Chatee ahora con Soporte
Chat con el soporte

Identity Manager 9.2 - Web Designer Web Portal User Guide

General tips and getting started Managing reports Security keys (WebAuthn) Requests
Setting up and configuring request functions Requesting products Managing the Saved for Later list Pending requests Displaying request history Resubmitting requests Canceling requests Renewing products with limit validity periods Unsubscribing products Displaying requests Undoing approvals Managing request inquiries directed at you Auditing requests Escalated requests
Managing attestations Attestors for attestation cases My attestation cases Pending attestations Displaying attestation history Managing attestation inquiries directed at you Auditing attestations Escalation
Compliance Responsibilities
My responsibilities
Specifying keywords for requestable products Managing my departments Managing my application roles Managing my devices Managing my business roles Managing my identities Managing my cost centers Managing my multi-request resources Managing my multi requestable/unsubscribable resources Managing my resources Managing my software applications Managing my locations Managing my system entitlements Managing my system roles Managing my assignment resources
Managing task delegations Ownerships Auditing
Auditing departments Auditing application roles Auditing devices Auditing business roles Auditing identities Auditing cost centers Auditing multi-request resources Auditing multi requestable/unsubscribable resources Auditing resources Auditing software Auditing locations Auditing system roles Auditing system entitlements Auditing assignment resources
Governance administration
Managing departments Managing business roles Managing identities Managing cost centers Managing multi-request resources Managing multi requestable/unsubscribable resources Managing resources Managing locations System entitlements Managing system roles Managing assignment resources
Opening other web applications Managing tickets Discovering your statistics on the home page Appendix: Attestation conditions and approval policies from attestation procedures Appendix: Page and menu descriptions
Information (menu description) My requests (menu description) Profile (menu description) Help (menu description) Request (menu description) Attestation (menu description)
My attestation status (page description) My actions (page description)
Pending attestations (page description)
Pending attestations – Attestation policies (page description) Pending attestations: One Identity Manager application roles (page description) Pending attestations: Departments (page description) Pending attestations: System roles (page description) Pending attestations: Locations (page description) Pending attestations: Business roles (page description) Pending attestations: PAM assets (page description) Pending attestations: PAM user accounts (page description) Pending attestations: Identities (page description) Pending attestations: Cost centers (page description) Pending attestations: User accounts (page description) Pending attestations: System entitlements (page description) Pending attestations: Resources (page description) Pending attestations: Assignment resources (page description) Pending attestation: Multi-request resources (page description) Pending attestations: Software (page description) Pending attestations: Multi requestable/unsubscribable resources (page description) Pending attestations: Devices (page description) Pending attestations – approvals (page description)
Attestation history (page description) Attestation inquiries (page description)
Auditing (page description) Governance administration (page description) Attestation escalation approval (page description)
Compliance (menu description) Responsibilities (menu description)
My responsibilities (page description)
Identities (page description) System entitlements (page description) Business roles (page description) System roles (page description) Departments (page description) Cost centers (page description) Locations (page description) Application roles (page description) Resources (page description) Assignment resources (page description) Multi-request resources (page description) Software (page description) Multi requestable/unsubscribable resources (page description) Devices (page description)
Delegating tasks (page description) Ownerships (page description) Auditing (page description)
Auditing – Departments (page description) Auditing – Application roles (page description) Auditing – Device (page description) Auditing – Business roles (page description) Auditing – Identity details (page description) Auditing – Cost center (page description) Auditing – Multi-request resources (page description) Auditing – Multi requestable/unsubscribable resources (page description) Auditing - Resources (page description) Auditing – Software (page description) Auditing – Locations (page description) Auditing – System roles (page description) Auditing - Assignment resource (page description) Auditing – Active Directory (page description) Auditing – Azure Active Directory (page description) Auditing – Custom target system group (page description) Auditing – Google Workspace (page description) Auditing – Domino (page description) Auditing – LDAP (page description) Auditing – Oracle E-Business Suite (page description) Auditing – Privileged Account Management (page description) Auditing – SAP R/3 (page description) Auditing – Unix (page description)
Governance administration (page description)
Business roles (page description) Identities (page description) Multi-request resources (page description) Multi requestable/unsubscribable resources (page description) Organization (page description) Resources (page description) System entitlements (page description) System roles (page description) Assignment resources (page description)
Tickets (menu description)

Usage – Application role (page description)

Open the Usage – Application role page by navigating through Responsibilities > My Responsibilities > One Identity Manager application roles > select application role > Usage.

On the Usage – Application role page, you can see the roles and organizations that belong to the identities to which this application role is assigned (see Displaying role memberships of my application roles' members).

The information is displayed as a hierarchical chart, which shows you more about the role inheritance.

The following tables give you an overview of the various features on the Usage – Application role page.

Table 431: Controls
Control Description
Role classes

Use this list of roles and organizations to select what you want to see (see Displaying role memberships of my application roles' members).

More information

Use this button to show the legend that explains the content of the overview (see Displaying role memberships of my application roles' members).

Compliance reports – Application role (page description)

To open the Compliance Reports – Application role page go to Responsibilities > My Responsibilities > One Identity Manager application roles > select application role > Compliance Reports.

On the Compliance Reports - Application role page you can:

The information is divided into three parts:

  • Policy violations: Shows you all the current policy violations caused by the application role.

  • Compliance rule violations: Shows you the current rule violations of the identities to which the application role is assigned.

    TIP: For more information about resolving rule violations, see Resolving rule violations.

  • Identities: Risk index and authorizations: Displays all identities to which the application role is assigned. Additionally, the number of assigned entitlements and the risk index of these identities are displayed.

To display the information, select the item you want from the View menu.

The following table gives an overview of the content of the Compliance reports – Application role page.

Table 432: Columns



Policy violations

Violating object

Shows you which object caused the rule violation.


Shows you the policy that was violated.


Shows you the status of the rule policy.

Compliance rule violations


Shows you the identity that caused the rule violation.

Rule violation

Shows you the violated rule.

Approval state

Shows you how or whether approval is granted to the rule violation.

Risk index (reduced)

Shows the risk index taking mitigating controls into account. A rule’s risk index can be reduced by a significance amount after mitigating controls have been applied.

Mitigating controls are processes that exist outside the One Identity Manager solution and that reduce the risk of violation. For more information, see Compliance – Governance Administration.

Identities: Risk index and entitlements


Shows you the identity to which this application is assigned.

Risk index (calculated)

Shows you the identity's calculated risk index.

Assigned permissions

Shows you all the entitlements assigned to this identity.

TIP: You can show less data by using the column filters. For more information, see Filtering.

Resources (page description)

To open the Resources page go to Responsibilities > My Responsibilities > Resources.

On the Resources page, you can:

If you click a resource in the list, a new page opens (see Resource overview page (page description)), which contains more information and configuration options for the resource.

The following tables give you an overview of the different functions and content on the Resources page.

Table 433: Controls



New resources

Opens the Create a new resource page (see New resources (page description)).

Use this button to add a new resource to the system (see Creating your own resources).

Table 434: Columns




Shows the resource's name.

TIP: You can show less data by using the column filters. For more information, see Filtering.

New resources (page description)

To open the Create a new resource page go to Responsibilities > My Responsibilities > Resources > New resource.

On the Create a new resource page you can create a new resource for which you are responsible. Do this by entering the new resource's main data (see Creating your own resources).

Enter the following main data.

Table 435: Resource main data




Enter a full, descriptive name for the resource.

Resource type

Select a resource type for the resource.

Use resource types to group resources.


Enter a description for the resource.

Risk index

Use the ruler to specify a risk index range. This value is used to assess the risk of assigning resources to identities.

For more information about risk assessment, see the One Identity Manager Risk Assessment Administration Guide.

Documentos relacionados

The document was helpful.

Seleccionar calificación

I easily found the information I needed.

Seleccionar calificación