Process Mining
2021.10
false
Banner background image
Process Mining
Last updated Apr 2, 2024

Adding Superadmin AD Groups

Introduction

Important: To enable Single Sign-on for Superadmin users the latest version of the Dispatcher build must be used. (At least v2021.4)
When setting the ExternalAuthenticationProviders setting of the Server Settings the Azure AD groups panel becomes available on the Superadmin users tab. Here you can add new Azure AD user groups. App developers who are a member of a group defined in the Superadmin users tab can log in the UiPath Process Mining with their Microsoft account using single sign-on. Depending on the authentication provider that is used for Single Sign-on, a Sign in with Microsoft button or Sign in with your Windows domain button will be present on the Superadmin Login dialog. See the illustration below for an example.


Adding AD Groups (Azure Active Directory)

Note: When creating a new Azure AD Group in UiPath Process Mining you must provide the Identifier of the Azure AD group. You can find this Azure AD group identifier in the Groups settings in Microsoft Azure Portal.

Follow these steps to add an AD group.

Step

Action

1

Go to the Superadmin Users tab.

2

Click on + in the AD groups panel.

3

In the New AD Group dialog click on Name and enter a descriptive name for the new user group.

4

Click on Identifier and enter the Azure AD group identifier.

5

Click on ADD GROUP.



The new group is created and displayed in the list of Azure groups. See illustration below for an example.



Adding AD Groups (Integrated Windows Authentication)

Follow these steps to add an AD group.

Step

Action

1

Go to the Superadmin Users tab.

2

Click on + in the AD groups panel.

3

In the New AD Group dialog click on Name and enter a descriptive name for the new user group.

4

Click on Identifier and enter the AD group of users that are allowed to login in.

Note: this must be of the format CN=All Users,OU=Distribution Groups,DC=Company,DC=com.

5

Click on ADD GROUP.

Important: AD groups are case-sensitive.


The new group is created and displayed in the list of AD groups. See illustration below for an example.



Superadmin Login

When a Superadmin user logs in using single sign-on a new user is created automatically in the Superadmin users tab. See illustration below for an example.



Note: Single sign-on access is provided through AD groups, not through the auto-provisioned user entry. This is only used to preserve individual settings, for example, Favorites. The entry is read-only, so you cannot change the user settings.

License

Although the users are authenticated via an AD group, a license is allocated by each app developer that logs in to UiPath Process Mining.

Note that when a group is deactivated or deleted, app developers can no longer log in but still have a license slot allocate until the Superadmin user entry is actually deactivated or deleted.

Managing Account Activation

App developer accounts can be disabled by deactivating an AD group. When an AD group is deactivated, the accounts that are assigned to the group will no longer be able to login.

Follow this step to disable authorization for all developer accounts of an AD group.

Step

Action

1

Click on the check box in the Active column of the AD group.

This is a toggle check box. This means the user can login if the check box is checked or is restricted from logging in if it is unchecked.

Was this page helpful?

Get The Help You Need
Learning RPA - Automation Courses
UiPath Community Forum
Uipath Logo White
Trust and Security
© 2005-2024 UiPath. All rights reserved.