Breyta

Deila með


Managing users synchronized from Active Directory Domain Services to Microsoft Entra ID with Lifecycle workflows

Lifecycle Workflows supports governing the identity lifecycle for user accounts that are synchronized from Active Directory Domain Services (AD DS) to Microsoft Entra ID. For Lifecycle Workflows, it's essential that a user account exists in Microsoft Entra ID, but how the account was created, or how lifecycle relevant changes are being made to the account, plays a minor role when it comes to processing workflows and associated tasks for the user account. This support includes accounts, and changes, made via options such as HR driven provisioning, Microsoft Graph APIs, the Microsoft Entra Admin Portal, and changes synchronized by Microsoft Entra Connect and Microsoft Cloud Sync.

The following table lists common automation scenarios for synchronized users from AD DS using Microsoft Entra ID Governance:

Scenario to automate Microsoft Entra ID Governance solution
Creating the user account in Active Directory Domain Services HR driven provisioning
Providing initial credentials or password for user accounts The Generate Temporary Access Pass and send via email to user's manager task can be used to set up password-less credentials. For setting up a regular Active Directory password, you can use Microsoft Entra self-service password reset.
Assigning licenses The Assign licenses to user Lifecycle Workflow task can be used to assign licenses. You're also able to assign licenses to users via a group.
Give users access to Active Directory group-based applications Govern on-premises Active Directory (Kerberos) application access
Update user attributes in Active Directory as they move organizations Plan scoping filters and attribute mapping
Move users to different OUs as they move organizations Configure Active Directory OU container assignment
Disable users on last day The Disable user account Lifecycle Workflow task can be used to disable a user account on their last day.
Deleting users on a set number of days after termination The Delete User Lifecycle Workflow task can be used within a workflow template to delete users a set number of days after their termination.

In this article, you learn what needs to be considered if you want to use Lifecycle Workflows for user accounts that are synchronized from AD DS to Microsoft Entra ID.

Workflow execution conditions with users synchronized from Active Directory Domain Services (AD DS) to Microsoft Entra ID

Lifecycle Workflows are processed for user accounts when they meet the workflow's execution conditions. Executing conditions are composed of a trigger and scope. The trigger describes the event that occurs for a user account. The scope allows you to further define for whom the workflow runs for when the event occurs.

Workflow triggers

The following table shows what should be considered for each workflow trigger when used with users synchronized from AD DS:

Workflow Trigger Requirements
Attribute changes No further configuration needed as long as attributes are synced. For information on synced attributes, see: Attribute mapping in Microsoft Entra Cloud Sync and Microsoft Entra Connect Sync: Directory extensions. When a change is made in Active Directory, the synchronization via Microsoft Entra Cloud Sync or Microsoft Entra Connect Sync needs to occur before changes can be picked up from Lifecycle Workflows.
Group membership based As any type of group is supported, no further configuration is required. If the group originates from Active Directory, it must be synchronized to Microsoft Entra. The Microsoft Entra Cloud Sync, or Microsoft Entra Connect Sync, synchronization needs to occur before changes can be picked up from Lifecycle Workflows.
On-demand No further configuration needed.
Time based employeeHireDate, employeeLeaveDateTime: These attributes must be synced before being used. For more information on this process, see: How to synchronize attributes for Lifecycle workflows.

createdDateTime: No further configuration needed. This date is the day the user account is synced to Microsoft Entra ID, not when they were created within Active Directory.

Workflow scoping

For user attributes used within the workflow scoping capabilities, no further configuration is needed if the selected attributes are already synchronized. For information on synchronized attributes, see: Attribute mapping in Microsoft Entra Cloud Sync and Microsoft Entra Connect Sync: Directory extensions. When a change is made in Active Directory, the synchronization via Microsoft Entra Cloud Sync or Microsoft Entra Connect Sync needs to occur before changes can be picked up from Lifecycle Workflows.

Workflow tasks for users synchronized from Active Directory Domain Services to Microsoft Entra ID

All Lifecycle workflow tasks work for both cloud, and synchronized from Active Directory, users out of the box except for limitations listed on specific tasks further in this article. For more information on all Lifecycle Workflow tasks, see: Lifecycle Workflow built-in tasks.

Tasks to govern group memberships

Scenario: When you synchronize users from AD DS to Microsoft Entra ID, you're able to add, or remove, users from cloud-based security groups via Lifecycle Workflow's group tasks. This allows you to govern group membership of the synchronized users in the cloud, and to also add this group back to Active Directory using Microsoft Entra Cloud Sync group writeback.

For groups that are synchronized from AD DS to Microsoft Entra ID, you wouldn't be able to use Lifecycle Workflow group tasks as mentioned in the scenario. However, Microsoft Entra ID Governance can be used to govern on-premises Active Directory (Kerberos) application access with groups from the cloud, which are supported within Lifecycle Workflows.

User account tasks

Additional configuration is required for the Lifecycle Workflow tasks to enable, disable, and delete user accounts to work with synchronized from AD DS. The following prerequisites must be completed before you can configure the tasks to perform actions in Active Directory.

  • You must have the Microsoft Entra provisioning agent installed in your environment. For prerequisites on installing the Microsoft Entra provisioning agent, see: Cloud provisioning agent requirements. For a step by step guide on installing the Microsoft Entra Provisioning agent, see: Install the Microsoft Entra Provisioning Agent. During installation, choose “HR-driven provisioning / Microsoft Entra Connect Sync” as “extension configuration”. You aren't required to add any other configuration for the provisioning agent, such as the cloud sync configuration, and you can install the provisioning agent even if you're also currently using Microsoft Entra Connect Sync for your user synchronization.

Note

The Provisioning agent installed must be at least version 1.1.1586.0, which was released May 13th, 2024.

  • Ensure the Group Managed Service Account(gMSA) used by the provisioning agent has the appropriate permissions to perform operations on user accounts.

  • To delete users accounts, you must enable the Active Directory recycle bin. For a step-by-step guide on enabling the recycle bin, see: Active Directory Recycle Bin step-by-step.

For a step by step guide on setting the flag so that user account tasks run for users synchronized from Active Directory Domain Services, see: Manage synchronized from Active Directory Domain Services (AD DS) with workflows.

Next steps