As people join, depart, and move through your organization, you need to change their data access. With Data Governance Edition, you can validate that users and groups have been granted access to all the resources they need, ensure that they do not have access to excess resources, and manage their access when problems arise.
The following commands are available to you to manage account access.
Use this command |
If you want to |
---|---|
Get-QAccountAccess |
View where users and groups have access on a managed host. For more information, see Get-QAccountAccess. NOTE: This PowerShell cmdlet does not support Cloud managed hosts. |
Get-QAccountAccessOnHosts |
View the resource access for a given account (Domain\SAMAccountName) across all available hosts. For more information, see Get-QAccountAccessOnHosts. NOTE: This PowerShell cmdlet does not support Cloud managed hosts. |
Get-QAccountActivity |
View the activity associated with a user on a managed host. For more information, see Get-QAccountActivity. NOTE: This PowerShell cmdlet does not support Cloud managed hosts. |
Get-QAccountAliases |
View the group membership for a specified account. For example, if one of these groups (aliases) has access to a resource, the original account also has this access. |
Get-QAccountsForHost |
View all account access for a specific managed host. |
Get-QADAccount |
View the Active Directory objects from the One Identity Manager and QAM (Data Governance Edition) tables: ADSAccount, ADSGroup, ADSOtherSID, QAMLocalUser and QAMLocalGroup. |
Get-QGroupMembers |
View all the members of a group, including members of child groups. Because user and group access may be the result of several layers of nested groups, this helps you to assess how a specific account has gained access to a resource. |
Get-QIndexedTrustees |
View all of the entries from the QAMTrustee table who are also listed within the QAMSecurityIndex table, denoting an indexed trustee. |