Converse agora com nosso suporte
Chat com o suporte

Identity Manager 9.2 - Web Designer Web Portal User Guide

General tips and getting started Managing reports Security keys (WebAuthn) Requests
Setting up and configuring request functions Requesting products Managing the Saved for Later list Pending requests Displaying request history Resubmitting requests Canceling requests Renewing products with limit validity periods Unsubscribing products Displaying requests Undoing approvals Managing request inquiries directed at you Auditing requests Escalated requests
Attestation
Managing attestations Attestors for attestation cases My attestation cases Pending attestations Displaying attestation history Managing attestation inquiries directed at you Auditing attestations Escalation
Compliance Responsibilities
My responsibilities
Specifying keywords for requestable products Managing my departments Managing my application roles Managing my devices Managing my business roles Managing my identities Managing my cost centers Managing my multi-request resources Managing my multi requestable/unsubscribable resources Managing my resources Managing my software applications Managing my locations Managing my system entitlements Managing my system roles Managing my assignment resources
Managing task delegations Ownerships Auditing
Auditing departments Auditing application roles Auditing devices Auditing business roles Auditing identities Auditing cost centers Auditing multi-request resources Auditing multi requestable/unsubscribable resources Auditing resources Auditing software Auditing locations Auditing system roles Auditing system entitlements Auditing assignment resources
Governance administration
Managing departments Managing business roles Managing identities Managing cost centers Managing multi-request resources Managing multi requestable/unsubscribable resources Managing resources Managing locations System entitlements Managing system roles Managing assignment resources
Opening other web applications Managing tickets Discovering your statistics on the home page Appendix: Attestation conditions and approval policies from attestation procedures Appendix: Page and menu descriptions
Information (menu description) My requests (menu description) Profile (menu description) Help (menu description) Request (menu description) Attestation (menu description)
My attestation status (page description) My actions (page description)
Pending attestations (page description)
Pending attestations – Attestation policies (page description) Pending attestations: One Identity Manager application roles (page description) Pending attestations: Departments (page description) Pending attestations: System roles (page description) Pending attestations: Locations (page description) Pending attestations: Business roles (page description) Pending attestations: PAM assets (page description) Pending attestations: PAM user accounts (page description) Pending attestations: Identities (page description) Pending attestations: Cost centers (page description) Pending attestations: User accounts (page description) Pending attestations: System entitlements (page description) Pending attestations: Resources (page description) Pending attestations: Assignment resources (page description) Pending attestation: Multi-request resources (page description) Pending attestations: Software (page description) Pending attestations: Multi requestable/unsubscribable resources (page description) Pending attestations: Devices (page description) Pending attestations – approvals (page description)
Attestation history (page description) Attestation inquiries (page description)
Auditing (page description) Governance administration (page description) Attestation escalation approval (page description)
Compliance (menu description) Responsibilities (menu description)
My responsibilities (page description)
Identities (page description) System entitlements (page description) Business roles (page description) System roles (page description) Departments (page description) Cost centers (page description) Locations (page description) Application roles (page description) Resources (page description) Assignment resources (page description) Multi-request resources (page description) Software (page description) Multi requestable/unsubscribable resources (page description) Devices (page description)
Delegating tasks (page description) Ownerships (page description) Auditing (page description)
Auditing – Departments (page description) Auditing – Application roles (page description) Auditing – Device (page description) Auditing – Business roles (page description) Auditing – Identity details (page description) Auditing – Cost center (page description) Auditing – Multi-request resources (page description) Auditing – Multi requestable/unsubscribable resources (page description) Auditing - Resources (page description) Auditing – Software (page description) Auditing – Locations (page description) Auditing – System roles (page description) Auditing - Assignment resource (page description) Auditing – Active Directory (page description) Auditing – Azure Active Directory (page description) Auditing – Custom target system group (page description) Auditing – Google Workspace (page description) Auditing – Domino (page description) Auditing – LDAP (page description) Auditing – Oracle E-Business Suite (page description) Auditing – Privileged Account Management (page description) Auditing – SAP R/3 (page description) Auditing – Unix (page description)
Governance administration (page description)
Business roles (page description) Identities (page description) Multi-request resources (page description) Multi requestable/unsubscribable resources (page description) Organization (page description) Resources (page description) System entitlements (page description) System roles (page description) Assignment resources (page description)
Tickets (menu description)

Requesting products through peer groups

You can display and request products that other identities within your environment have already requested. As a manager, you can also see products from the peer group of your direct reports. This way, you have a quick method of requesting products that are important to you or your direct reports.

A peer group contains all the identities that have the same manager or the same primary or secondary department as the request recipient.

To request other identities' products

  1. In the menu bar, click Request > My Requests.

  2. On the My requests page, click Start a new request.

  3. (Optional) If you want to make a request for another identity or check which products have been requested by their peer group, proceeds as follows:

    1. On the Request page, click Change next to the Recipients field.

    2. In the Recipients dialog, in the list, click the identity who is going to receive the products.

      NOTE: The list may contain a maximum of one identity. To remove an identity from the list, click on the respective identity.

    3. Click Close.

  4. On the Request page, click Actions > Show products other identities requested.

    This opens the Products other identities requested page that lists requests, memberships, and the peer groups of the selected identity (see Products other identities requested (page description)).

  5. Add the products that you want to save for later, to the shopping cart (see Adding products to the shopping cart).

  6. On the My Shopping Cart page, click Submit.

    TIP: You can also add more products to your shopping cart and configure various settings. For more information, see Managing products in the shopping cart.

Related topics

Requesting using product bundles

You can use your own (private) product bundles or product bundles that are shared with all users (public) for making requests. Product bundles help simplify the request process. For example, a product bundle may contain all the products a new identity needs to get started. If you use a product bundle to make a request, you are not obliged to request all the products in the product bundle. You only have to select the products you want from it.

TIP: To find out how you can request the same products as another identity, see Requesting products through reference users.

To request products using a product bundle

  1. In the menu bar, click Request > My Requests.

  2. On the My requests page, click Start a new request.

  3. On the Request page, click Actions > Select a product bundle.

  4. In the Choose a product bundle dialog, next to the required product bundle, click Add to cart.

    TIP: If you want to display all the contents of the product bundle, click next to the product bundle.

  5. On the My Shopping CartShopping Cart page, click .

    TIP: You can also add more products to your shopping cart and configure various settings. For more information, see Managing products in the shopping cart.

Related topics

Requesting privileged access

You can use the Privileged access requests service category to request privileged access to high-security systems (Privileged Account Management systems).

TIP: For more information on the topic of Privileged Account Management, see the One Identity Manager Administration Guide for Privileged Account Governance.

To request privileged access

  1. In the menu bar, click Request > My Requests.

  2. On the My requests page, click Start a new request.

  3. On the Request page, click Privileged access requests.

  4. On the Request page, select how you want to access the system by selecting the check box in front of the corresponding option:

    • Password release request: Request a temporary password.

    • Remote desktop session request: Request temporary access through a remote desktop connection.

    • SSH key request: Request temporarily valid SSH key.

    • SSH session request: Request temporary access through an SSH session.

    • Telnet session requests: Request temporary access using a Telnet session.

  5. Click Add to cart.

  6. In the new dialog, next to PAM user account, click Assign//Change.

  7. In the PAM user account dialog, select the PAM user account that you want to use for PAM access.

  8. Depending on the type of access you have selected, perform one of the following actions:

    • Password request:

      1. Next to System to access, click Assign.

      2. In the System to access dialog, select whether you want to request access for a PAM asset or a PAM directory.

      3. Click the corresponding PAM directory or PAM asset.

    • Telnet session request, remote desktop session request, SSH key request, or SSH session request:

      1. Next to Asset, click Assign.

      2. In the Asset dialog, click the corresponding PAM asset.

  9. Perform the following actions:

    1. Next to Account to access, click Assign.

    2. In the Account to access dialog, select which access you want to request, either PAM directory account or a PAM Asset account.

    3. Click the PAM asset account or PAM directory account you want to access.

  10. (Optional) In the Comment field, enter a comment, for example, to justify why you are requesting this access.

  11. In the Valid from field, specify the time from which you want the access to be valid or clear the check box so that access is valid from the time of this request.

    TIP: Use the icons next to the date field to select the date and time from the calendar or a list.

  12. In Checkout duration, enter the number of minutes for which the access is valid.

    NOTE: This duration refers to your entry in the Valid from field. For example, if you have specified that the access is valid from 12 noon tomorrow and should be valid for 60 minutes, then the validity period will expire at 1 pm tomorrow.

  13. Click Save.

  14. (Optional) Repeat the steps for all other users and access types.

  15. On the My Shopping CartShopping Cart page, click .

    TIP: You can also add more products to your shopping cart and configure various settings. For more information, see Managing products in the shopping cart.

    Once the request has been approved, a button will appear in the request details pane of the request history (see Displaying request history) that you can use to log in to the Privileged Account Management system to obtain the login credentials.

Related topics

Requests for Active Directory groups

To manage Active Directory groups, you can make different requests.

Detailed information about this topic
Documentos relacionados

The document was helpful.

Selecione a classificação

I easily found the information I needed.

Selecione a classificação