ActiveRoles 7.3 Product Overview Guide
ActiveRoles 7.3 Product Overview Guide
One Identity Active Roles 7.3
Product Overview Guide
Copyright 2018 One Identity LLC.
ALL RIGHTS RESERVED.
This guide contains proprietary information protected by copyright. The software described in this guide
is furnished under a software license or nondisclosure agreement. This software may be used or copied
only in accordance with the terms of the applicable agreement. No part of this guide may be reproduced
or transmitted in any form or by any means, electronic or mechanical, including photocopying and
recording for any purpose other than the purchaser’s personal use without the written permission of
One Identity LLC .
The information in this document is provided in connection with One Identity products. No license,
express or implied, by estoppel or otherwise, to any intellectual property right is granted by this
document or in connection with the sale of One Identity LLC products. EXCEPT AS SET FORTH IN THE
TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT,
ONE IDENTITY ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR
STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-
INFRINGEMENT. IN NO EVENT SHALL ONE IDENTITY BE LIABLE FOR ANY DIRECT, INDIRECT,
CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT
LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF
INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF
ONE IDENTITY HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. One Identity make no
representations or warranties with respect to the accuracy or completeness of the contents of this
document and reserves the right to make changes to specifications and product descriptions at any
time without notice. One Identity do not make any commitment to update the information contained
in this document.
If you have any questions regarding your potential use of this material, contact:
One Identity LLC.
Attn: LEGAL Dept
4 Polaris Way
Aliso Viejo, CA 92656
Refer to our Web site (http://www.OneIdentity.com) for regional and international office information.
Patents
One Identity is proud of our advanced technology. Patents and pending patents may apply to this
product. For the most current information about applicable patents for this product, please visit our
website at http://www.OneIdentity.com/legal/patents.aspx.
Trademarks
One Identity and the One Identity logo are trademarks and registered trademarks of One Identity
LLC. in the U.S.A. and other countries. For a complete list of One Identity trademarks, please visit
our website at www.OneIdentity.com/legal. All other trademarks are the property of their
respective owners.
Legend
IMPORTANT, NOTE, TIP, MOBILE, or VIDEO: An information icon indicates supporting
information.
Active Roles Product Overview Guide
Updated - June 2018
Version - 7.3
Contents
Preface 1
Summary 2
Examples of use 3
Distributing administration 3
Solution 3
Integrating with other systems 3
Solution 4
Managing a multi-forest Active Directory design 4
Solution 5
Simplifying Active Directory structure 5
Solution 5
Handling organizational changes 6
Solution 6
User Account Management 6
Solution 6
Technical overview 12
Presentation components 13
Active Roles console (MMC Interface) 13
Web Interface 13
About us 28
Contacting us 28
Technical support resources 28
Active Roles simplifies and streamlines creation and ongoing management of user accounts
and groups in Windows Active Directory (AD) centric environments by automating user and
group account creation in AD, mailbox creation in Exchange, group population, and
resource assignment in Windows. It provides strictly enforced security, rich capabilities for
automating directory management tasks, change approval and easy-to-use Web
interfaces, to achieve practical user and group account management for the Windows
enterprise.
Active Roles offers point-and-click modular configuration for easy deployments, along
with rules and a delegated administration model to ensure correct access and tight
security. A multi-level approval workflow, easy-to-use Web interfaces, and integration
points reduce costs associated with user and group account management, with no custom
coding required.
This document is designed for IT managers, network administrators, operations managers,
and security managers who are evaluating Active Roles and want to learn how it works.
The document examines:
l Active Roles features and benefits
l The system’s components and architecture
l Access Templates, Policy Objects, and Managed Units
l Support for Active Directory security management
l Customization with the Active Roles ADSI Provider and support for scripting
l Rule-based management of group membership lists
l Operation of Active Roles in multi-forest environments
l Capabilities of the Active Roles Web Interface
l Example scenarios in which Active Roles might be used
Active Roles (formerly known as ActiveRoles®), delivers a reliable, policy-based
administration and provisioning solution, allowing enterprises to fully benefit from Active
Directory and Microsoft Exchange deployment.
One of the most valuable features of the product is the ability to automate provisioning
tasks on directory objects in compliance with corporate administrative policies in corporate
Active Directory and Exchange environments.
Active Roles provides consistent enforcement of corporate policies, a role-based
administrative model, and flexible, rule-based administrative views, creating a reliable
and secure environment for distributed administration and account provisioning.
Active Roles can be configured to provide a wide range of directory management solutions,
allowing organizations to create more secure, productive, and manageable Active
Directory and Microsoft Exchange environments. This section highlights how Active Roles
helps to address the challenges faced by enterprises today.
Distributing administration
Suppose a large company wants to introduce distributed administration, but wants to avoid
the large costs involved in training their Help Desk and business units to correctly use
complex administrative tools. In this situation, there is the need for an easy-to-use tool, to
control what actions the Help Desk and business units can perform, and to enforce
company policies and procedures.
Solution
Active Roles allows organizations to create Managed Units and to designate Trustees over
those Managed Units. Trustees only see the objects to which they have access. They are
given only the rights they need for the objects within these Managed Units, down to
individual properties. Unlike native Active Directory organizational units, Managed Units
provide virtual boundaries that span across domains and forests, offering more flexible
delegation capabilities.
Delegating limited control over Managed Units efficiently eliminates the need for high-level
administrative user ID's, allowing organizations to securely distribute administrative
authority to local management. To improve network security and make distributed
administration safe, Active Roles defines and enforces customizable administrative polices.
Active Roles allows organizations to safely implement administration for business units. If
a company has a number of different business units, each of equal importance and each
located in a separate office, a single network administrator could support all of the sites.
Active Roles allows the company to create a single Managed Unit, giving an administrator
control over users and resources that span multiple domains.
Solution
With Active Roles, a suitable property set can be established to include data from network
data sources other than Active Directory. For instance, a property set might be configured
to retrieve a user’s personal information from an HR database. When the user account is
created, this data could then be passed to Active Directory and Microsoft Exchange. If
these property values change, an update could be made to both Active Directory and to
the HR system.
Active Roles also provides the ability to set up administrative policies that reduce the
amount of input required to carry out a task. For example, when a user moves to a
different location, Active Roles could automatically update the user's profile in the HR
system, based only on the change to the user's site code or department in Active Directory.
Additionally, when a user joins or leaves the company, their access card could
automatically be enabled or disabled.
Solution
In Active Roles, Managed Units allow organizations to achieve acceptable security
boundaries without setting up extra domains or organizational units. This significantly
simplifies the Active Directory structure and reduces security risks.
By using Managed Units for delegation purposes, Active Roles creates a rule-based overlay
of Active Directory for administration. This simplifies the process of choosing an Active
Directory structure. Different administrative tasks often require different OU structures.
For instance, an OU structure designed purely for the delegation of administration differs
from an OU structure shaped purely for Group Policy. It becomes much easier to design an
Active Directory structure by using Managed Units to handle delegation issues.
Solution
Active Roles provides the ability to define administrative policies that make organizational
changes easier to handle. By using Managed Units, rule-based overlays of the actual data
in Active Directory can be set up for both the current and planned organizational structures.
Administrative policies can be specified so that when data moves from one Managed Unit to
another, policy definitions will automatically be applied, based on the change. This will
update properties, such as the user’s manager, department, group memberships, and OU
memberships.
As another example, consider a user who changes departments. Depending on the
department to which the user moves, Active Roles could automatically move the user's
data, change the user's group memberships, and specify to whom the user reports.
Solution
Active Roles offers a reliable solution to simplify and safely distribute user account
management. It addresses the need to create and manage a large number of user
accounts, and to ensure that each user can only access their own resources. By
implementing an administrative model based on business rules, Active Roles allows
domain-level administrators to easily establish and maintain very tight security, while
facilitating the provisioning of new users with the appropriate access to IT resources
The Active Roles Web Interface is a customizable Web-based application that facilitates
administration, while taking full advantage of Active Roles’ security, workflow integration,
and reporting benefits. To help distribute administrative tasks, the Web Interface allows
you to configure multiple Web sites with individual sets of user interface elements. Each
Web site can be customized to meet specific business and organizational needs.
Key features
Key features of the Web Interface include the following.
Point-and-click customization
It is straightforward to configure the user interface. Administrators can set up a suitable
set of user interface elements without writing a single line of code. Administrators can add
and remove commands or entire menus, assign tasks and forms to commands, modify
forms used to perform tasks, and create new commands, tasks, and forms. All
configuration settings are saved in a persistent storage so that the Web Interface users are
always presented with the properly configured interfaces that suite their roles.
Each Web site configuration template provides an individual set of commands installed by
default. The Web site can be customized by adding or removing commands, and by
modifying Web pages (forms) associated with commands.
Although the Web Interface dynamically adapts to roles assigned to users, the ability to
tailor separate Web sites to individual roles gives increased flexibility to the customer. It
helps streamline the workflow of directory administrators and help-desk personnel. Static
configuration of interface elements ensures that Web Interface users have access to the
specific commands and pages needed to perform their duties.
l Services Start or stop a service, view or modify properties of a service.
l Network File Shares Create a file share, view or modify properties of a file share,
stop sharing a folder.
l Logical Printers Pause, resume or cancel printing, list documents being printed,
view or modify properties of a printer.
l Documents being printed (print jobs) Pause, resume, cancel or restart printing
of a document, view or modify properties of a document being printed.
l Local groups Create or delete a group, add or remove members from a group,
rename a group, view or modify properties of a group.
l Local users Create or delete a local user account, set a password for a local
user account, rename a local user account, view or modify properties of a local
user account.
l Devices View or modify properties of a logical device, start or stop a logical device.
Active Roles provides a comprehensive set of Access Templates that are available out of
the box for delegating computer management tasks. By applying Access Templates of the
“Computer Resources” category to a computer account, the rights of delegated
administrators can be specified on the corresponding computer’s resources.
Delegated administrators should use the Web Interface rather than the Active Roles
console (MMC Interface) to manage computer resources. Although the console provides
certain tools for computer resources management, the console user needs the native
administrator rights on the computer in order to use those tools. The rights specified
Active Roles divides the workload of directory administration and provisioning into
three functional layers—presentation components, service components, and network
data sources.
The presentation components include client interfaces for the Windows platform and the
Web, which allow regular users to perform a precisely defined set of administrative
activities. The reporting solution facilitates automated generation of reports on
management activities.
The service components constitute a secure layer between administrators and managed
data sources. This layer ensures consistent policy enforcement, provides advanced
automation capabilities, and enables the integration of business processes for
administration of Active Directory, Microsoft Exchange, and other corporate data sources.
The Administration Database stores information about all permission and policy settings,
and other data related to the Active Roles configuration.
On a very high level, the Active Roles components work together as follows to manipulate
directory data:
1. An administrator uses the MMC interface or Web interface to access Active Roles.
2. The administrator submits an operation request, such as a query or data change to
the Administration Service.
3. On receipt of the operation request, the Administration Service checks whether the
administrator has sufficient permissions to perform the requested operation
(access check).
4. The Administration Service ensures that the requested operation does not violate the
corporate policies (policy enforcement).
Let us examine the three component layers.
Presentation components
The presentation components include user interfaces to serve a variety of needs. The
user interfaces accept commands, display communication, and give results in a clear,
concise fashion.
Web Interface
Via the Web interface, intranet users with sufficient administrative rights can connect to
Active Roles to perform basic administrative tasks, such as modifying user data or adding
users to groups. The Web interface provides departmental and help-desk personnel with
the administrative capabilities they need.
Custom Interfaces
In addition to the MMC and Web interfaces, Active Roles enables the development of
custom interfaces that use the Active Roles ADSI Provider to access the features of Active
Roles. Administrators familiar with scripting and programming can create custom
interfaces to meet specific needs of the network administration.
Reporting
Active Roles offers comprehensive reporting to monitor administrative actions, corporate
policy compliance, and the state of directory objects. The Active Roles reporting solution
includes Data Collector and Report Pack.
Report Pack provides report definitions for creating reports based on the data gathered by
Data Collector. Active Roles comes with an extensive suite of report definitions that cover
all administrative actions available in this product.
Report Pack is deployed on Microsoft SQL Server Reporting Services (SSRS). You can
use the tools included with SSRS to view, save, print, publish, and schedule Active
Roles reports.
Data Collector is used to gather data required for reporting. The Data Collector Wizard
allows you to configure and schedule data collection jobs.
Once configured, Data Collector retrieves data from various sources, accessing them via
the Active Roles Administration Service, and stores the data in a SQL Server database.
Data Collector also provides a means for managing the gathered data, including the ability
to export or delete obsolete data.
Service components
At the core of Active Roles lies the Administration Service. It features advanced delegation
capabilities and ensures the reliable enforcement of administrative policies that keep data
current and accurate. The Administration Service acts as a bridge between the presentation
components and network data sources. In large networks, multiple Administration Services
can be deployed to improve performance and ensure fault tolerance.
Configuration database
The Administration Service uses the configuration database to store configuration data. The
configuration data includes definitions of objects specific to Active Roles, assignments of
administrative roles and policies, and procedures used to enforce policies. The
configuration database is only used to store Active Roles configuration data. It does not
store copies of the objects that reside in the managed data sources, nor is it used as an
object data cache.
Active Roles uses Microsoft SQL Server to host the configuration database. The replication
capabilities of SQL Server facilitate implementation of multiple equivalent configuration
databases used by different Administration Services.
Audit trail
The data processing component provides a complete audit trail by creating records in the
event log on the computer running the Administration Service. The log shows all actions
performed and by whom, including actions that were not permitted. The log entries display
the success or failure of each action, as well as which attributes were changed.
Active Roles is designed to help with the use and management of these data sources.
Directory administrators can define and enforce business rules and policies to ensure that
the data in the managed data sources remains current and accurate.
With Active Roles, you can utilize the information stores from a wide variety of data
sources in your network, such as human resource data or inventories. You can use scripting
to integrate these important data sources. This reduces the duplication of work, reduces
data pollution, and allows for the validation of information that is often stored in more than
one database.
Active Roles makes it possible for a custom script to receive control upon a request to
perform an administrative operation, such as object creation, modification, or deletion.
Custom scripts can be invoked through Policy Objects, which Active Roles uses to enforce
corporate rules. For example, you could implement a Policy Object containing a custom
script that will receive control whenever Active Roles is requested to create a user object in
a certain OU.
The Policy Object could be configured so that Active Roles continues with the user creation
only after a certain piece of the script (the pre-create event handler) has successfully
executed. In this way, the script prohibits the creation of user objects whose properties
violate corporate rules. It prevents the population of object properties with values taken
from external data sources, and generates default property values in accordance with the
corporate rules.
The Policy Object may also be configured to pass control to another piece of the script (the
post-create event handler) immediately after a user object is successfully created. This
enables the script to trigger additional actions, required by corporate rules, after the object
has been created. For example, it can update external data stores, provision the user with
access to resources, and notify that the user object has been created.
l Access Templates
l Policy Objects
l Managed Units
l Administrative views (Managed Units)
l Active Directory containers
l Individual (leaf) directory objects
Policy Objects define the behavior of the system when directory objects are created,
modified, moved, or deleted. Policies are enforced regardless of a Trustee’s permissions.
A Policy Object includes stored policy procedures and specifications of events that activate
each procedure. Based on policy requirements, a policy procedure could:
l Validate specific property values
l Allow or deny entire operations
l Trigger additional actions
A Policy Object associates specific events with its policy procedures, which can be built-in
procedures or custom scripts. This provides an easy way to implement sophisticated
validation criteria, synchronize different data sources, and combine a number of
administrative tasks into a single batch.
l Represents a collection of objects (one object can belong to more than one
Managed Unit)
l Supports rule-based specifications for its members (a Managed Unit only holds
objects that satisfy the membership rules specified for the Managed Unit)
l Can hold directory objects that reside in different organizational units, domains,
forests, and other Managed Units
Active Roles ensures that permission and policy settings specified for a Managed Unit are
inherited by all objects that belong to that Managed Unit. When a directory container
belongs to a Managed Unit, all child objects in that container inherit the permission and
The following list shows some of the ways in which the product can be
customized:
l Using the Active Roles ADSI Provider, the existing proprietary applications or custom
Web-based interfaces could communicate with Active Roles to perform
administration and provisioning tasks on user accounts and groups.
l Using policy scripts, custom corporate rules could be enforced to regulate data
format and administrative workflows.
l Using policy scripts, the data stored in an HR database or ERP system could be
incorporated into the administration and provision of users.
Active Roles makes it possible for user-developed scripts and applications to manipulate
directory objects through the Administration Service (persistent objects), and to take
control of objects that are in the process of being created, modified, or deleted with Active
Roles (in-process objects).
Having programmatic access to persistent and in-process objects makes it easy for
developers to customize Active Roles in these two areas:
l Creating custom applications and user interfaces
l Enforcing corporate administrative policies by running custom scripts (script policies)
Once configured, the custom script-based policies are enforced without user interaction.
Active Roles automatically handles the execution of policy scripts that supplement
particular administrative operations and trigger additional administrative actions. For
example, policy scripts can be used to:
l Perform a sophisticated validity check on input data
l Synchronously change information in multiple data sources, such as the Active
Directory store, Microsoft Exchange server, and HR or ERP-system database
l Ensure that delegated administrators follow a prescribed administrative workflow
l Link multiple administrative tasks into one operator transaction
Dynamic groups
Active Roles helps streamline group maintenance by defining group membership
dynamically, with rule-based membership criteria. Dynamic group membership eliminates
the need to manually update membership lists for security and distribution groups.
l Rule-based mechanism that automatically adds and removes objects to groups
whenever object attributes change in Active Directory
l Flexible membership criteria that enable both query-based and static
population of groups
The membership criteria fall into these categories:
These membership criteria are also applicable to Managed Units.
Workflows
Active Roles provides a rich workflow system for directory data management automation
and integration. Based on Microsoft’s Windows Workflow Foundation technology, this
workflow system enables IT to define, automate and enforce management rules quickly
and easily. Workflows extend the capabilities of Active Roles by delivering a framework
that enables combining versatile management rules such as provisioning and de-
provisioning of identity information in the directory, enforcement of policy rules on
changes to identity data, routing data changes for approval, e-mail notifications of
particular events and conditions, as well as the ability to implement custom actions using
script technologies such as Microsoft Windows PowerShell or VBScript.
Suppose you need to provision user accounts based on data from external systems. The
data is retrieved and then conveyed to the directory by using feed services that work in
conjunction with Active Roles. A workflow can be created to coordinate the operations in
account provisioning. For example, different rules can be applied for creating or updating
accounts held in different containers.
Workflows may also include approval rules that require certain changes to be authorized
by designated persons (approvers). When designing an approval workflow, the
administrator specifies which kind of operation causes the workflow to start, and adds
approval rules to the workflow. The approval rules determine who is authorized to
approve the operation, the required sequence of approvals, and who needs to be notified
of approval tasks or decisions.
By delivering e-mail notifications, workflows extend the reach of management process
automation throughout the enterprise. Notification activities in a workflow let people be
l Centralized management of directory data in domains that belong to different forests
l Administrative views spanning forest boundaries
l The ability to delegate administrative control of directory data where appropriate,
without regard to forest boundaries
l Policy-based control and automation of directory data management across
forest boundaries
By registering Active Directory domains with Active Roles, you form a collection of
managed domains that represents an Active Roles security and administrative boundary in
Active Directory. The collection need not be restricted to domains from a single forest.
Rather, you can register domains from any forest in your environment, configuring the
Active Roles Administration Service to use the appropriate administrative credentials on a
per-domain basis.
To centralize management of directory data across the managed domains, Active Roles
retrieves and consolidates the Active Directory schema definitions from all forests to which
those domains belong. The consolidated schema description is stored in the Active Roles
configuration database, and contains information about the object classes and the
attributes of the object classes that can be stored in the managed domains. By using the
Active Roles provides out-of-the-box user and group account management, strictly
enforced administrator-based role security, day-to-day identity administration and built-in
auditing and reporting for Windows-centric environments. The following features and
capabilities make Active Roles a practical solution for secure management of users and
groups in Active Directory (AD) and AD-joined systems:
l Secure access Acts as a virtual firewall around Active Directory, enabling you to
control access through delegation using a least privilege model. Based on defined
administrative policies and associated permissions generates and strictly enforces
access rules, eliminating the errors and inconsistencies common with native
approaches to AD management. Plus, robust and personalized approval procedures
establish an IT process and oversight consistent with business requirements, with
responsibility chains that complement the automated management of directory data.
l Automate account creation Automates a wide variety of tasks, including:
l Creating user and group accounts in Active Directory (AD)
l Creating mailboxes on Exchange Server
l Populating groups
l Assigning resource in Windows
Active Roles also automates the process of reassigning and removing user access
rights in AD and AD-joined systems (including user and group de-provisioning) to
ensure an efficient and secure administrative process over the user and group
lifetimes. When a user’s access needs to be changed or removed, updates are made
automatically in Active Directory, Exchange, SharePoint, Skype for Business and
Windows, as well as any AD-joined systems such as Unix, Linux and Mac OS X.
About us
Contacting us
For sales or other inquiries, visit https://www.oneidentity.com/company/contact-us.aspx
or call +1-800-306-9329.
l Submit and manage a Service Request
l View Knowledge Base articles
l Sign up for product notifications
l Download software and technical documentation
l View how-to-videos
l Engage in community discussions
l Chat with support engineers online
l View services to assist you with your product