custom table and enter the Root object path.
Enter the path to the base object in the ObjectWalker notation of the VI.DB.
Example: FK(UID_AADOrganization).XObjectKey
8. Save the changes.
Related topics
1. Configure the server and declare it as a Job server in One Identity Manager.
l Job servers that share processing must have the No process assignment
option enabled.
l Assign the Azure Active Directory connector server function to the
Job server.
All Job servers must access the same Azure Active Directory tenant as the
synchronization server for the respective base object.
2. In the Synchronization Editor, assign a custom server function to the base object.
This server function is used to identify all the Job servers being used for load
balancing.
If there is no custom server function for the base object, create a new one.
For more information about editing base objects, see the One Identity Manager
Target System Synchronization Reference Guide.
3. In the Manager, assign this server function to all the Job servers that will be
processing provisioning and single object synchronization for the base object.
Only select those Job servers that have the same configuration as the base object's
synchronization server.
Once all the processes have been handled, the synchronization server takes over
provisioning and single object synchronization again.
l In the Synchronization Editor, remove the server function from the base object.
For detailed information about load balancing, see the One Identity Manager Target System
Synchronization Reference Guide.
l Job server for Azure Active Directory-specific process handling on page 226
Running synchronization
Synchronization is started using scheduled process plans. It is possible to start
synchronization manually in the Synchronization Editor. You can simulate synchronization
beforehand to estimate synchronization results and discover errors in the synchronization
configuration. If synchronization stopped unexpectedly, you must reset the start
information to be able to restart synchronization.
If you want to specify the order in which target systems are synchronized, use the start up
sequence to run synchronization. In a start up sequence, you can combine start up
configurations from different synchronization projects and specify the order in which they
are run. For more information about start up sequences, see the One Identity Manager
Target System Synchronization Reference Guide.
Starting synchronization
When you set up the initial synchronization project using the Launchpad, a default schedule
for regular synchronization is created and assigned. Activate this schedule to synchronize
on a regular basis.
IMPORTANT: As long as a synchronization process is running, you must not start another
synchronization process for the same target system. This especially applies, if the same
synchronization objects would be processed.
Deactivating synchronization
Regular synchronization cannot be started until the synchronization project and the
schedule are active.
An activated synchronization project can only be edited to a limited extend. The schema in
the synchronization project must be updated if schema modifications are required. The
synchronization project is deactivated in this case and can be edited again.
Furthermore, the synchronization project must be deactivated if synchronization should not
be started by any means (not even manually).
Related topics
The log is marked in color in the navigation view. This mark shows you the status of the
synchronization/provisioning.
TIP: The logs are also displayed in the Manager under the <target system> >
synchronization log category.
Related topics
If you synchronize changes in an object's member list, run single object synchronization on
the assignment's root object, The base table of an assignment contains an XDateSubItem
column containing information about the last change to the memberships.
Example:
NOTE: To load changes to the assignment of subscriptions to user accounts, run single
object synchronization on the user account.
This means, all memberships and assignments remain intact until the outstanding objects
have been processed.
Start target system synchronization to do this.
1. In the Manager, select the Azure Active Directory > Target system
synchronization: Azure Active Directory category.
The navigation view lists all the synchronization tables assigned to the Azure Active
Directory target system type.
2. On the Target system synchronization form, in the Table / object column, open
the node of the table for which you want to post-process outstanding objects.
All objects that are marked as outstanding are shown. The Last log entry and Last
method run columns display the time at which the last entry was made in the
synchronization log and which processing method was run. The No log available
entry can mean the following:
l The synchronization log has already been deleted.
- OR -
l An assignment from a member list has been deleted from the target system.
The base object of the assignment was updated during the synchronization. A
corresponding entry appears in the synchronization log. The entry in the
Delete The object is immediately deleted from the One Identity Manager
database. Deferred deletion is not taken into account.
Indirect memberships cannot be deleted.
Publish The object is added to the target system. The Outstanding label
is removed from the object.
This runs a target system specific process that triggers the provi-
sioning process for the object.
Prerequisites:
l The table containing the object can be published.
l The target system connector has write access to the target
system.
NOTE: By default, the selected objects are processed in parallel, which speeds up the
selected method. If an error occurs during processing, the action is stopped and all
changes are discarded.
Bulk processing of objects must be disabled if errors are to be localized, which means the
objects are processed sequentially. Failed objects are named in the error message. All
changes that were made up until the error occurred are saved.
1. In the Manager, select the Azure Active Directory > Basic configuration data
> Target system types category.
2. In the result list, select the Azure Active Directory target system type.
3. Select the Assign synchronization tables task.
4. In the Add assignments pane, assign custom tables to the outstanding objects you
want to handle.
5. Save the changes.
6. Select the Configure tables for publishing task.
7. Select the custom tables that contain the outstanding objects that can be published in
the target system and set the Publishable option.
8. Save the changes.
Related topics
Related topics
Troubleshooting
Synchronization Editor helps you to analyze and eliminate synchronization errors.
l Simulating synchronization
The simulation allows you to estimate the result of synchronization. This means you
can, for example, recognize potential errors in the synchronization configuration.
l Analyzing synchronization
You can generate the synchronization analysis report for analyzing problems which
occur during synchronization, for example, insufficient performance.
l Logging messages
One Identity Manager offers different options for logging errors. These include the
synchronization log, the log file for One Identity Manager Service, the logging of
messages with NLOG, and similar.
l Reset start information
If synchronization stopped unexpectedly, for example, because a server was not
available, the start information must be reset manually. Only then can the
synchronization be restarted.
For more information about these topics, see the One Identity Manager Target System
Synchronization Reference Guide.
Related topics
IMPORTANT: If this option is set, One Identity Manager tries to ignore commit errors that
could be related to data errors in a single column. This causes the data changed in the
affected column to be discarded and the object is subsequently saved again. This effects
performance and leads to loss of data.
Only set this option in the exceptional circumstance of not being able to correct the data
before synchronization.
The main feature of One Identity Manager is to map employees together with the main data
and permissions available to them in different target systems. To achieve this, information
about user accounts and permissions can be read from the target system into the One
Identity Manager database and linked to employees. This provides an overview of the
permissions for each employee in all of the connected target systems. One Identity
Manager offers the option of managing user accounts and their permissions. You can
provision modifications in the target systems. Employees are supplied with the necessary
permissions in the connected target systems according to their function in the company.
Regular synchronization keeps data consistent between target systems and the One
Identity Manager database.
Because requirements vary between companies, One Identity Manager offers different
methods for supplying user accounts to employees. One Identity Manager supports the
following methods for linking employees and their user accounts:
l Employees can automatically obtain their account definitions using user account
resources. If an employee does not yet have a user account in a tenant, a new user
account is created. This is done by assigning account definitions to an employee
using the integrated inheritance mechanism and subsequent process handling.
When you manage account definitions through user accounts, you can specify the
way user accounts behave when employees are enabled or deleted.
l When user accounts are inserted, they can be automatically assigned to an existing
employee or a new employee can be created if necessary. In the process, the
employee main data is created on the basis of existing user account main data. This
mechanism can be implemented if a new user account is created manually or by
synchronization. However, this is not the One Identity Manager default method. You
must define criteria for finding employees for automatic employee assignment.
l Employees and user accounts can be entered manually and assigned to each other.
For more information about employee handling and administration, see the One Identity
Manager Target System Base Module Administration Guide.
l Default user account that inherits all properties from the employee.
l Administrative user account that is associated to an employee but should not inherit
the properties from the employee.
For more detailed information about the principles of account definitions, manage levels,
and determining the valid IT operating data, see the One Identity Manager Target System
Base Module Administration Guide.
The following steps are required to implement an account definition:
1. In the Manager, select the Azure Active Directory > Basic configuration data
> Account definitions > Account definitions category.
2. Click in the result list.
3. On the main data form, enter the main data of the account definition.
4. Save the changes.
Related topics
1. In the Manager, select the Azure Active Directory > Basic configuration data
> Account definitions > Account definitions category.
2. Select an account definition in the result list.
3. Select the Change main data task.
4. Enter the account definition's main data.
5. Save the changes.
Related topics
Property Description
User account table Table in the One Identity Manager schema that maps user
accounts.
For Azure Active Directory user accounts, select AADUser.
Required account Specifies the required account definition. Define the depend-
definition encies between account definitions. When this account defin-
ition is requested or assigned, the required account definition
is assigned automatically.
Leave empty for Azure Active Directory tenants. In feder-
ations, you can enter the account definition of the Active
Directory domain.
Manage level (initial) Manage level to use by default when you add new user
accounts.
Risk index Value for evaluating the risk of assigning the account
definition to employees. Set a value in the range 0 to 1. This
input field is only visible if the QER | CalculateRiskIndex
configuration parameter is set.
For detailed information, see the One Identity Manager Risk
Assessment Administration Guide.
Service item Service item through which you can request the account
definition resource in the IT Shop. Assign an existing service
item or add a new one.
Only for use in IT Shop Specifies whether the account definition can only be
requested through the IT Shop. The account definition can be
requested by an employee through the Web Portal and
distributed using a defined approval process. The account
definition cannot be directly assigned to roles outside the IT
Shop.
Groups can be inherited Specifies whether the user account can inherit groups through
the linked employee. If the option is set, the user account
inherits groups through hierarchical roles, in which the
employee is a member, or through IT Shop requests.
Subscriptions can be Specifies whether the user account can inherit Azure Active
inherited Directory subscriptions through the employee. If this option is
set, the user account inherits Azure Active Directory subscrip-
tions through hierarchical roles or IT Shop requests.
Administrator roles can Specifies whether the user account can inherit Azure Active
be inherited Directory administrator roles through the employee If this
option is set, the user account inherits administrator roles
through hierarchical roles or IT Shop requests.
Disabled service plans Specifies whether the user account can inherit disabled Azure
can be inherited Active Directory service plans through the employee. If this
option is set, the user account inherits disabled service plans
through hierarchical roles or IT Shop requests.
Office 365 groups can be NOTE: This property is only available if the Exchange Online
inherited Module is installed.
Specifies whether the user account can inherit Office 365
groups through the linked employee. If the option is set, the
user account inherits Office 365 groups through hierarchical
roles, in which the employee is a member, or through IT Shop
requests.
For more information about Office 365 groups, see the One
Identity Manager Administration Guide for Connecting to
Exchange Online.
l Unmanaged: User accounts with the Unmanaged manage level are linked to the
employee but they do no inherit any further properties. When a new user account is
added with this manage level and an employee is assigned, some of the employee's
properties are transferred initially. If the employee properties are changed at a later
date, the changes are not passed onto the user account.
l Full managed: User accounts with the Full managed manage level inherit defined
properties of the assigned employee. When a new user account is created with this
manage level and an employee is assigned, the employee's properties are
transferred in an initial state. If the employee properties are changed at a later date,
the changes are passed onto the user account.
NOTE: The Full managed and Unmanaged manage levels are analyzed in templates.
You can customize the supplied templates in the Designer.
You can define other manage levels depending on your requirements. You need to amend
the templates to include manage level approaches.
Specify the effect of temporarily or permanently disabling, deleting, or the security risk of
an employee on its user accounts and group memberships for each manage level. For
detailed information about manage levels, see the One Identity Manager Target System
Base Module Administration Guide.
l Employee user accounts can be locked when they are disabled, deleted, or rated as a
security risk so that permissions are immediately withdrawn. If the employee is
reinstated at a later date, the user accounts are also reactivated.
l You can also define group membership inheritance. Inheritance can be discontinued
if desired when, for example, the employee’s user accounts are disabled and
therefore cannot be members in groups. During this time, no inheritance processes
should be calculated for this employee. Existing group memberships are deleted.
1. In the Manager, select the Azure Active Directory > Basic configuration data
> Account definitions > Manage levels category.
2. Select the manage level in the result list.
3. Select the Change main data task.
4. Edit the manage level's main data.
5. Save the changes.
Related topics
1. In the Manager, select the Azure Active Directory > Basic configuration data
> Account definitions > Manage levels category.
2. Click in the result list.
3. On the main data form, edit the main data of the manage level.
4. Save the changes.
Related topics
1. In the Manager, select the Azure Active Directory > Basic configuration data
> Account definitions > Account definitions category.
2. Select an account definition in the result list.
3. Select the Assign manage level task.
4. In the Add assignments pane, assign the manage level.
TIP: In the Remove assignments pane, you can remove assigned manage levels.
To remove an assignment
l Select the manage level and double-click .
5. Save the changes.
Property Description
Lock user accounts if Specifies whether user accounts of employees marked for
deletion is deferred deletion are locked.
Lock user accounts if Specifies whether user accounts of employees posing a security
security is at risk risk are locked.
Retain groups if user Specifies whether disabled user accounts retain their group
account disabled memberships.
1. In the Manager, select the Azure Active Directory > Basic configuration data
> Account definitions > Account definitions category.
2. Select an account definition in the result list.
3. Select the Edit IT operating data mapping task.
4. Click Add and enter the following information:
Related topics
Example:
Normally, each employee in department A obtains a default user account in the client
A. In addition, certain employees in department A obtain administrative user
accounts in the client A.
Create an account definition A for the default user account of the tenant A and an
account definition B for the administrative user account of tenant A.In the IT
operating data mapping rule for the account definitions A and B, specify the
Department property in order to determine the valid IT operating data.
Specify the effective IT operating data of department A for the tenant A. This IT
operating data is used for standard user accounts. In addition, for department A,
specify the effective IT operating data of account definition B. This IT operating data
is used for administrative user accounts.
1. In the Manager, select the role in the Organizations or Business roles category.
2. Select the Edit IT operating data task.
3. Click Add and enter the following data.
l Effects on: Specify an IT operating data application scope. The IT operating
data can be used for a target system or a defined account definition.
Related topics
Prerequisites
1. In the Manager, select the Azure Active Directory > Basic configuration data
> Account definitions > Account definitions category.
2. Select an account definition in the result list.
3. Select the Run templates task.
This displays a list of all user accounts that were created with the selected account
definition and whose properties were changed by modifying the IT operating data.
That means:
l Old value: Value of the object property before changing the IT operating data.
l New value: Value of the object property after changing the IT operating data.
l Selection: Specifies whether the new value is copied to the user account.
4. Mark all the object properties in the selection column that will be given the
new value.
5. Click Apply.
The templates are applied to all selected user accounts and properties.
1. In the Manager, select role classes in the Organizations > Basic configuration
data > Role classes category.
- OR -
In the Manager, select role classes in the Business roles > Basic configuration
data > Role classes category.
2. Select the Configure role assignments task and configure the permitted
assignments.
l To generally allow an assignment, enable the Assignments allowed column.
l To allow direct assignment, enable the Direct assignments permitted
column.
3. Save the changes.
For detailed information about preparing role classes to be assigned, see the One Identity
Manager Identity Management Base Module Administration Guide.
1. In the Manager, select the Azure Active Directory > Basic configuration data
> Account definitions > Account definitions category.
2. Select an account definition in the result list.
3. Select the Assign organizations task.
4. In the Add assignments pane, assign the organizations:
l On the Departments tab, assign departments.
l On the Locations tab, assign locations.
l On the Cost centers tab, assign cost centers.
TIP: In the Remove assignments pane, you can remove assigned organizations.
To remove an assignment
l Select the organization and double-click .
5. Save the changes.
Related topics
1. In the Manager, select the Azure Active Directory > Basic configuration data
> Account definitions > Account definitions category.
2. Select an account definition in the result list.
3. Select the Assign business roles task.
4. In the Add assignments pane, select the role class and assign business roles.
TIP: In the Remove assignments pane, you can remove assigned business roles.
To remove an assignment
l Select the business role and double-click .
5. Save the changes.
Related topics
1. In the Manager, select the Azure Active Directory > Basic configuration data
> Account definitions > Account definitions category.
2. Select an account definition in the result list.
3. Select the Change main data task.
4. Select the Disable automatic assignment to employees task.
5. Confirm the security prompt with Yes.
6. Save the changes.
Related topics
1. In the Manager, select the Azure Active Directory > Basic configuration data
> Account definitions > Account definitions category.
2. Select an account definition in the result list.
3. Select the Assign to employees task.
4. In the Add assignments pane, add employees.
TIP: In the Remove assignments pane, you can remove assigned employees.
To remove an assignment
l Select the employee and double-click .
5. Save the changes.
Related topics
1. In the Manager, select the Azure Active Directory > Basic configuration data
> Account definitions > Account definitions category.
2. Select an account definition in the result list.
3. Select the Assign system roles task.
4. In the Add assignments pane, assign system roles.
TIP: In the Remove assignments pane, you can remove assigned system roles.
To remove an assignment
l Select the system role and double-click .
5. Save the changes.
Related topics
NOTE: IT Shop administrators can assign account definitions to IT Shop shelves if login is
role-based. Target system administrators are not authorized to add account definitions in
the IT Shop.
1. In the Manager, select the Azure Active Directory > Basic configuration data
> Account definitions > Account definitions category.
2. Select an account definition in the result list.
3. Select the Add to IT Shop task.
4. In the Add assignments pane, assign the account definitions to the IT Shop
shelves.
5. Save the changes.
1. In the Manager, select the Azure Active Directory > Basic configuration data
> Account definitions > Account definitions category.
2. Select an account definition in the result list.
3. Select the Add to IT Shop task.
4. In the Remove assignments pane, remove the account definitions from the IT
Shop shelves.
5. Save the changes.
To remove an account definition from all IT Shop shelves (non role-based login)
1. In the Manager, select the Azure Active Directory > Basic configuration data
> Account definitions > Account definitions category.
2. Select an account definition in the result list.
3. Select the Remove from all shelves (IT Shop) task.
4. Confirm the security prompt with Yes.
5. Click OK.
The account definition is removed from all shelves by the One Identity Manager
Service. At the same time, any requests and assignment requests with this account
definition are canceled.
For detailed information about requesting company resources through the IT Shop, see the
One Identity Manager IT Shop Administration Guide.
Related topics
User accounts are only linked to the employee (Linked state) if no account definition is
given. This is the case on initial synchronization, for example.
1. In the Manager, select the Azure Active Directory tenant in the Azure Active
Directory > Tenants category.
2. Select the Change main data task.
3. From the Account definition (initial) menu, select the account definition for
user accounts.
4. Save the changes.
NOTE:
NOTE:
In the default installation, after synchronizing, employees are automatically created for
the user accounts.If an account definition for the tenant is not known at the time of
synchronization, user accounts are linked with employees. However, account definitions
are not assigned. The user accounts are therefore in a Linked state.
To manage the user accounts using account definitions, assign an account definition and a
manage level to these user accounts.
For more information, see Managing Azure Active Directory user accounts through
account definitions on page 52.
Related topics
1. In the Manager, select the Azure Active Directory > Tenants category.
2. Select the tenant in the result list.
3. Select the Define search criteria for employee assignment task.
4. Specify which user account properties must match with which employee so that the
employee is linked to the user account.
Table 11: Default search criteria for user accounts and contacts
For more information about defining search criteria, see the One Identity Manager Target
System Base Module Administration Guide.
Related topics
View Description
Suggested This view lists all user accounts to which One Identity Manager can assign
assignments an employee. All employees are shown who were found using the search
criteria and can be assigned.
Assigned This view lists all user accounts to which an employee is assigned.
user
accounts
Without This view lists all user accounts to which no employee is assigned and for
employee which no employee was found using the search criteria.
assignment
1. In the Manager, select the Azure Active Directory > Tenants category.
2. Select the tenant in the result list.
3. Select the Define search criteria for employee assignment task.
4. At the bottom of the form, click Reload.
All possible assignments based on the search criteria are found in the target system
for all user accounts. The three views are updated.
TIP: By double-clicking on an entry in the view, you can view the user account and
employee main data.
The assignment of employees to user accounts creates connected user accounts (Linked
state). To create managed user accounts (Linked configured state), you can assign an
account definition at the same time.
To remove assignments
1. In the Manager, select the Azure Active Directory > User accounts category.
2. Select the user account in the result list.
3. Select the Change main data task.
4. Select the manage level in the Manage level list on the General tab.
5. Save the changes.
Related topics
l Creating and editing Azure Active Directory user accounts on page 177
l Identity
The Identity property (IdentityType column) is used to describe the type of
user account.
NOTE: To enable working with identities for user accounts, the employees also
need identities. You can only link user accounts to which an identity is assigned
with employees who have this same identity.
The primary identity, the organizational identity, and the personalized admin identity
are used for different user accounts, which can be used by the same actual employee
to perform their different tasks within the company.
To provide user accounts with a personalized admin identity or an organizational
identity for an employee, you create subidentities for the employee. These
subidentities are then linked to user accounts, enabling you to assign the required
permissions to the different user accounts.
User accounts with a sponsored identity, shared identity, or service identity are
linked to pseudo employees that do not refer to a real employee. These pseudo
employees are needed so that permissions can be inherited by the user accounts.
When evaluating reports, attestations, or compliance checks, check whether pseudo
employees need to be considered separately.
For more information about mapping employee identities, see the One Identity
Manager Identity Management Base Module Administration Guide.
1. Create an account definition and assign the Unmanaged and Full managed
manage levels.
2. Specify the effect of temporarily or permanently disabling, deleting, or the
security risk of an employee on its user accounts and group memberships for each
manage level.
3. Create a formatting rule for IT operating data.
You use the mapping rule to define which rules are used to map IT operating data for
user accounts and which default values are used if no IT operating data can be
determined through a person's primary roles.
The type of IT operating data required depends on the target system. The following
setting are recommended for default user accounts:
l In the mapping rules for the IsGroupAccount_Group, IsGroupAccount_SubSku,
IsGroupAccount_DeniedService, and IsGroupAccount_DirectoryRole columns, use
the default value 1 and set the Always use default value option.
l In the mapping rule for the IdentityType column, use the default value
Primary and enable Always use default value.
4. Enter the effective IT operating data for the target system. Select the concrete target
system under Effects on.
Related topics
Related topics
Prerequisites
Related topics
Prerequisite
To remove an assignment
l Select the employee and double-click .
Related topics
1. Create an account definition. Create a new manage level for privileged user accounts
and assign this manage level to the account definition.
2. If you want to prevent the properties for privileged user accounts from being
overwritten, set the IT operating data overwrites property for the manage level
to Only initially. In this case, the properties are populated just once when the user
accounts are created.
3. Specify the effect of temporarily or permanently disabling or deleting, or the
security risk of an employee on its user accounts and group memberships for each
manage level.
4. Create a formatting rule for the IT operating data.
You use the mapping rule to define which rules are used to map IT operating data for
user accounts and which default values are used if no IT operating data can be
determined through a person's primary roles.
The type of IT operating data required depends on the target system. The following
settings are recommended for privileged user accounts:
l In the mapping rule for the IsPrivilegedAccount column, use the default value
1 and set the Always use default value option.
l You can also specify a mapping rule for the IdentityType column. The column
owns different permitted values that represent user accounts.
l To prevent privileged user accounts from inheriting the entitlements of the
default user, define a mapping rule for the IsGroupAccount_Group,
IsGroupAccount_SubSku, and IsGroupAccount_DeniedService columns with a
default value of 0 and set the Always use default value option.
5. Enter the effective IT operating data for the target system.
Specify in the departments, cost centers, locations, or business roles which IT
operating data should apply when you set up a user account.
6. Assign the account definition directly to employees who work with privileged
user accounts.
When the account definition is assigned to an employee, a new user account is
created through the inheritance mechanism and subsequent processing.
TIP: If customization requires that the login names of privileged user accounts follow a
defined naming convention, specify how the login names are formatted in the template.
l To use a prefix for the login name, in the Designer, set the TargetSystem |
AzureAD | Accounts | PrivilegedAccount | AccountName_Prefix
configuration parameter.
These configuration parameters are evaluated in the default installation, if a user account
is marked with the Privileged user account property (IsPrivilegedAccount column).
The user account login names are renamed according to the formatting rules. This also
occurs if the user accounts are labeled as privileged using the Mark selected user
accounts as privileged schedule. If necessary, modify the schedule in the Designer.
Related topics
Example:
During testing, user accounts from the target system are only read into One Identity
Manager and employees created. User account administration (creating, modifying,
and deleting) should be done later through One Identity Manager. During testing,
user accounts are modified further in the target system, which can lead to drifts in
user account properties and employee properties. Due to this, user account
modifications loaded on resynchronization should be temporarily published to
employees who are already created. This means data is not lost when user account
administration is put into effect through One Identity Manager.
Modifications to user accounts are loaded into One Identity Manager during
synchronization. These modifications are forwarded to the associated employees through
subsequent scripting and processing.
l When making changes to user accounts, the employees are only updated for user
accounts with the Unmanaged manage level and that are linked to an employee.
l Only the employee created by the modified user account is updated. The data
source from which the employee was created is shown in the Import data source
property. If other user accounts are assigned to the employee, changes to these
user accounts do not cause the employee to be update.
l For employees who do not yet have the Import data source set, the user
account's target system is entered as the data source for the import during the first
update of the connected user account.
User account properties are mapped to employee properties using the AAD_PersonUpdate_
AADUser script. To make the mapping easier to customize, the script is overwritable.
To customize, create a copy of the script and start the script coding follows:
Public Overrides Function AAD_PersonUpdate_AADUser (ByVal UID_Account As String,
oldUserPrincipalName As String, ProcID As String)
This redefines the script and overwrites the original. The process does not have to be
changed in this case.
l Global deferred deletion: Deferred deletion applies to user accounts in all target
system. The default value is 30 days.
In the Designer, enter a different value for deferred deletion in the Deferred
deletion [days] property of the AADUser table.
l Object-specific deferred deletion: Deferred deletion can be configured depending on
certain properties of the accounts.
To use object-specific deferred deletion, in the Designer, create a Script (deferred
deletion) for the AADUser table.
For detailed information on editing table definitions and configuring deferred deletion in the
Designer, see the One Identity Manager Configuration Guide.
Azure Active Directory user accounts can be grouped into Azure Active Directory groups
that can be used to regulate access to resources.
In One Identity Manager, you can assign Azure Active Directory groups directly to user
accounts or they can be inherited through departments, cost centers, locations, or business
roles. Users can also request the groups through the Web Portal. To do this, groups are
provided in the IT Shop.
NOTE: Assignments to Azure Active Directory groups that are synchronized with the local
Active Directory are not allowed in One Identity Manager. These groups cannot be
requested through the web portal. You can only manage these groups in your locally. For
more information, see the Azure Active Directory documentation from Microsoft.
Topic Guide
Basic principles for assigning and One Identity Manager Identity Management
inheriting company resources Base Module Administration Guide
One Identity Manager Business Roles Admin-
istration Guide
Assigning company resources through One Identity Manager IT Shop Administration
IT Shop requests Guide
System roles One Identity Manager System Roles Admin-
istration Guide
1. Assignment of employees and Azure Active Directory groups is permitted for role
classes (departments, cost centers, locations, or business roles).
For more detailed information, see the One Identity Manager Identity Management
Base Module Administration Guide.
NOTE: There are other configuration settings that play a role when company resources
are inherited through departments, cost centers, locations, and business roles. For
example, role inheritance might be blocked or inheritance of employees not allowed. For
more detailed information about the basic principles for assigning company resources,
see the One Identity Manager Identity Management Base Module Administration Guide.
l Creating and editing Azure Active Directory user accounts on page 177
l General main data of Azure Active Directory user accounts on page 178
1. In the Manager, select the Azure Active Directory > Groups category.
2. Select the group in the result list.
3. Select the Assign organizations task.
4. In the Add assignments pane, assign the organizations:
l On the Departments tab, assign departments.
l On the Locations tab, assign locations.
l On the Cost centers tab, assign cost centers.
TIP: In the Remove assignments pane, you can remove assigned organizations.
To remove an assignment
l Select the organization and double-click .
5. Save the changes.
To remove an assignment
l Select the group and double-click .
5. Save the changes.
Related topics
1. In the Manager, select the Azure Active Directory > Groups category.
2. Select the group in the result list.
3. Select the Assign business roles task.
4. In the Add assignments pane, select the role class and assign business roles.
TIP: In the Remove assignments pane, you can remove assigned business roles.
To remove an assignment
l Select the business role and double-click .
5. Save the changes.
1. In the Manager, select the Business roles > <role class> category.
2. Select the business role in the result list.
3. Select the Assign Azure Active Directory groups task.
4. In the Add assignments pane, assign the groups.
TIP: In the Remove assignments pane, you can remove the assignment of
groups.
To remove an assignment
l Select the group and double-click .
5. Save the changes.
Related topics
1. In the Manager, select the Azure Active Directory > Groups category.
2. Select the group in the result list.
3. Select the Assign system roles task.
4. In the Add assignments pane, assign system roles.
TIP: In the Remove assignments pane, you can remove assigned system roles.
To remove an assignment
l Select the system role and double-click .
5. Save the changes.
Related topics
1. In the Manager, select the Azure Active Directory > Groups (non role-based
login) category.
- OR -
In the Manager, select the Entitlements > Azure Active Directory groups (role-
based login) category.
2. In the result list, select the group.
3. Select the Add to IT Shop task.
4. Select the IT Shop structures tab.
5. In the Add assignments pane, assign the group to the IT Shop shelves.
6. Save the changes.
1. In the Manager, select the Azure Active Directory > Groups (non role-based
login) category.
- OR -
In the Manager, select the Entitlements > Azure Active Directory groups (role-
based login) category.
2. In the result list, select the group.
3. Select the Add to IT Shop task.
4. Select the IT Shop structures tab.
5. In the Remove assignments pane, remove the group from the IT Shop shelves.
6. Save the changes.
1. In the Manager, select the Azure Active Directory > Groups (non role-based
login) category.
- OR -
In the Manager, select the Entitlements > Azure Active Directory groups (role-
based login) category.
2. In the result list, select the group.
3. Select the Remove from all shelves (IT Shop) task.
4. Confirm the security prompt with Yes.
5. Click OK.
The group is removed from all shelves by the One Identity Manager Service. All
requests and assignment requests with this group are canceled.
Related topics
The Azure Active Directory groups are added automatically to the IT Shop from now on.
The following steps are run to add an Azure Active Directory group to the IT Shop.
Subsequently, the shop's customers can use the Azure Active Directory to request
memberships in Web Portal groups.
NOTE: If an Azure Active Directory group is irrevocably deleted from the One Identity
Manager database, the associated service item is also deleted.
For more information about configuring the One Identity Manager IT Shop Administration
Guide, see the IT Shop. For more information about requesting access requests in Web
Portal, please refer to the One Identity Manager Web Portal User Guide.
1. In the Manager, select the Azure Active Directory > Groups category.
2. Select the group in the result list.
3. Select the Assign user accounts task.
4. In the Add assignments pane, assign the user accounts.
TIP: In the Remove assignments pane, you can remove assigned user accounts.
To remove an assignment
l Select the user account and double-click .
5. Save the changes.
Related topics
l Assigning Azure Active Directory groups directly to Azure Active Directory user
accounts on page 104
l Assigning Azure Active Directory groups to departments, cost centers and
locations on page 96
l Assigning Azure Active Directory groups to business roles on page 97
l Adding Azure Active Directory groups to system roles on page 98
l Adding Azure Active Directory groups to the IT Shop on page 99
1. In the Manager, select the Azure Active Directory > User accounts category.
2. Select the user account in the result list.
3. Select the Assign groups task.
4. In the Add assignments pane, assign the groups.
TIP: In the Remove assignments pane, you can remove the assignment of
groups.
To remove an assignment
l Select the group and double-click .
5. Save the changes.
Related topics
l You cannot define a pair of mutually exclusive groups. That means, the definition
"Group A excludes group B" AND "Group B excludes groups A" is not permitted.
l You must declare each group to be excluded from a group separately. Exclusion
definitions cannot be inherited.
l One Identity Manager does not check if membership of an excluded group is
permitted in another group ( table).
Clara Harris has a user account in this tenant. She primarily belongs to the
"Marketing" department. The "Control group" business role and the "Finance"
department are assigned to her secondarily. Without an exclusion definition, the user
account obtains all the permissions of groups A, B, and C.
By using suitable controls, you want to prevent an employee from being able to
trigger a request and to pay invoices. That means, groups A, B, and C are mutually
exclusive. An employee that checks invoices may not be able to make invoice
payments as well. That means, groups B and C are mutually exclusive.
Group A
Group B Group A
Group C Group B
Only the group C assignment is in effect for Clara Harris. It is published in the target
system. If Clara Harris leaves the "control group" business role at a later date, group
B also takes effect.
The groups A and C are in effect for Jenny Basset because the groups are not defined
as mutually exclusive. That means that the employee is authorized to trigger
requests and to check invoices. If this should not be allowed, define further exclusion
for group C.
Prerequisites
To exclude a group
1. In the Manager, select the Azure Active Directory > Groups category.
2. Select a group in the result list.
3. Select the Exclude groups task.
4. In the Add assignments pane, assign the groups that are mutually exclusive to the
selected group.
- OR -
1. In the Manager, define the categories in the Azure Active Directory tenant.
2. In the Manager, assign categories to user accounts through their main data.
3. In the Manager, assign categories to groups through their main data.
Examples:
l If the report is created for a resource, all roles are determined in which there
are employees with this resource.
l If the report is created for a group or another system entitlement, all roles are
determined in which there are employees with this group or system
entitlement.
l If the report is created for a compliance rule, all roles are determined in which
there are employees who violate this compliance rule.
l If the report is created for a department, all roles are determined in which
employees of the selected department are also members.
l If the report is created for a business role, all roles are determined in which
employees of the selected business role are also members.
l To display the report, select the base object from the navigation or the result list and
select the Overview of all assignments report.
l Click the Used by button in the report toolbar to select the role class for which
you want to determine whether roles exist that contain employees with the selected
base object.
All the roles of the selected role class are shown. The color coding of elements
identifies the role in which there are employees with the selected base object. The
meaning of the report control elements is explained in a separate legend. To access
the legend, click the icon in the report's toolbar.
Icon Meaning
Show the legend with the meaning of the report control elements
In One Identity Manager, you can assign the Azure Active Directory administrator roles
directly to user accounts or they can be inherited through departments, cost centers,
locations, or business roles. Users can also request the administrator roles through the
Web Portal. To do this, administrator roles are provided in the IT Shop.
l Assigning Azure Active Directory administrator roles to Azure Active Directory user
accounts on page 111
l Azure Active Directory administrator role inheritance based on categories on
page 120
l Overview of all assignments on page 109
Topic Guide
Basic principles for assigning and One Identity Manager Identity Management
inheriting company resources Base Module Administration Guide
One Identity Manager Business Roles Admin-
istration Guide
Assigning company resources through One Identity Manager IT Shop Administration
IT Shop requests Guide
System roles One Identity Manager System Roles Admin-
istration Guide
NOTE: There are other configuration settings that play a role when company resources
are inherited through departments, cost centers, locations, and business roles. For
example, role inheritance might be blocked or inheritance of employees not allowed. For
more detailed information about the basic principles for assigning company resources,
see the One Identity Manager Identity Management Base Module Administration Guide.
l Creating and editing Azure Active Directory user accounts on page 177
l General main data of Azure Active Directory user accounts on page 178
1. In the Manager, select the Azure Active Directory > Administrator roles
category.
2. Select the administrator role in the result list.
3. Select the Assign organizations task.
4. In the Add assignments pane, assign the organizations:
l On the Departments tab, assign departments.
l On the Locations tab, assign locations.
l On the Cost centers tab, assign cost centers.
TIP: In the Remove assignments pane, you can remove assigned organizations.
To remove an assignment
l Select the organization and double-click .
5. Save the changes.
To remove an assignment
l Select the administrator role and double-click .
5. Save the changes.
Related topics
1. In the Manager, select the Azure Active Directory > Administrator roles
category.
2. Select the administrator role in the result list.
3. Select the Assign business roles task.
4. In the Add assignments pane, select the role class and assign business roles.
TIP: In the Remove assignments pane, you can remove assigned business roles.
To remove an assignment
l Select the business role and double-click .
5. Save the changes.
1. In the Manager, select the Business roles > <role class> category.
2. Select the business role in the result list.
3. Select the Assign Azure Active Directory administrator roles task.
4. In the Add assignments pane, assign administrator roles.
TIP: In the Remove assignments pane, you can remove assigned admin-
istrator roles.
To remove an assignment
l Select the administrator role and double-click .
5. Save the changes.
Related topics
1. In the Manager, select the Azure Active Directory > Administrator roles
category.
To remove an assignment
l Select the system role and double-click .
5. Save the changes.
Related topics
NOTE: IT Shop administrators can assign administrator roles to IT Shop shelves in the
case of role-based login. Target system administrators are not authorized to add
administrator roles in the IT Shop.
1. In the Manager, select the Azure Active Directory > administrator roles (non
role-based login) category.
- OR -
1. In the Manager, select the Azure Active Directory > administrator roles (non
role-based login) category.
- OR -
In the Manager, select the Entitlements > Azure Active Directory
administrator roles (role-based login) category.
2. Select the administrator role in the result list.
3. Select the Add to IT Shop task.
4. In the Remove assignments pane, remove the administrator role from the IT
Shop shelves.
5. Save the changes.
1. In the Manager, select the Azure Active Directory > administrator roles (non
role-based login) category.
- OR -
In the Manager, select the Entitlements > Azure Active Directory
administrator roles (role-based login) category.
2. Select the administrator role in the result list.
3. Select the Remove from all shelves (IT Shop) task.
4. Confirm the security prompt with Yes.
5. Click OK.
The administrator role is removed from all shelves by the One Identity Manager
Service. All requests and assignment requests with this administrator role are
canceled at the same time.
For detailed information about requesting company resources through the IT Shop, see the
One Identity Manager IT Shop Administration Guide.
Related topics
l Editing main data of Azure Active Directory administrator roles on page 199
l Prerequisites for indirect assignment of Azure Active Directory administration roles
to Azure Active Directory user accounts on page 113
1. In the Manager, select the Azure Active Directory > Administrator roles
category.
2. Select the administrator role in the result list.
3. Select the Assign user accounts task.
4. In the Add assignments pane, assign the user accounts.
TIP: In the Remove assignments pane, you can remove assigned user accounts.
To remove an assignment
l Select the user account and double-click .
5. Save the changes.
Related topics
1. In the Manager, select the Azure Active Directory > User accounts category.
2. Select the user account in the result list.
3. Select the Assign administrator roles task.
4. In the Add assignments pane, assign administrator roles.
TIP: In the Remove assignments pane, you can remove assigned admin-
istrator roles.
To remove an assignment
l Select the administrator role and double-click .
5. Save the changes.
Related topics
l Assigning Azure Active Directory administrator roles to Azure Active Directory user
accounts on page 111
1. In the Manager, define the categories in the Azure Active Directory tenant.
2. In the Manager, assign categories to user accounts through their main data.
3. In the Manager, assign categories to administrator roles through their main data.
The user requires an Azure Active Directory subscription to access the service plans in
Azure Active Directory. An Azure Active Directory subscription defines the scope of
service plans that the user can access. Use of individual service plans by the user can be
permitted or not.
Example:
The Azure Active Directory subscription A contains service plan 1, service plan 2, and
the service plan 3.
In Azure Active Directory, Azure Active Directory subscriptions can be assigned to users
and groups. Service plans can be permitted or not depending on the assignment method.
The user obtains all the permitted service plans.
Example:
The Azure Active Directory subscription A contains service plan 1, service plan 2, and
the service plan 3.
It is possible that a user obtains the same Azure Active Directory subscription directly as
well as through one or more groups. If a service plan is permitted by one assignment
method and not by another, the user is given the service plan.
Example:
The Azure Active Directory subscription A contains service plan 1, service plan 2, and
the service plan 3.
In One Identity Manager, Azure Active Directory subscriptions and service plans and their
assignments to Azure Active Directory user accounts and Azure Active Directory groups are
mapped as follows.
Table 19: Azure Active Directory subscription and service plans in the One
Identity Manager schema map
Table Description
AADUserHasServicePlan This table contains the service plan assignments for Azure
Active Directory user accounts that are in effect. The
assignments are calculated in One Identity Manager from
the entries in the AADUserHasSubSku,
AADUserHasDeniedService, AADGroupHasSubSku, and
AADGroupHasDeniedService tables.
l Displaying enabled and disabled Azure Active Directory service plans forAzure Active
Directory user accounts and Azure Active Directory groups on page 126
1. In the Manager, select the Azure Active Directory > User accounts category.
2. Select the user account in the result list.
3. Select the Azure Active Directory user account overview task.
The following information about Azure Active Directory subscriptions and service
plans for a user account is displayed on the overview form.
l Azure Active Directory subscriptions (owned): Azure Active Directory
subscriptions assigned to the user account either directly, though IT Shop
requests, or through departments, cost centers, locations and business roles.
1. In the Manager, select the Azure Active Directory > Groups category.
2. Select the group in the result list.
3. Select the Azure Active Directory group overview task.
The following information about Azure Active Directory subscriptions and service
plans for a group is displayed on the overview form.
l Azure Active Directory subscriptions: Azure Active Directory
subscriptions assigned to Azure Active Directory groups.
l Enabled Azure Active Directory service plans: Azure Active Directory
service plans permitted for this group.
l Disabled Azure Active Directory service plans: Azure Active Directory
service plans not permitted for this group.
l Azure Active Directory user accounts: Azure Active Directory user
accounts assigned to group and therefore contain subscriptions and
service plans.
Related topics
Topic Guide
Basic principles for assigning and One Identity Manager Identity Management
inheriting company resources Base Module Administration Guide
One Identity Manager Business Roles Admin-
istration Guide
Assigning company resources through One Identity Manager IT Shop Administration
NOTE: There are other configuration settings that play a role when company resources
are inherited through departments, cost centers, locations, and business roles. For
example, role inheritance might be blocked or inheritance of employees not allowed. For
more detailed information about the basic principles for assigning company resources,
see the One Identity Manager Identity Management Base Module Administration Guide.
Related topics
l Creating and editing Azure Active Directory user accounts on page 177
l General main data of Azure Active Directory user accounts on page 178
1. In the Manager, select the Azure Active Directory > Subscriptions category.
2. Select an Azure Active Directory subscription in the result list.
3. Select the Assign organizations task.
4. In the Add assignments pane, assign the organizations:
l On the Departments tab, assign departments.
l On the Locations tab, assign locations.
l On the Cost centers tab, assign cost centers.
TIP: In the Remove assignments pane, you can remove assigned organizations.
To remove an assignment
l Select the organization and double-click .
5. Save the changes.
To remove an assignment
l Select the subscription and double-click Azure Active Directory.
5. Save the changes.
Related topics
1. In the Manager, select the Azure Active Directory > Subscriptions category.
2. Select an Azure Active Directory subscription in the result list.
3. Select the Assign business roles task.
4. In the Add assignments pane, select the role class and assign business roles.
TIP: In the Remove assignments pane, you can remove assigned business roles.
To remove an assignment
l Select the business role and double-click .
5. Save the changes.
1. In the Manager, select the Business roles > <role class> category.
2. Select the business role in the result list.
3. Select the Assign Azure Active Directory subscriptions task.
4. In the Add assignments pane, select the Azure Active Directory tenant and assign
the Azure Active Directory subscriptions.
TIP: In the Remove assignments pane, you can remove assigned Azure Active
Directory subscriptions.
To remove an assignment
l Select the subscription and double-click Azure Active Directory.
5. Save the changes.
1. In the Manager, select the Azure Active Directory > Subscriptions category.
2. Select an Azure Active Directory subscription in the result list.
3. Select the Assign system roles task.
4. In the Add assignments pane, assign system roles.
TIP: In the Remove assignments pane, you can remove assigned system roles.
To remove an assignment
l Select the system role and double-click .
5. Save the changes.
l The Azure Active Directory subscription must be labeled with the IT Shop option.
l The Azure Active Directory subscription must be assigned to a service item.
l If the Azure Active Directory subscription is only supposed to be available to
employees through IT Shop requests, the Azure Active Directory subscription must
also be labeled with the Only for use in IT Shop option. Direct assignment to
hierarchical roles may not be possible.
NOTE: IT Shop administrators can assign Azure Active Directory subscriptions to IT Shop
shelves in the case of role-based login. Target system administrators are not authorized
to add Azure Active Directory subscriptions in the IT Shop.
1. In the Manager, select the Azure Active Directory > Subscriptions (non role-
based login) category.
- OR -
In the Manager, select the Entitlements > Azure Active Directory
subscriptions (role-based login) category.
2. Select an Azure Active Directory subscription in the result list.
3. Select Add to IT Shop.
4. In the Add assignments pane, assign the Azure Active Directory subscription to the
IT Shop shelves.
5. Save the changes.
1. In the Manager, select the Azure Active Directory > Subscriptions (non role-
based login) category.
- OR -
In the Manager, select the Entitlements > Azure Active Directory
subscriptions (role-based login) category.
2. Select an Azure Active Directory subscription in the result list.
3. Select Add to IT Shop.
4. In the Remove assignments pane, remove the Azure Active Directory subscription
from the IT Shop shelves.
5. Save the changes.
1. In the Manager, select the Azure Active Directory > Subscriptions (non role-
based login) category.
- OR -
In the Manager, select the Entitlements > Azure Active Directory
subscriptions (role-based login) category.
2. Select an Azure Active Directory subscription in the result list.
3. Select the Remove from all shelves (IT Shop) task.
4. Confirm the security prompt with Yes.
5. Click OK.
The Azure Active Directory subscription is removed from all shelves by the One
Identity Manager Service. All request and assignment requests for this Azure Active
Directory subscription are canceled in the process.
For detailed information about requesting company resources through the IT Shop, see the
One Identity Manager IT Shop Administration Guide.
Related topics
The Azure Active Directory subscriptions are added automatically to the IT Shop
from now on.
The following steps are run to add an Azure Active Directory subscription to the IT Shop.
Then the shop customers use the Web Portal to request the Azure Active Directory
subscription.
NOTE: If an Azure Active Directory subscription is irrevocably deleted from the One
Identity Manager database, the associated service item is also deleted.
For more information about configuring the One Identity Manager IT Shop Administration
Guide, see the IT Shop. For more information about requesting access requests in the Web
Portal, see the One Identity Manager Web Portal User Guide.
Related topics
On the form, assignments of Azure Active Directory subscriptions to Azure Active Directory
user accounts are shown with their origin. This means:
l Azure Active Directory source group: Azure Active Directory group resulting
from an assignment. If the column is empty, this assignment of the Azure Active
Directory subscription to the Azure Active Directory user account is created either
directly, though IT Shop requests, or through departments, cost centers, locations,
and business roles.
l Origin: Type of assignment. Assignments through Azure Active Directory groups are
marked with the Assigned by group value (AADUserHasSubSku.XOrigin=16).
NOTE: You cannot delete assignments that are not derived from an Azure Active
Directory group.
1. In the Manager, select the Azure Active Directory > Subscriptions category.
2. Select an Azure Active Directory subscription in the result list.
3. Select in the Assign user accounts task.
4. Click Add and select the user account in the Azure Active Directory user
account menu.
5. Save the changes.
1. In the Manager, select the Azure Active Directory > Subscriptions category.
2. Select an Azure Active Directory subscription in the result list.
3. Select in the Assign user accounts task.
4. Select the assignment and click Remove.
5. Save the changes.
l Displaying enabled and disabled Azure Active Directory service plans forAzure Active
Directory user accounts and Azure Active Directory groups on page 126
l Assigning Azure Active Directory subscriptions directly to Azure Active Directory user
accounts on page 139
l Assigning Azure Active Directory subscriptions to departments, cost centers, and
locations on page 130
l Assigning Azure Active Directory subscriptions to business roles on page 132
l Adding Azure Active Directory subscriptions to system roles on page 133
l Adding Azure Active Directory subscriptions to the IT Shop on page 134
On the form, assignments of Azure Active Directory subscriptions to Azure Active Directory
user accounts are shown with their origin. This means:
l Azure Active Directory source group: Azure Active Directory group resulting
from an assignment. If the column is empty, this assignment of the Azure Active
Directory subscription to the Azure Active Directory user account is created either
directly, though IT Shop requests, or through departments, cost centers, locations,
and business roles.
l Origin: Type of assignment. Assignments through Azure Active Directory groups are
marked with the Assigned by group value (AADUserHasSubSku.XOrigin=16).
NOTE: You cannot delete assignments that are not derived from an Azure Active
Directory group.
1. In the Manager, select the Azure Active Directory > User accounts category.
2. Select the user account in the result list.
3. Select the Directly assign subscriptions task.
4. Click Add and in the Azure Active Directory subscription menu, select an Azure
1. In the Manager, select the Azure Active Directory > User accounts category.
2. Select the user account in the result list.
3. Select the Directly assign subscriptions task.
4. Select the assignment and click Remove.
5. Save the changes.
Related topics
l Displaying enabled and disabled Azure Active Directory service plans forAzure Active
Directory user accounts and Azure Active Directory groups on page 126
l Assigning Azure Active Directory subscriptions to Azure Active Directory user
accounts on page 128
l Assigning Azure Active Directory subscriptions to departments, cost centers, and
locations on page 130
l Assigning Azure Active Directory subscriptions to business roles on page 132
l Adding Azure Active Directory subscriptions to system roles on page 133
l Adding Azure Active Directory subscriptions to the IT Shop on page 134
Topic Guide
Basic principles for assigning and One Identity Manager Identity Management
inheriting company resources Base Module Administration Guide
One Identity Manager Business Roles Admin-
istration Guide
Assigning company resources through One Identity Manager IT Shop Administration
IT Shop requests Guide
System roles One Identity Manager System Roles Admin-
istration Guide
l Prerequisites for indirect assignment of disabled Azure Active Directory service plans
to Azure Active Directory user accounts on page 142
l Assigning disabled Azure Active Directory service plans directly to departments, cost
centers, and locations on page 143
l Assigning disabled Azure Active Directory service plans to business roles on page 144
l Adding disabled Azure Active Directory service plans to system roles on page 145
l Adding disabled Azure Active Directory service plans to the IT Shop on page 146
l Adding disabled Azure Active Directory service plans automatically to the IT
Shop on page 148
l Assigning Azure Active Directory user accounts directly to disabled Azure Active
Directory service plans on page 149
l Assigning disabled Azure Active Directory service plans directly to Azure Active
Directory user accounts on page 150
Related topics
l Creating and editing Azure Active Directory user accounts on page 177
l General main data of Azure Active Directory user accounts on page 178
1. In the Manager, select the Azure Active Directory > Disabled service
plans category.
2. Select the service plan in the result list.
3. Select the Assign organizations task.
4. In the Add assignments pane, assign the organizations:
l On the Departments tab, assign departments.
l On the Locations tab, assign locations.
l On the Cost centers tab, assign cost centers.
TIP: In the Remove assignments pane, you can remove assigned organizations.
To remove an assignment
l Select the organization and double-click .
5. Save the changes.
To remove an assignment
Related topics
l Prerequisites for indirect assignment of disabled Azure Active Directory service plans
to Azure Active Directory user accounts on page 142
l Assigning disabled Azure Active Directory service plans to business roles on page 144
l Assigning Azure Active Directory user accounts directly to disabled Azure Active
Directory service plans on page 149
l Adding disabled Azure Active Directory service plans to system roles on page 145
l Adding disabled Azure Active Directory service plans to the IT Shop on page 146
l One Identity Manager users for managing an Azure Active Directory
environment on page 11
1. In the Manager, select the Azure Active Directory > Disabled service
plans category.
2. Select the service plan in the result list.
3. Select the Assign business roles task.
4. In the Add assignments pane, select the role class and assign business roles.
TIP: In the Remove assignments pane, you can remove assigned business roles.
To remove an assignment
l Select the business role and double-click .
1. In the Manager, select the Business roles > <role class> category.
2. Select the business role in the result list.
3. Select the Assigning disabled Azure Active Directory service plans task.
To remove an assignment
l Select the service plan and double-click .
5. Save the changes.
Related topics
l Prerequisites for indirect assignment of disabled Azure Active Directory service plans
to Azure Active Directory user accounts on page 142
l Assigning disabled Azure Active Directory service plans directly to departments, cost
centers, and locations on page 143
l Assigning Azure Active Directory user accounts directly to disabled Azure Active
Directory service plans on page 149
l Adding disabled Azure Active Directory service plans to system roles on page 145
l Adding disabled Azure Active Directory service plans to the IT Shop on page 146
l One Identity Manager users for managing an Azure Active Directory
environment on page 11
1. In the Manager, select the Azure Active Directory > Disabled service
plans category.
2. Select the service plan in the result list.
3. Select the Assign system roles task.
4. In the Add assignments pane, assign system roles.
TIP: In the Remove assignments pane, you can remove assigned system roles.
Related topics
l Prerequisites for indirect assignment of disabled Azure Active Directory service plans
to Azure Active Directory user accounts on page 142
l Assigning disabled Azure Active Directory service plans directly to departments, cost
centers, and locations on page 143
l Assigning disabled Azure Active Directory service plans to business roles on page 144
l Assigning Azure Active Directory user accounts directly to disabled Azure Active
Directory service plans on page 149
l Adding disabled Azure Active Directory service plans to the IT Shop on page 146
l The disabled service plan must be labeled with the IT Shop option.
l The disabled service plan must be assigned to a service item.
l If the disabled service plan is only assigned to employees using IT Shop requests,
you must also set the Only for use in IT Shop option. Direct assignment to
hierarchical roles may not be possible.
NOTE: IT Shop administrators can assign disabled service plans to IT Shop shelves in the
case of role-based login. Target system administrators are not authorized to add disabled
service plans in the IT Shop.
1. In the Manager, select the Azure Active Directory > Disabled service plans
(non role-based login) category.
- OR -
In the Manager, select the Entitlements > Disabled Azure Active Directory
service plans (role-based login) category.
2. Select the service plan in the result list.
3. Select the Add to IT Shop task.
1. In the Manager, select the Azure Active Directory > Disabled service plans
(non role-based login) category.
- OR -
In the Manager, select the Entitlements > Disabled Azure Active Directory
service plans (role-based login) category.
2. Select the service plan in the result list.
3. Select the Add to IT Shop task.
4. In the Remove assignments pane, remove the disabled service plan from the IT
Shop shelves.
5. Save the changes.
1. In the Manager, select the Azure Active Directory > Disabled service plans
(non role-based login) category.
- OR -
In the Manager, select the Entitlements > Disabled Azure Active Directory
service plans (role-based login) category.
2. Select the service plan in the result list.
3. Select the Remove from all shelves (IT Shop) task.
4. Confirm the security prompt with Yes.
5. Click OK.
The disabled service plan is removed from all shelves by the One Identity Manager
Service. All requests and assignment requests with this disabled service plan are
canceled at the same time.
For detailed information about requesting company resources through the IT Shop, see the
One Identity Manager IT Shop Administration Guide.
Related topics
l Prerequisites for indirect assignment of disabled Azure Active Directory service plans
to Azure Active Directory user accounts on page 142
l Adding disabled Azure Active Directory service plans automatically to the IT
Shop on page 148
l Assigning disabled Azure Active Directory service plans directly to departments, cost
centers, and locations on page 143
l Assigning disabled Azure Active Directory service plans to business roles on page 144
The disabled service plans are added automatically to the IT Shop from now on.
The following steps are run to add a disabled service plan to the IT Shop.
Then the shop customers use the Web Portal to request the disabled service plan.
NOTE: If a disabled service plan is irrevocably deleted from the One Identity Manager
database, the associated service item is also deleted.
For more information about configuring the One Identity Manager IT Shop Administration
Guide, see the IT Shop. For more information about requesting access requests in the Web
Portal, see the One Identity Manager Web Portal User Guide.
Related topics
l Adding disabled Azure Active Directory service plans to the IT Shop on page 146
l Assigning disabled Azure Active Directory service plans directly to departments, cost
centers, and locations on page 143
l Assigning disabled Azure Active Directory service plans to business roles on page 144
l Assigning Azure Active Directory user accounts directly to disabled Azure Active
Directory service plans on page 149
l Adding disabled Azure Active Directory service plans to system roles on page 145
1. In the Manager, select the Azure Active Directory > Disabled service
plans category.
2. Select the service plan in the result list.
3. Select the Assign user accounts task.
4. In the Add assignments pane, assign the user accounts.
TIP: In the Remove assignments pane, you can remove assigned user accounts.
To remove an assignment
l Select the user account and double-click .
5. Save the changes.
Related topics
l Assigning Azure Active Directory subscriptions directly to Azure Active Directory user
accounts on page 139
l Assigning disabled Azure Active Directory service plans directly to departments, cost
centers, and locations on page 143
l Assigning disabled Azure Active Directory service plans to business roles on page 144
l Adding disabled Azure Active Directory service plans to system roles on page 145
l Adding disabled Azure Active Directory service plans to the IT Shop on page 146
1. In the Manager, select the Azure Active Directory > User accounts category.
2. Select the user account in the result list.
3. Select the Assign disabled service plans task.
4. In the Add assignments pane, assign disabled service plans.
TIP: In the Remove assignments pane, you can remove assigned disabled
service plans.
Related topics
l Assigning disabled Azure Active Directory service plans to Azure Active Directory
user accounts on page 140
l Assigning disabled Azure Active Directory service plans directly to departments, cost
centers, and locations on page 143
l Assigning disabled Azure Active Directory service plans to business roles on page 144
l Adding disabled Azure Active Directory service plans to system roles on page 145
l Adding disabled Azure Active Directory service plans to the IT Shop on page 146
1. In the Manager, define the categories in the Azure Active Directory tenant.
2. In the Manager, assign categories to user accounts through their main data.
3. In the Manager, assign categories to Azure Active Directory subscriptions through
their main data.
Related topics
1. In the Manager, define the categories in the Azure Active Directory tenant.
2. In the Manager, assign categories to user accounts through their main data.
3. In the Manager, assign categories to disabled service plans through their main data.
Related topics
When new user accounts are created in One Identity Manager, the passwords needed to log
in to the target system are created immediately also. Various options are available for
assigning the initial password. Predefined password policies are applied to the passwords,
and you can adjust these policies to suit your individual requirements if necessary. You can
set up email notifications to distribute the login information generated to users.
l Password policies for Azure Active Directory user accounts on page 153
l Initial password for new Azure Active Directory user accounts on page 165
l Email notifications about login data on page 165
The One Identity Manager password policy is applied for logging in to One Identity
Manager. This password policy defines the settings for the system user passwords
(DialogUser.Password and Person.DialogUserPassword) as well as the passcode for a one
time log in on the Web Portal (Person.Passcode).
NOTE: The One Identity Manager password policy is marked as the default policy.
This password policy is applied if no other password policy can be found for employees,
user accounts, or system users.
For detailed information about password policies for employees, see the One Identity
Manager Identity Management Base Module Administration Guide.
An employee's central password is formed from the target system specific user accounts
by respective configuration. The Employee central password policy defines the
settings for the (Person.CentralPassword) central password. Members of the Identity
Management | Employees | Administrators application role can adjust this
password policy.
IMPORTANT: Ensure that the Employee central password policy does not violate the
target system-specific requirements for passwords.
For detailed information about password policies for employees, see the One Identity
Manager Identity Management Base Module Administration Guide.
Predefined password policies are provided, which you can apply to the user account
password columns of the user accounts.
IMPORTANT: If you do not use password policies that are specific to the target system,
the One Identity Manager password policy default policy applies. In this case,
ensure that the default policy does not violate the target systems requirements.
NOTE: When you update One Identity Manager version 7.x to One Identity Manager
version 8.2.1, the configuration parameter settings for forming passwords are passed on
IMPORTANT: If you do not use password policies that are specific to the target system,
the One Identity Manager password policy default policy applies. In this case,
ensure that the default policy does not violate the target systems requirements.
1. In the Manager, select the Azure Active Directory > Basic configuration data
> Password policies category.
2. Select the password policy in the result list.
3. Select Assign objects.
4. Click Add in the Assignments section and enter the following data.
1. In the Manager, select the Azure Active Directory > Basic configuration data
> Password policies category.
2. Select the password policy in the result list.
3. Select the Assign objects task.
4. In the Assignments pane, select the assignment you want to change.
5. From the Password Policies menu, select the new password policy you want
to apply.
6. Save the changes.
1. In the Manager, select the Azure Active Directory > Basic configuration data
> Password policies category.
2. Click in the result list.
3. On the main data form, enter the main data of the password policy.
4. Save the changes.
1. In the Manager, select the Azure Active Directory > Basic configuration data
> Password policies category.
2. In the result list, select the password policy.
3. Select the Change main data task.
4. Edit the password policy's main data.
5. Save the changes.
Property Meaning
Display name Password policy name. Translate the given text using the
button.
Description Text field for additional explanation. Translate the given text
using the button.
Error Message Custom error message generated if the policy is not fulfilled.
Translate the given text using the button.
Owner (Application Role) Application roles whose members can configure the password
policies.
Default policy Mark as default policy for passwords. This option cannot be
changed.
NOTE: The One Identity Manager password policy is
marked as the default policy. This password policy is
applied if no other password policy can be found for
employees, user accounts, or system users.
Policy settings
Define the following settings for a password policy on the Password tab.
Property Meaning
Initial password Initial password for newly created user accounts. The initial
password is used if a password is not entered when you
create a user account or if a random password is not
generated.
Max. days valid Maximum age of the password. Enter the length of time a
password can be used before it expires. If the value is 0, then
the password does not expire.
Password history Enter the number of passwords to be saved. If, for example,
a value of 5 is entered, the user's last five passwords are
stored. If the value is 0, then no passwords are stored in the
password history.
Minimum password Specifies how secure the password must be. The higher the
strength password strength, the more secure it is. The value 0 means
that the password strength is not tested. The values 1, 2, 3
and 4 specify the required complexity of the password. The
value 1 represents the lowest requirements in terms of
password strength. The value 4 requires the highest level of
complexity.
Name properties denied Specifies whether name properties are permitted in the
password. If this option is set, name properties are not
permitted in passwords. The values of these columns are
taken into account if the Contains name properties for
password check option is set. In the Designer, adjust this
option in the column definition. For more information, see the
One Identity Manager Configuration Guide.
Property Meaning
Required Number of rules for character classes that must be fulfilled so that a
number of password adheres to the password policy. The following rules are taken into
character account for Min. number letters, Min. number lowercase, Min.
classes number uppercase, Min. number digits, and Min. number special
characters.
That means:
Min. Specifies the minimum number of lowercase letters the password must
number contain.
lowercase
Min. Specifies the minimum number of uppercase letters the password must
number contain.
uppercase
Min. Specifies the minimum number of digits the password must contain.
number
digits
Min. Specifies the minimum number of special characters the password must
number contain.
special
characters
Max. Specifies the maximum number of identical characters that can be present in
identical the password in total.
characters
in total
Max. Specifies the maximum number of identical character that can be repeated
identical after each other.
characters
in
succession
Do not Specifies whether a generated password can contain lowercase letters. This
generate setting only applies when passwords are generated.
lowercase
letters
Do not Specifies whether a generated password can contain uppercase letters. This
generate setting only applies when passwords are generated.
uppercase
letters
Do not Specifies whether a generated password can contain digits. This setting only
generate applies when passwords are generated.
digits
A password cannot start with ? or ! . The password cannot start with three identical
characters. The script checks a given password for validity.
Public Sub CCC_PwdValidate( policy As VI.DB.Passwords.PasswordPolicy, spwd As
System.Security.SecureString)
Dim pwd = spwd.ToInsecureArray()
If pwd.Length>0
If pwd(0)="?" Or pwd(0)="!"
Throw New Exception(#LD("Password can't start with '?' or
'!'")#)
End If
End If
If pwd.Length>2
If pwd(0) = pwd(1) AndAlso pwd(1) = pwd(2)
Throw New Exception(#LD("Invalid character sequence in
password")#)
End If
End If
End Sub
Related topics
1. In the Designer, select the Base data > Security settings > Password
policies category.
2. Create a new entry with the Object > New menu item and enter the term you want
to exclude from the list.
3. Save the changes.
Checking passwords
When you verify a password, all the password policy settings, custom scripts, and the
restricted passwords are taken into account.
1. In the Manager, select the Azure Active Directory > Basic configuration data
> Password policies category.
2. In the result list, select the password policy.
3. Select the Change main data task.
4. Select the Test tab.
5. Select the table and object to be tested in Base object for test.
6. Enter a password in Enter password to test.
A display next to the password shows whether it is valid or not.
1. In the Manager, select the Azure Active Directory > Basic configuration data
> Password policies category.
2. In the result list, select the password policy.
3. Select the Change main data task.
4. Select the Test tab.
5. Click Generate.
This generates and displays a password.
l When you create the user account, enter a password in the main data.
l Assign a randomly generated initial password to enter when you create user
accounts.
l In the Designer, set the TargetSystem | AzureAD | Accounts |
InitialRandomPassword configuration parameter.
l Apply target system specific password policies and define the character sets
that the password must contain.
l Specify which employee will receive the initial password by email.
Related topics
l Password policies for Azure Active Directory user accounts on page 153
l Email notifications about login data on page 165
1. Ensure that the email notification system is configured in One Identity Manager. For
more information, see the One Identity Manager Installation Guide.
2. In the Designer, set the Common | MailNotification | DefaultSender
configuration parameter and enter the sender address for sending the email
notifications.
3. Ensure that all employees have a default email address. Notifications are sent to this
address. For more information, see the One Identity Manager Identity Management
Base Module Administration Guide.
4. Ensure that a language can be determined for all employees. Only then can they
receive email notifications in their own language. For more information, see the One
Identity Manager Identity Management Base Module Administration Guide.
When a randomly generated password is issued for the new user account, the initial login
data for a user account is sent by email to a previously specified person.
TIP: To use custom mail templates for emails of this type, change the value of the config-
uration parameter.
In One Identity Manager, you can map user accounts, groups, administrator roles,
subscriptions, service plans, applications, service principals, and app roles of an
Azure Active Directory tenant. These objects are imported into the One Identity
Manager database during synchronization. You cannot display or edit their properties
in the Manager.
1. In the Manager, select the Azure Active Directory > Tenants category.
2. In the result list, select the Azure Active Directory tenant.
3. Select the Change main data task.
4. Edit the Azure Active Directory tenant's main data.
5. Save the changes.
Property Description
Account Initial account definition for creating Azure Active Directory user
definition accounts. This account definition is used if automatic assignment of
(initial) employees to user accounts is used for this Azure Active Directory tenant
and user accounts should be created which are already managed (Linked
configured state). The account definition's default manage level is
applied.
User accounts are only linked to the employee (Linked) if no account
definition is given. This is the case on initial synchronization, for example.
Target Application role, in which target system managers are specified for the
system Azure Active Directory tenant. Target system managers only edit the
managers objects from Azure Active Directory tenants to which they are assigned.
Each Azure Active Directory tenant can have a different target system
manager assigned to it.
Select the One Identity Manager application role whose members are
responsible for administration of this Azure Active Directory tenant. Use
the button to add a new application role.
City City.
Country Country.
No none none
synchronization
Related topics
Property Description
To define a category
1. In the Manager, select the Azure Active Directory tenant in the Azure Active
Directory > Tenants category.
2. Select the Change main data task.
3. Switch to the Mapping rule category tab.
4. Extend the relevant roots of a table.
5. To enable the category, double-click .
6. Enter a category name of your choice for user accounts and groups (administrator
roles, subscriptions, disabled service plans) in the login language that you use.
7. Save the changes.
Related topics
1. In the Manager, select the Azure Active Directory > Tenants category.
2. In the result list, select the Azure Active Directory tenant.
3. Select the Change main data task.
4. Select the Edit synchronization project task.
Related topics
1. In the Manager, select the Azure Active Directory > Verified domains category.
2. Select the domain in the result list.
3. Select the Azure Active Directory domain overview task.
Property Description
Primary Specifies whether this is the primary domain, for example, for creating new
domain Azure Active Directory user accounts.
Initial Specifies whether this is the initial domain. The initial domain is created
domain when a tenant is registered in Azure Active Directory.
Related topics
1. In the Manager, select the Azure Active Directory > Tenants > <your tenant>
> Policies > Activity-based timeout policies category.
2. In the result list, select the Azure Active Directory policy.
3. Select one of the following tasks:
l Activity-based timeout policy overview: This shows you an overview of
the Azure Active Directory policy and its dependencies.
l Change main data: Shows the Azure Active Directory policy's main data. You
cannot edit the main data.
l Display name: The Azure Active Directory policy's display name.
l Description: Description of the Azure Active Directory policy.
l Definition: Definition of the Azure Active Directory in JSON format.
l Tenant: Azure Active Directory tenant that owns the policy.
l Default policy: Specifies whether this is the Azure Active Directory
tenant's default policy.
1. In the Manager, select the Azure Active Directory > Tenants > <your tenant>
> Policies > Home realm discovery policies category.
2. In the result list, select the Azure Active Directory policy.
3. Select one of the following tasks:
l Home realm discovery policy overview: This shows you an overview of
the Azure Active Directory policy and its dependencies.
l Change main data: Shows the Azure Active Directory policy's main data. You
cannot edit the main data.
l Display name: The Azure Active Directory policy's display name.
l Description: Description of the Azure Active Directory policy.
l Definition: Definition of the Azure Active Directory in JSON format.
l Tenant: Azure Active Directory tenant that owns the policy.
l Default policy: Specifies whether this is the Azure Active Directory
tenant's default policy.
Related topics
l Displaying Azure Active Directory service principal main data on page 213
1. In the Manager, select the Azure Active Directory > Tenants > <your tenant>
> Policies > Token issuance policies category.
2. In the result list, select the Azure Active Directory policy.
3. Select one of the following tasks:
l Token issuance policy overview: This shows you an overview of the Azure
Active Directory policy and its dependencies.
l Change main data: Shows the Azure Active Directory policy's main data. You
cannot edit the main data.
l Display name: The Azure Active Directory policy's display name.
l Description: Description of the Azure Active Directory policy.
l Definition: Definition of the Azure Active Directory in JSON format.
l Tenant: Azure Active Directory tenant that owns the policy.
l Default policy: Specifies whether this is the Azure Active Directory
tenant's default policy.
Related topics
1. In the Manager, select the Azure Active Directory > Tenants > <your tenant>
> Policies > Token lifetime policies category.
2. In the result list, select the Azure Active Directory policy.
3. Select one of the following tasks:
Related topics
Related topics
1. In the Manager, select the Azure Active Directory > User accounts category.
2. Click in the result list.
3. On the main data form, edit the main data of the user account.
4. Save the changes.
1. In the Manager, select the Azure Active Directory > User accounts category.
2. Select the user account in the result list.
3. Select the Change main data task.
4. Edit the user account's resource data.
5. Save the changes.
l General main data of Azure Active Directory user accounts on page 178
l Contact data for Azure Active Directory user accounts on page 184
l Information about the user profile for Azure Active Directory user accounts on
page 185
l Organizational data for Azure Active Directory user accounts on page 185
l Information about the local Active Directory user account on page 186
Related topics
Property Description
Employee Employee that uses this user account. An employee is already entered if
the user account was generated by an account definition. If you create the
user account manually, you can select an employee in the menu. If you
are using automatic employee assignment, an associated employee is
found and added to the user account when you save the user account.
You can create a new employee for a user account with an identity of type
Organizational identity, Personalized administrator identity,
Sponsored identity, Shared identity, or Service identity. To do this,
click next to the input field and enter the required employee main data.
Which login data is required depends on the selected identity type.
Not linked to Indicates why the No link to an employee required option is enabled
an employee for this user account. Possible values:
Account Account definition through which the user account was created.
definition
Use the account definition to automatically fill user account main data and
to specify a manage level for the user account. One Identity Manager
finds the IT operating data of the assigned employee and enters it in the
corresponding fields in the user account.
NOTE: The account definition cannot be changed once the user account
has been saved.
NOTE: Use the user account's Remove account definition task to
reset the user account to Linked status. This removes the account defin-
ition from both the user account and the employee. The user account
remains but is not managed by the account definition anymore. The
task only removes account definitions that are directly assigned
(XOrigin=1).
Manage level Manage level of the user account. Select a manage level from the menu.
You can only specify the manage level can if you have also entered an
account definition. All manage levels of the selected account definition
are available in the menu.
Tenant Azure Active Directory user account's tenant.
User type Type of user account. Depending on the user type, other mandatory input
is required.
Permitted values are:
l Guest: User account for guest users. The Azure Active Directory
connector creates a user account for guest users and ensures that
an invitation is sent by email to the given email address.
Further configuration of guest users is required in the synchron-
ization project. For more information, see Customizing synchron-
ization projects to invite guest users on page 32.
Invitation (Only for the Guest user type) Acceptance status of the guest's invitation.
status
Permitted values are:
Last change (Only for the Guest user type) Time at which the invitation status was
changed.
Location Location where this user account is in use. In the One Identity Manager, if
you assign Azure Active Directory subscriptions, a location is required.
First name The user’s first name. If you have assigned an account definition, the
input field is automatically filled out with respect to the manage level.
Last name The user’s last name. If you have assigned an account definition, the
input field is automatically filled out with respect to the manage level.
Date of birth The user's date of birth
Age group The user's age group. Permitted values are Minor, Teenager, and
Adult.
Consent for Specifies whether consent must be given for minors. Permitted values are
minors Obtained, Not obtained, and Not required.
User login User account login name. The user's login name is made up of the alias
name and the domain. User login names that are formatted like this correspond
to the User Principal Name (UPN) in Azure Active Directory.
Password Password for the user account. The employee’s central password can be
mapped to the user account password. For detailed information about an
employee’s central password, see One Identity Manager Identity
Management Base Module Administration Guide.
If you use a random generated initial password for the user accounts, it is
automatically entered when a user account is created.
The password is deleted from the database after publishing to the target
system.
NOTE: One Identity Manager password policies are taken into account
when a user password is being verified. Ensure that the password policy
does not violate the target system's requirements.
Change Specifies whether the user must change their password the next time
password at they log in.
next login
Password Policies, which only apply to the user account. The available options are:
policy No restrictions, Password never expires, and Allow weak
passwords.
Password last Data of last password change. The date is read in from the Azure Active
changed Directory system and cannot be changed.
Risk index Maximum risk index value of all assigned groups. The property is only
(calculated) visible if the QER | CalculateRiskIndex configuration parameter is set.
For detailed information, see the One Identity Manager Risk Assessment
Administration Guide.
Category Categories for the inheritance of groups by the user account. Groups can
be selectively inherited by user accounts. To do this, groups and user
accounts or contacts are divided into categories. Select one or more
categories from the menu.
Disabled Specifies whether the user account can inherit disabled Azure Active
service plans Directory service plans through the employee. If this option is set, the
can be user account inherits disabled service plans through hierarchical roles or
inherited IT Shop requests.
Subscriptions Specifies whether the user account can inherit Azure Active Directory
can be subscriptions through the employee. If this option is set, the user account
inherited inherits Azure Active Directory subscriptions through hierarchical roles or
IT Shop requests.
Administrator Specifies whether the user account can inherit Azure Active Directory
roles can be administrator roles through the employee If this option is set, the user
inherited account inherits administrator roles through hierarchical roles or IT Shop
requests.
Groups can Specifies whether the user account can inherit groups through the linked
be inherited employee. If the option is set, the user account inherits groups through
hierarchical roles, in which the employee is a member, or through IT
Shop requests.
Office 365 NOTE: This property is only available if the Exchange Online Module is
groups can installed.
be inherited
Specifies whether the user account can inherit Office 365 groups through
the linked employee. If the option is set, the user account inherits Office
365 groups through hierarchical roles, in which the employee is a
member, or through IT Shop requests.
For detailed information about Office 365 groups, see the One Identity
Manager Administration Guide for Connecting to Exchange Online.
User account Specifies whether the user account is disabled. If a user account is not
is disabled required for a period of time, you can temporarily disable the user
account by using the "User account is disabled" option.
Related topics
Property Description
Street Street or road. If you have assigned an account definition, the input field is
automatically filled out with respect to the manage level.
State State. If you have assigned an account definition, the input field is
automatically filled out with respect to the manage level.
City City. If you have assigned an account definition, the input field is
automatically filled out with respect to the manage level. Locations can be
automatically generated and employees assigned based on the city.
Zip code Zip code. If you have assigned an account definition, the input field is
automatically filled out with respect to the manage level.
Mobile Mobile number. If you have assigned an account definition, the input field is
phone automatically filled out with respect to the manage level.
Fax Fax number. If you have assigned an account definition, the input field is
automatically filled out with respect to the manage level.
Proxy Other email addresses for the user. You can also add other mail connectors
addresses (for example, CCMail, MS) in addition to the standard address type (SMTP,
X400).
Property Description
Legal age This is used by Enterprise application to determined the legal age
group groups of users. The property is calculated based on the Age group and
Consent for minors properties.
VoIP SIP The instant message voice over IP (VoIP) session initiation protocol
addresses (SIP) addresses for the user.
Property Description
Employee ID of the user within the organization. If you have assigned an account
identifier definition, the input field is automatically filled out with respect to the
manage level.
Company Employee's company. If you have assigned an account definition, the input
field is automatically filled out with respect to the manage level.
Office Office. If you have assigned an account definition, the input field is
automatically filled out with respect to the manage level.
Job Job description. If you have assigned an account definition, the input field is
description automatically filled out with respect to the manage level.
Account Manager responsible for the user account.
manager
To specify an account manager
Property Description
SID of the local Security ID of the local Active Directory user account.
account.
Full domain name Full domain name of the user account's Active Directory domain.
Login name (pre Login name of the Active Directory user account for the previous
Win2000) version of Active Directory.
Related topics
l Displaying Active Directory user accounts for Azure Active Directory user accounts
on page 190
l Recommendations for federations on page 220
1. In the Manager, select the Azure Active Directory > User accounts category.
2. Select the user account in the result list.
3. Select Assign extended properties.
4. In the Add assignments pane, assign extended properties.
TIP: In the Remove assignments pane, you can remove assigned extended
properties.
Scenario:
The user account is linked to employees and is managed through account definitions.
User accounts managed through account definitions are disabled when the employee is
temporarily or permanently disabled. The behavior depends on the user account manage
level. Accounts with the Full managed manage level are disabled depending on the
account definition settings. For user accounts with a manage level, configure the required
behavior using the template in the AADUser.AccountDisabled column.
Scenario:
l If the configuration parameter is set, the employee’s user accounts are disabled
when the employee is permanently or temporarily disabled.
l If the configuration parameter is not set, the employee’s properties do not have any
effect on the associated user accounts.
1. In the Manager, select the Azure Active Directory > User accounts category.
2. Select the user account in the result list.
3. Select the Change main data task.
4. On the General tab, set the Account is disabled option.
5. Save the changes.
Scenario:
1. In the Manager, select the Azure Active Directory > User accounts category.
2. Select the user account in the result list.
3. Select the Change main data task.
4. On the General tab, set the Account is disabled option.
5. Save the changes.
For more information about deactivating and deleting employees and user accounts, see
the One Identity Manager Target System Base Module Administration Guide.
Related topics
1. In the Manager, select the Azure Active Directory > User accounts category.
2. Select the user account in the result list.
3. Click in the result list.
4. Confirm the security prompt with Yes.
1. In the Manager, select the Azure Active Directory > User accounts category.
2. Select the user account in the result list.
3. Click in the result list.
1. In the Manager, select the Azure Active Directory > User accounts category.
2. Select the user account in the result list.
3. Select the Azure Active Directory user account overview task.
Related topics
l Displaying enabled and disabled Azure Active Directory service plans forAzure Active
Directory user accounts and Azure Active Directory groups on page 126
To display the Active Directory user account for an Azure Active Directory
user account
1. In the Manager, select the Azure Active Directory > User accounts category.
2. Select the user account in the result list.
3. Select the Azure Active Directory user account overview task.
The Active Directory user account form element shows which user account is
linked to it.
For more information about Active Directory, see the One Identity Manager Administration
Guide for Connecting to Active Directory.
l Information about the local Active Directory user account on page 186
Group Description
type
Office 365 Office 365 groups are loaded into One Identity Manager by synchronization.
group You can edit Office 365 groups in One Identity Manager but
you can only create new Office 365 groups in One Identity Manager if the
Exchange Online Module in installed. For more information, see the One
Identity Manager Administration Guide for Connecting to Exchange Online.
Distribution Distribution groups are used to send emails to group members. Distribution
group groups are loaded into One Identity Manager by synchronization. You can
edit distribution groups in One Identity Manager but you cannot create them
in One Identity Manager.
Mail- Mail-enabled security groups are security groups that are used as
enabled distribution groups.
security Mail-enabled security groups are loaded into One Identity Manager by
groups synchronization. You can edit mail-enabled security groups in One Identity
Manager but you can only create new mail-enabled security groups in One
Identity Manager if the Exchange Online Module is installed. For more
information, see the One Identity Manager Administration Guide for
Connecting to Exchange Online.
Dynamic Members of a dynamic group are not strictly assigned, but determined
group through defined rules. Dynamic groups are loaded into One Identity
Manager by synchronization. You can change dynamic groups in One
Identity Manager. You cannot create new dynamic groups in One Identity
Manager.
Related topics
1. In the Manager, select the Azure Active Directory > Groups category.
2. Select the group in the result list.
3. Select the Change main data task.
4. On the main data form, edit the main data of the group.
5. Save the changes.
Property Description
Display name The display name is used to display the group in the One Identity Manager
tools user interface.
Proxy Other email addresses for the group. You can also add other mail
addresses connectors (for example, CCMail, MS) in addition to the standard address
type (SMTP, X400).
Use the following syntax to set up other proxy addresses:
Address type: new email address
Group type The type of group. is empty for security and distribution groups. The value
is Unified for Office 365 groups and For dynamic groups, the value
entered is DynamicMembership.
Mail-enabled Specifies whether the email is enabled for the group. If this option is set
IT Shop Specifies whether the group can be requested through the IT Shop. If this
option is set, the group can be requested by the employees through the
Web Portal and distributed with a defined approval process. The group can
still be assigned directly to hierarchical roles.
Only for use Specifies whether the group can only be requested through the IT Shop. If
in IT Shop this option is set, the group can be requested by the employees through
the Web Portal and distributed with a defined approval process. Direct
assignment of the group to hierarchical roles or user accounts is not
permitted.
Service item Service item data for requesting the group through the IT Shop.
Risk index Value for evaluating the risk of assigning the group to user accounts. Set
a value in the range 0 to 1. This input field is only visible if the QER |
CalculateRiskIndex configuration parameter is activated.
For more information about risk assessment, see the One Identity
Manager Risk Assessment Administration Guide.
Read-only Specifies whether the memberships are read-only. The memberships are
memberships regulated by the target system. Manual changes to memberships in One
Identity Manager are not permitted.
Related topics
Property Description
Related topics
l For more information, see Displaying Active Directory groups for Azure Active
Directory groups on page 198.
1. In the Manager, select the Azure Active Directory > Groups category.
2. Select the group in the result list.
3. Select the Assign groups category.
4. Select the Has members tab.
5. Assign child groups in Add assignments.
TIP: In the Remove assignments pane, you can remove the assignment of
groups.
To remove an assignment
l Select the group and double-click .
6. Save the changes.
1. In the Manager, select the Azure Active Directory > Groups category.
2. Select the group in the result list.
3. Select the Assign groups task.
To remove an assignment
l Select the group and double-click .
6. Save the changes.
1. In the Manager, select the Azure Active Directory > Groups category.
2. Select the group in the result list.
3. Select the Assign owner task.
4. Select the table containing the owner from the Table menu at the top of the form.
You have the following options:
l Azure Active Directory user accounts
5. In the Add assignments pane, assign owners.
TIP: In the Remove assignments pane, you can remove assigned owners.
To remove an assignment
l Select the owner and double-click .
6. Save the changes.
1. In the Manager, select the Azure Active Directory > Groups category.
2. Select the group in the result list.
3. Select Assign extended properties.
4. In the Add assignments pane, assign extended properties.
TIP: In the Remove assignments pane, you can remove assigned extended
properties.
To remove an assignment
l Select the extended property and double-click .
5. Save the changes.
To delete a group
1. In the Manager, select the Azure Active Directory > Groups category.
2. Select the group in the result list.
3. Click in the result list.
4. Confirm the security prompt with Yes.
1. In the Manager, select the Azure Active Directory > Groups category.
2. Select the group in the result list.
3. Select the Azure Active Directory group overview task.
Related topics
l Displaying enabled and disabled Azure Active Directory service plans forAzure Active
Directory user accounts and Azure Active Directory groups on page 126
To display the Active Directory group for an Azure Active Directory group
1. In the Manager, select the Azure Active Directory > Groups category.
2. Select the group in the result list.
3. Select the Azure Active Directory group overview task.
The Active Directory group form element shows which group is linked to it.
For more information about Active Directory, see the One Identity Manager Administration
Guide for Connecting to Active Directory.
Related topics
Related topics
1. In the Manager, select the Azure Active Directory > Administrator roles
category.
2. Select the administrator role in the result list.
3. Select the Change main data task.
4. Edit the administrator role's main data.
5. Save the changes.
Property Description
Display The display name is used to display the administrator role in the One
name Identity Manager tools' user interface.
Template ID of the administrator role template on which this administrator role was
ID. based.
IT Shop Specifies whether the administrator role can be requested through the IT
Shop. The administrator role can be ordered by its employees over the Web
Portal and distributed using a defined approval process. The administrator
role can still be assigned directly to user accounts and hierarchical roles.
Only for Specifies whether the administrator role can only be requested through the
use in IT IT Shop. The administrator role can be ordered by its employees over the
Shop Web Portal and distributed using a defined approval process. You cannot
assign an administrator role directly to a hierarchical role.
Service Specifies a service item for requesting the administrator role through the IT
item Shop.
Risk index Value for assessing the risk of assigning administrator roles to user
accounts. Set a value in the range 0 to 1. This input field is only visible if the
QER | CalculateRiskIndex configuration parameter is set.
For more information about risk assessment, see the One Identity Manager
Risk Assessment Administration Guide.
Related topics
1. In the Manager, select the Azure Active Directory > Administrator roles
category.
2. Select the administrator role in the result list.
3. Select the Assign extended properties task.
4. In the Add assignments pane, assign extended properties.
TIP: In the Remove assignments pane, you can remove assigned extended
properties.
To remove an assignment
l Select the extended property and double-click .
5. Save the changes.
1. In the Manager, select the Azure Active Directory > Administrator roles
category.
2. Select the administrator role in the result list.
3. Select the Azure Active Directory administrator role overview task.
Related topics
l Managing Azure Active Directory subscription and Azure Active Directory service plan
assignments on page 122
l Displaying enabled and disabled Azure Active Directory service plans forAzure Active
Directory user accounts and Azure Active Directory groups on page 126
l Editing Azure Active Directory subscription main data on page 202
l Assigning additional properties to Azure Active Directory subscriptions on page 203
l Displaying the Azure Active Directory subscriptions and service plan overview
on page 204
l Synchronizing single objects on page 49
l Disabled Azure Active Directory service plans on page 204
1. In the Manager, select the Azure Active Directory > Subscriptions category.
2. Select an Azure Active Directory subscription in the result list.
3. Select the Change main data task.
4. Edit the Azure Active Directory subscription's main data.
5. Save the changes.
Property Description
SKU display The SKU display name of the Azure Active Directory subscription. For
name example, AAD_Premium or RMSBASIC.
Subscription The Azure Active Directory subscription status, such as enabled (active).
status
IT Shop Specifies whether the Azure Active Directory subscription can be requested
through the IT Shop. This Azure Active Directory subscription can be
requested by staff using the Web Portal and granted through a defined
approval process. The Azure Active Directory subscription can still be
assigned directly to user accounts and hierarchical roles.
Only for use Specifies whether the Azure Active Directory subscription can only be
in IT Shop requested through the IT Shop. This Azure Active Directory subscription
can be requested by staff using the Web Portal and granted through a
defined approval process. The Azure Active Directory subscription may not
be assigned directly to hierarchical roles.
Service Service item data for requesting the Azure Active Directory subscription
item through the IT Shop.
Risk index Value for evaluating the risk of assigning the Azure Active Directory
subscription to Azure Active Directory user accounts. Set a value in the
range 0 to 1. This field is only visible if the QER | CalculateRiskIndex
configuration parameter is set.
For more information about risk assessment, see the One Identity Manager
Risk Assessment Administration Guide.
Category Category for Azure Active Directory subscription inheritance. Azure Active
Directory subscriptions can be selectively inherited by Azure Active
Directory user accounts. To do this, the Azure Active Directory subscrip-
tions the Azure Active Directory user accounts are divided into categories.
Use this menu to allocate one or more categories to the Azure Active
Directory subscription.
Related topics
1. In the Manager, select the Azure Active Directory > Subscriptions category.
2. Select an Azure Active Directory subscription in the result list.
3. Select Assign extended properties.
4. In the Add assignments pane, assign extended properties.
TIP: In the Remove assignments pane, you can remove assigned extended
properties.
To remove an assignment
l Select the extended property and double-click .
5. Save the changes.
1. In the Manager, select the Azure Active Directory > Subscriptions category.
2. Select an Azure Active Directory subscription in the result list.
3. Select the Azure Active Directory subscription overview task.
1. In the Manager, select the Azure Active Directory > Service plans category.
2. Select the Azure Active Directory service plan in the result list.
3. Select the Azure Active Directory service plan overview task.
Related topics
l Displaying enabled and disabled Azure Active Directory service plans forAzure Active
Directory user accounts and Azure Active Directory groups on page 126
Related topics
l Managing Azure Active Directory subscription and Azure Active Directory service plan
assignments on page 122
l Displaying enabled and disabled Azure Active Directory service plans forAzure Active
Directory user accounts and Azure Active Directory groups on page 126
l Editing main data of disabled Azure Active Directory service plans on page 205
1. In the Manager, select the Azure Active Directory > Disabled service
plans category.
2. Select the disabled service plan from the result list.
3. Select the Change main data task.
4. Edit the disabled service plan's main data.
5. Save the changes.
Property Description
IT Shop Specifies whether the service plan can be requested through the IT Shop.
The disabled service plan can be requested by your staff though the Web
Portal and granted through a defined approval process. The disabled
service plan can still be assigned directly to hierarchical roles.
Only for use Specifies whether the disabled service plan can only be requested through
in IT Shop the IT Shop. The disabled service plan can be requested by your staff
though the Web Portal and granted through a defined approval process. The
disabled service plan may not be assigned directly to hierarchical roles.
Service Service item data for requesting the disabled service plan through the IT
item Shop.
Category Categories for disabled service plan inheritance. User accounts can select-
ively inherit disabled Azure Active Directory service plans. To do this,
disabled service plans and Azure Active Directory user accounts are
divided into categories. Use this menu to allocate one or more categories
to the disabled service plan.
1. In the Manager, select the Azure Active Directory > Disabled service
plans category.
2. Select the disabled service plan from the result list.
3. Select Assign extended properties.
4. In the Add assignments pane, assign extended properties.
TIP: In the Remove assignments pane, you can remove assigned extended
properties.
To remove an assignment
l Select the extended property and double-click .
5. Save the changes.
1. In the Manager, select the Azure Active Directory > Disabled service
plans category.
2. Select the disabled service plan from the result list.
3. Select the Disabled Azure Active Directory service plan overview task.
l Displaying enabled and disabled Azure Active Directory service plans forAzure Active
Directory user accounts and Azure Active Directory groups on page 126
1. In the Manager, select the Azure Active Directory > Applications category.
2. In the result list, select the Azure Active Directory application.
3. Select one of the following tasks:
l Azure Active Directory application overview: This shows you an
overview of the Azure Active Directory application and its dependencies.
l Change main data: Shows the Azure Active Directory application's
main data.
l Assign owners: Shows the Azure Active Directory application's owners. You
can assign owners to an application or remove them again.
Related topics
1. In the Manager, select the Azure Active Directory > Applications category.
2. In the result list, select the Azure Active Directory application.
3. Select the Assign owner task.
4. In the Table menu, select the Azure Active Directory user accounts
(AADUser) item.
5. In the Add assignments pane, assign owners.
To remove an assignment
l Select the owner and double-click .
6. Save the changes.
1. In the Manager, select the Azure Active Directory > Applications category.
2. In the result list, select the Azure Active Directory application.
3. Select Change main data.
Property Description
Group Group membership claim expected by the application. Group types that are
membership included in the access, ID, and SAML tokens. Permitted values are:
claim
l None: No group types
l All: All group types
l Security groups: Security groups with the user as a member.
Fallback Specifies whether the fallback application type is a public client, such as an
public client application installed and running on a mobile device. The default value is
false meaning the fallback application type is a confidential client such as a
web application. If the option is disabled, it means that the fallback
application type is a confidential client, such as a web application (default).
Supported Specifies which Microsoft user accounts for the current application are
user supported. Permitted values are:
accounts
l Accounts in this organizational directory only
l Accounts in any organizational directory
l Accounts in any organizational directory and personal Microsoft
accounts
l Only personal Microsoft accounts
Tags User-defined string to use for categorizing and identifying the application.
Related topics
1. In the Manager, select the Azure Active Directory > Service principals
category.
2. In the result list, select the Azure Active Directory service principal.
3. Select one of the following tasks:
l Azure Active Directory service principal overview: This shows you an
overview of the Azure Active Directory service principal and its dependencies.
l Change main data: This displays the Azure Active Directory service
principal's main data.
l Assign owners: This displays the Azure Active Directory service principals
owners. You can assign owners to a service principal or remove them.
l Assign authorizations: This displays user accounts, groups, and service
principals with their assigned app roles. You can create more authorizations or
removed them.
Related topics
1. In the Manager, select the Azure Active Directory > Service principals
category.
2. In the result list, select the Azure Active Directory service principal.
3. Select the Assign owner task.
4. In the Table menu, select the Azure Active Directory user accounts
(AADUser) item.
5. In the Add assignments pane, assign owners.
TIP: In the Remove assignments pane, you can remove assigned owners.
1. In the Manager, select the Azure Active Directory > Service principals
category.
2. In the result list, select the Azure Active Directory service principal.
3. Select the Assign authorizations task.
4. In the Assignments pane, click Add and enter the following data.
l Authorized for: Specify the user account, group, or service principal for the
authorization.
a. Click next to the field.
b. Under Table, select one of the following tables:
l To authorize a user account, select AADUser.
l To authorize a group, select AADGroup.
l To authorize a service principal, select AADServicePrincipal.
c. Under Authorized for, select the user account, group, or service
principal.
d. Click OK.
l App role: Select the app role for the authorization.
NOTE: If there is no app role defined for a service principal, leave this item
empty to authorize the user account, group, or service principal.
5. Save the changes.
1. In the Manager, select the Azure Active Directory > Service principals
category.
2. In the result list, select the Azure Active Directory service principal.
3. Select the Assign authorizations task.
4. In the Assignments pane, select the authorization you want to remove.
5. Click Remove.
6. Save the changes.
1. In the Manager, select the Azure Active Directory > Service principals
category.
2. In the result list, select the Azure Active Directory service principal.
3. Select the Change main data task.
Table 39: General main data for an Azure Active Directory service principal
Property Description
Alternative Alternative names for the service principal. This is used to call service
names principals by subscription, to identify resource groups and full resource IDs
for managing identities.
Web page Home page of the Azure Active Directory application.
App role Specifies whether users or other service principals must be assigned an app
assignment role for this service principal before they can login or obtain application
required tokens.
Login URL URL that the identity provider uses to reroute the user to Azure Active
Directory for authentication.
Logout URL URL that the Microsoft authorization service uses to log out a user using
OPENID Connect front channel, OpenID Connect back-channel, or SAML
logout protocols.
Notification List of email addresses that Azure Active Directory sends a notification to if
mail the active certificate is nearing the expiration date.
addresses
Preferred Single sign-on mode configured for this Azure Active Directory application.
single sign-
on mode
Reply URLs URLs that user tokens are sent to for logging in with the associated
application, or the redirect URIs that OAuth 2.0 authorization codes and
access tokens are sent to for the associated application.
Service Contains the list of URIs that identify the associated Azure Active Directory
principal application within its Azure Active Directory tenant, or within a verified
names custom domain, if the Azure Active Directory application is an Azure Active
Directory multi-tenant.
Tags User-defined string to use for categorizing and identifying the application.
Related topics
l Azure Active Directory policies for home realm discovery on page 174
Show overview User account This report shows an overview of the user account
and the assigned permissions.
Show overview User account This report shows an overview of the user account
including origin and origin of the assigned permissions.
Show overview User account This report shows an overview of the user accounts
including history including its history.
Select the end date for displaying the history (Min.
date). Older changes and assignments that were
removed before this date, are not shown in the
report.
License overview User account The report contains a summary of assigned and
effective subscriptions and service plans for a user
account.
Overview of all group This report finds all roles containing employees
assignments who have the selected system entitlement.
Subscription
Administrator
role
Show overview group This report shows an overview of the system entitle-
ment and its assignments.
Show overview group This report shows an overview of the system entitle-
including origin ment and origin of the assigned user accounts.
Show overview group This report shows an overview of the system entitle-
including history ment and including its history.
Select the end date for displaying the history (Min.
date). Older changes and assignments that were
removed before this date, are not shown in the
report.
Show entitlement Tenant This report shows all system entitlements that are
drifts the result of manual operations in the target
system rather than provisioned by One Identity
Manager.
Show user accounts Tenant This report returns all the user accounts with their
overview (incl. permissions including a history.
history)
Select the end date for displaying the history (Min.
date). Older changes and assignments that were
removed before this date, are not shown in the
report.
Show user accounts Tenant This report contains all user accounts with an above
with an above average number of system entitlements.
average number of
system entitlements
Show employees Tenant This report shows all the employees that have
with multiple user multiple user accounts. The report contains a risk
accounts assessment.
Show system Tenant This report shows the system entitlements with the
entitlements assigned user accounts including a history.
overview (incl.
Select the end date for displaying the history (Min.
history)
Overview of all Tenant This report finds all roles containing employees
assignments with at least one user account in the selected target
system.
Show unused user Tenant This report contains all user accounts, which have
accounts not been used in the last few months.
Show orphaned user Tenant This report shows all user accounts to which no
accounts employee is assigned.
Report Description
Azure Active Directory This report contains a summary of user account and group
user account and group distribution in all tenants. You can find this report in the My
administration One Identity Manager category.
Data quality summary This report contains different evaluations of user account data
for Azure Active quality in all tenants. You can find this report in the My One
Directory user accounts Identity Manager category.
One Identity Manager enables its users to perform various tasks simply using a Web Portal.
For detailed information about the named topics, see Managing Azure Active Directory user
accounts and employees on page 55, Managing memberships in Azure Active Directory
groups on page 93, Managing Azure Active Directory administrator roles assignments on
page 111, Managing Azure Active Directory subscription and Azure Active Directory service
plan assignments on page 122 and in refer to the following guides:
In a federation, the local Active Directory user accounts are connected to Azure Active
Directory user accounts. The connection is established by using the ms-ds-
consistencyGUID property in the Active Directory user account and the immutable property
in the Azure Active Directory user account. Synchronization of Active Directory and
Azure Active Directory user accounts is carried out in the federation by Azure AD
Connect. For more information about Azure AD Connect, see the Azure Active Directory
documentation from Microsoft.
One Identity Manager maps the connection using the Active Directory user account's Azure
AD Connect anchor ID (ADSAccount.MSDsConsistencyGuid) and the Azure Active Directory
user account's immutable identifier (AADUser.OnPremImmutableId).
Some of the target system relevant properties of Azure Active Directory user accounts that
are linked to local Active Directory user account cannot be changed in One Identity
Manager. However, assignment of permissions to Azure Active Directory user accounts in
One Identity Manager is possible.
Assignments to Azure Active Directory groups that are synchronized with the local Active
Directory are not allowed in One Identity Manager. These groups cannot be requested
through the web portal. You can only manage these groups in your locally. For more
information, see the Azure Active Directory documentation from Microsoft.
The One Identity Manager supports the following scenarios for federations.
Scenario 1
1. Active Directory user accounts are created in One Identity Manager and provisioned
the local Active Directory environment.
2. Azure AD Connect creates the Azure Active Directory user accounts in Azure Active
Directory tenants.
3. Azure Active Directory synchronization loads the Azure Active Directory user
accounts in to One Identity Manager.
Scenario 2
1. Active Directory user accounts and Azure Active Directory user accounts are created
in One Identity Manager.
In this case, the connection is established by using the
ADSAccount.MSDsConsistencyGuid and AADUser.OnPremImmutableId columns. This can be
carried using custom scripts or custom templates.
2. Active Directory and Azure Active Directory user accounts are provisioned
independently in their own target systems.
3. Azure AD Connect detects the connection between the user accounts, establishes the
connection in the federation and updates the required properties.
4. The next Azure Active Directory synchronization updates the Azure Active Directory
user accounts in One Identity Manager.
With this scenario, the Azure Active Directory user accounts are immediately available in
One Identity Manager and can be issued their permissions.
NOTE:
l If you work with account definitions, it is recommended you enter the account
definition for Active Directory as a required account definition in the account
definition for Azure Active Directory.
l If you work with account definitions, it is recommended you select the Only
initially value for the IT operating data overwrites property in the manage
level. Then the data is only determined in the initial case.
l Do not post-process Azure Active Directory user accounts using templates because
certain target system relevant properties cannot be edited and the following
errors may occur:
[Exception]: ServiceException occured
Code: Request_BadRequest
Message: Unable to update the specified properties for on-premises
mastered Directory Sync objects or objects currently undergoing
migration.
[ServiceException]: Code: Request_BadRequest - Message: Unable to update
the specified properties for on-premises mastered Directory Sync objects
or objects currently undergoing migration.
l Information about the local Active Directory user account on page 186
l Account definitions for Azure Active Directory user accounts on page 56
l Main data for an account definition on page 58
To manage an Azure Active Directory environment in One Identity Manager, the following
basic data is relevant.
User Tasks
objects.
l Authorize other employees within their area of responsibility as
target system managers and create child application roles if
required.
Related topics
l In the Designer, create an entry for the Job server in the Base Data > Installation
> Job server category. For more information about this, see the One Identity
Manager Configuration Guide.
l In the Manager, select an entry for the Job server in the Azure Active Directory >
Basic configuration data > Server category and edit the Job server main data.
Use this task if the Job server has already been declared in One Identity Manager and
you want to configure special functions for the Job server.
NOTE: One Identity Manager must be installed, configured, and started in order for a
server to perform its function in the One Identity Manager Service network. Proceed as
described in the One Identity Manager Installation Guide.
1. In the Manager, select the Azure Active Directory > Basic configuration data
> Server category.
2. Select the Job server entry in the result list.
3. Select the Change main data task.
4. Edit the Job server's main data.
Property Meaning
Copy Permitted copying methods that can be used when this server is the source of
process a copy action. At present, only copy methods that support the Robocopy and
(source rsync programs are supported.
server)
Copy Permitted copying methods that can be used when this server is the destin-
process ation of a copy action.
(target
server)
Coding Character set coding that is used to write files to the server.
Executing Name of the executing server. The name of the server that exists physically
server and where the processes are handled.
This input is evaluated when the One Identity Manager Service is automat-
ically updated. If the server is handling several queues, the process steps are
not supplied until all the queues that are being processed on the same server
have completed their automatic update.
Queue Name of the queue to handle the process steps. The process steps are
requested by the Job queue using this queue identifier. The queue identifier is
entered in the One Identity Manager Service configuration file.
Server Operating system of the server. This input is required to resolve the path
operating name for replicating software profiles. The values Win32, Windows, Linux,
system and Unix are permitted. If no value is specified, Win32 is used.
Service One Identity Manager Service user account information. In order to replicate
account between non-trusted systems (non-trusted domains, Linux server), the One
data Identity Manager Service user information has to be declared for the servers
in the database. This means that the service account, the service account
domain, and the service account password have to be entered for the server.
One Specifies whether a One Identity Manager Service is installed on this server.
Identity This option is enabled by the QBM_PJobQueueLoad procedure the moment the
Manager queue is called for the first time.
Service
The option is not automatically removed. If necessary, you can reset this
installed
option manually for servers whose queue is no longer enabled.
Stop One Specifies whether the One Identity Manager Service has stopped. If this
Identity option is set for the Job server, the One Identity Manager Service does not
Manager process any more tasks.
Service You can make the service start and stop with the appropriate administrative
permissions in the Job Queue Info program. For more information, see the
One Identity Manager Process Monitoring and Troubleshooting Guide.
Related topics
Azure Active Server on which the Azure Active Directory connector is installed.
Directory This server synchronizes the Azure Active Directory target system.
connector (via
Microsoft Graph)
CSV connector Server on which the CSV connector for synchronization is installed.
Domain The Active Directory domain controller. Servers that are not labeled
controller as domain controllers are considered to be member servers.
Generic server Server for generic synchronization with a custom target system.
Home server Server for adding home directories for user accounts.
Update server This server automatically updates the software on all the other
servers. The server requires a direct connection to the database
server that One Identity Manager database is installed on. It can run
SQL tasks.
The server with the One Identity Manager database installed on it is
labeled with this functionality during initial installation of the schema.
SQL processing It can run SQL tasks. The server requires a direct connection to the
server database server that One Identity Manager database is installed on.
Several SQL processing servers can be set up to spread the load of
SQL processes. The system distributes the generated SQL processes
throughout all the Job servers with this server function.
CSV script server This server can process CSV files using the ScriptComponent process
component.
One Identity Server on which the One Identity Manager connector is installed. This
Manager server synchronizes the One Identity Manager target system.
database
connector
Profile server Server for setting up profile directories for user accounts.
SMTP host Server from which One Identity Manager Service sends email
notifications. Prerequisite for sending mails using One Identity
Manager Service is SMTP host configuration.
Windows The server can run Windows PowerShell version 3.0 or later.
PowerShell
connector
Related topics
Appendix : Troubleshooting
An error occurs when loading the Azure Active Directory user accounts:
[Exception]: ServiceException occured
Code: BadRequest
Message: Tenant does not have a SPO license.
[ServiceException]: Code: BadRequest - Message: Tenant does not have a SPO license.
Cause
An Azure Active Directory tenant is synchronized that does not have a license for the
SharePoint Online service.
Possible solutions
l Ensure the Azure Active Directory tenant has a license that includes the SharePoint
Online service. (Recommended)
l If you want to synchronize an Azure Active Directory tenant that does not have a
license for the SharePoint Online service, change the synchronization project with
the Synchronization Editor.
In Users mapping, disable the property mapping rules for the following schema
properties. To do this, set the mapping direction to the Do not map.
l BirthDay
l PreferedName
The following configuration parameters are available in One Identity Manager after the
module has been installed.
Configuration Description
parameter
TargetSystem | Mail template name that is sent to supply users with the login
AzureAD | Accounts | credentials for the user account. The Employee - new user
InitialRandomPassword account created mail template is used.
| SendTo |
MailTemplateAccountNa
me
TargetSystem | Mail template name that is sent to supply users with the initial
AzureAD | Accounts | password. The Employee - initial password for new user
InitialRandomPassword account mail template is used.
| SendTo |
MailTemplatePassword
TargetSystem | Directory where the delta token files for the delta
AzureAD | synchronization are stored.
DeltaTokenDirectory
QER | ITShop | List of all Azure Active Directory groups that must not be
AutoPublish | AADGroup automatically assigned to the IT Shop. Each entry is part of a
| ExcludeList regular search pattern and supports regular expression
notation.
Example:
.*Administrator.*|Exchange.*|.*Admins|.*Operators|IIS_IUSRS
QER | ITShop | AutoPub- List of all Azure Active Directory subscriptions that must not be
lish | AADSubSku | automatically assigned to the IT Shop. Each entry is part of a
ExcludeList regular search pattern and supports regular expression
notation.
QER | ITShop | AutoPub- List of all Azure Active Directory service plans that must not be
lish | AADDeniedSer- automatically assigned to the IT Shop. Each entry is part of a
vicePlan | ExcludeList regular search pattern and supports regular expression
notation.
A default project template ensures that all required information is added in One Identity
Manager. This includes mappings, workflows, and the synchronization base object. If you
do not use a default project template you must declare the synchronization base object in
One Identity Manager yourself.
Use a default project template for initially setting up the synchronization project. For
custom implementations, you can extend the synchronization project with the
Synchronization Editor.
The project template uses mappings for the following schema types.
DirectoryRole AADDirectoryRole
Group AADGroup
LicenseAssignments AADUserHasSubSku
GroupLicenseAssignments AADGroupHasSubSku
Organization AADOrganization
ServicePlanInfo AADServicePlan
SubscribedSku AADSubSku
User AADUser
VerifiedDomain AADVerifiedDomain
Application AADApplication
AppRole AADAppRole
AppRoleAssignment AADAppRoleAssignment
ServicePrincipal AADServicePrincipal
ActivityBasedTimeoutPolicy AADActivityBasedTimeoutPolicy
HomeRealmDiscoveryPolicy AADHomeRealmDiscoveryPolicy
TokenIssuancePolicy AADTokenIssuancePolicy
TokenLifetimePolicy AADTokenLifetimePolicy
The following table describes permitted editing methods of Azure Active Directory schema
types and names restrictions required by system object processing.
The following settings are configured for the system connection with the Azure Active
Directory connector.
Setting Meaning
User name User account name for logging in on Azure Active Directory
if you have integrated One Identity Manager as a native
client application in for Azure Active Directory tenant.
Variable: CP_Username
Variable: GuestInviteSendMail
GuestInviteRedirectUrl URL to reroute guest users after they have accepted the
invitation and registered.
Default: http://www.office.com
Variable: GuestInviteRedirectUrl
About us
One Identity solutions eliminate the complexities and time-consuming processes often
required to govern identities, manage privileged accounts and control access. Our solutions
enhance business agility while addressing your IAM challenges with on-premises, cloud and
hybrid environments.
Contacting us
For sales and other inquiries, such as licensing, support, and renewals, visit
https://www.oneidentity.com/company/contact-us.aspx.