Subscribe

UiPath Process Mining

The UiPath Process Mining Guide

Adding Superadmin AD Groups

Introduction

🚧

Important

To enable Single Sign-on for Superadmin users the latest version of the Dispatcher build must be used. (At least v2021.4)

When setting the ExternalAuthenticationProviders setting of the Server Settings the Azure AD groups panel becomes available on the Superadmin users tab. Here you can add new Azure AD user groups. App developers who are a member of a group defined in the Superadmin users tab can log in the UiPath Process Mining with their Microsoft account using single sign-on. Depending on the authentication provider that is used for Single Sign-on, a Sign in with Microsoft button or Sign in with your Windows domain button will be present on the Superadmin Login dialog. See illustration below.

Adding AD groups (Azure Active Directory)

📘

Note

When creating a new Azure AD Group in UiPath Process Mining you must provide the Identifier of the Azure AD group. You can find this Azure AD group identifier in the Groups settings in Microsoft Azure Portal.

Follow these steps to add an AD group.

Step

Action

1

Go to the Superadmin Users tab.

2

Click on imageimage in the AD groups panel.

3

In the New AD Group dialog click on Name and enter a descriptive name for the new user group.

4

Click on Identifier and enter the Azure AD group identifier.

5

Click on ADD GROUP.

The new group is created and displayed in the list of Azure groups. See illustration below for an example.

Adding AD groups (Integrated Windows Authentication)

Follow these steps to add an AD group.

Step

Action

1

Go to the Superadmin Users tab.

2

Click on imageimage in the AD groups panel.

3

In the New AD Group dialog click on Name and enter a descriptive name for the new user group.

4

Click on Identifier and enter the AD group of users that are allowed to login in.
Note: this must be of the format CN=All Users,OU=Distribution Groups,DC=Company,DC=com.

5

Click on ADD GROUP.

The new group is created and displayed in the list of AD groups. See illustration below for an example.

Superadmin login

When a Superadmin user logs in using single sign-on a new user is created automatically in the Superadmin users tab. See illustration below for an example.

📘

Note

Single sign-on access is provided through AD groups, not through the auto-provisioned user entry. This is only used to preserve individual settings, for example, Favorites. The entry is read-only, so you cannot change the user settings.

License

Although the users are authenticated via an AD group, a license is allocated by each app developer that logs in to UiPath Process Mining.
Note that when a group is deactivated or deleted, app developers can no longer log in but still have a license slot allocate until the Superadmin user entry is actually deactivated or deleted.

Managing account activation

App developer accounts can be disabled by deactivating an AD group. When an AD group is deactivated, the accounts that are assigned to the group will no longer be able to login.
Follow this step to disable authorization for all developer accounts of an AD group.

Step

Action

1

Click on the check box in the Active column of the AD group.

This is a toggle check box. This means the user can login if the check box is checked or is restricted from logging in if it is unchecked.

Updated 22 days ago


Adding Superadmin AD Groups


Suggested Edits are limited on API Reference Pages

You can only suggest edits to Markdown body content, but not to the API spec.