Chatee ahora con Soporte
Chat con el soporte

Identity Manager 9.3 - Web Portal User Guide

General tips and getting started Managing background processes Managing reports Managing security keys (WebAuthn) Requests
Setting up and configuring request functions Requesting products Managing the Saved for Later list Pending requests Displaying request history Displaying archived requests Sharing products with others Resubmitting requests Canceling requests Renewing products with limit validity periods Unsubscribing products Displaying approvals Undoing request approvals Managing request inquiries directed at you
Attestation
Managing attestations Managing attestation inquiries directed at you Displaying attestation history Managing your own attestation cases Managing pending attestations Revoking attestation case approvals
Compliance Managing risk index functions Responsibilities
Managing task delegations Ownerships Managing my responsibilities
Managing my departments Managing my application roles Managing my devices Managing my business roles Managing my identities Managing my cost centers Managing my multi-request resources Managing my multi requestable/unsubscribable resources Managing my resources Managing my software applications Managing my locations Managing my system entitlements Managing my system roles Managing my assignment resources Managing my team role
Managing responsibilities of my reports
Managing data
Managing departments Managing application roles Managing user accounts Managing business roles Managing identities Managing cost centers Managing multi-request resources Managing multi requestable/unsubscribable resources Managing resources Managing locations Managing system entitlements Managing system roles Managing assignment resources
Opening other web applications Managing tickets Statistics Appendix: Attestation conditions and approval policies from attestation procedures

Displaying overviews of objects involved in policy violations as hyperviews

To quickly grasp dependencies and relationships of policy violations, you can display information about objects involved in policy violations in a hyperview at any time.

To display hyperviews of an object involved in a policy violation

  1. In the menu bar, click Compliance > Policy violations.

  2. On the Policy Violations page, click the relevant policy violation.

  3. In the View Policy Violation Details side panel, click the Hyperview tab.

  4. On the Hyperview tab, in the Related objects drop-down, select the object whose hyperview you want to display.

Related topics

Granting and denying policy violation exceptions

As exception approver, you can grant or deny exception approval to policy violations.

To make an approval decision about a policy violation

  1. In the menu bar, click Compliance > Policy violations.

  2. On the Policy Violations page, perform one of the following actions:

    • To grant an exception for a policy violation, next to the policy violation, click Grant exception.

    • To deny an exception for a policy violation, next to the policy violation, click Deny exception.

  3. (Optional) Perform the following actions:

    1. In the Reason for your decision drop-down, select a standard reason for your approval decision.

    2. (Optional) In the Additional comments about your decision field, enter extra information about your approval decision.

    TIP: By giving reasons, your approvals are more transparent and support the audit trail.

    NOTE: For more information about standard reasons, see the One Identity Manager Company Policies Administration Guide.

  4. Click Save.

To make an approval decision about multiple policy violations

  1. In the menu bar, click Compliance > Policy violations.

  2. On the Policy Violations page, select the check boxes next to the policy violations that you want to approve or deny.

  3. Perform one of the following actions:

    • To grant exceptions to the policy violations, click Grant exception below the table.

    • To deny exceptions to the policy violations, click Deny exception below the table.

  4. (Optional) Perform the following actions:

    1. In the Reason for your decision menu, select a standard reason for your approval decision.

    2. (Optional) In the Additional comments about your decision field, enter extra information about your approval decision.

    TIP: By giving reasons, your approvals are more transparent and support the audit trail.

    NOTE: For more detailed information about standard reasons, see the One Identity Manager Company Policies Administration Guide.

  5. Click Save.

Managing risk index functions

Everyone with IT system authorization in a company represents a security risk for that company. For example, an identity with permission to edit financial data in SAP carries a higher risk than an identity with permission to edit their own main data. To quantify the risk, you can enter a risk value for every company resource in One Identity Manager. A risk index is calculated from this value for every identity that has this company resource assigned to it directly or indirectly. Company resources include target system entitlements (for example, Active Directory groups or SAP profiles), system roles, subscribable reports, software, and resources. In this way, all the people that represent a particular risk to the company can be found.

In the context of Identity Audit, compliance rules can also be given a risk index. With each rule violation, the security risk of all identities that violate the rule may increase. Therefore, these risk indexes are also included in the identities' risk calculation. You can define appropriate countermeasures through mitigating controls, and store them with the compliance rules.

Other factors can influence the calculation of identities' risk indexes. These include: the type of resource assignment (approved request or direct assignment), attestations, exception approvals for rule violations, identities' responsibilities, and defined weightings. Furthermore, the risk index can be calculated for all business roles, organizations, and system roles that have company resources assigned to them. The user account risk index is calculated based on the system entitlements assigned.

Based on the risk index history, resulting risk indexes are calculated for employees, user accounts, and hierarchical roles. All direct and indirectly assigned objects are taken into account.

One Identity Manager provides default risk index functions for risk indexes, which define the risk calculation for different types of objects. Certain properties of default risk index functions can be edited in One Identity Manager. You can also can set up custom risk index functions.

For more information about risk assessment, see the One Identity Manager Risk Assessment Administration Guide.

Detailed information about this topic

Displaying risk index functions

To obtain an overview, you can display risk index functions that contribute to the calculation of the risk index of all assigned company resources.

To display all risk index functions

  1. In the menu bar, click Setup > Risk index functions.

    This opens the Risk Index functions page.

  2. (Optional) To display the main data of a risk index function, click the risk index function.

Documentos relacionados

The document was helpful.

Seleccionar calificación

I easily found the information I needed.

Seleccionar calificación