Chatta subito con l'assistenza
Chat con il supporto

Identity Manager 9.1 - Web Designer Web Portal User Guide

General tips and getting started Security keys (WebAuthn) Requests
Setting up and configuring request functions Requesting products Saved for Later list Pending requests Displaying request history Resubmitting requests Canceling requests Renewing products with limit validity periods Unsubscribing products Displaying approvals Undoing approvals Request inquiries Auditing requests Escalated requests
Attestation
Managing attestations Attestors for attestation cases Sending attestation reminders My attestation cases Pending attestations Displaying attestation history Attestation inquiries Auditing attestations Escalation
Compliance Responsibilities
My responsibilities
Specifying keywords for requestable products Managing my departments Managing my application roles Managing my devices Managing my business roles Managing my identities Managing my cost centers Managing my multi-request resources Managing my multi requestable/unsubscribable resources Managing my resources Managing my software applications Managing my locations Managing my system entitlements Managing my system roles Managing my assignment resources
Delegating tasks Ownerships Auditing
Auditing departments Auditing application roles Auditing devices Auditing business roles Auditing identities Auditing cost centers Auditing multi-request resources Auditing multi requestable/unsubscribable resources Auditing resources Auditing software Auditing locations Auditing system roles Auditing system entitlements Auditing assignment resources
Governance administration
Managing departments Managing business roles Managing identities Managing cost centers Managing multi-request resources Managing multi requestable/unsubscribable resources Managing resources Managing locations System entitlements Managing system roles Managing assignment resources
Applications Calls Discovering your statistics on the home page Appendix: Attestation conditions and approval policies from attestation procedures Appendix: Page and menu descriptions
Information (Menu description) My requests (Menu description) Profile (Menu description) Help (Menu description) Request (Menu description) Attestation (Menu description)
My attestation status (page description) My actions (page description)
Pending attestations (page description)
Pending attestations – Attestation policies (page description) Pending attestations: One Identity Manager application roles (page description) Pending attestations: Departments (page description) Pending attestations: System roles (page description) Pending attestations: Locations (page description) Pending attestations: Business roles (page description) Pending attestations: PAM assets (page description) Pending attestations: PAM user accounts (page description) Pending attestations: Employees (page description) Pending attestations: Cost centers (page description) Pending attestations: User accounts (page description) Pending attestations: System entitlements (page description) Pending attestations: Resources (page description) Pending attestations: Assignment resources (page description) Pending attestation: Multi-request resources (page description) Pending attestations: Software (page description) Pending attestations: Multi requestable/unsubscribable resources (page description) Pending attestations: Devices (page description) Pending attestations – approvals (page description)
Attestation history (page description) Attestation inquiries (page description)
Auditing (page description) Governance administration (page description) Attestation escalation approval (page description)
Compliance (Menu description) Responsibilities (Menu description)
My responsibilities (page description)
Identities (page description) System entitlements (page description) Business roles (page description) System roles (page description) Departments (page description) Cost centers (page description) Locations (page description) Application roles (page description) Resources (page description) Assignment resources (page description) Multi-request resources (page description) Software (page description) Multi requestable/unsubscribable resources (page description) Devices (page description)
Delegating tasks (page description) Ownerships (page description) Auditing (page description)
Auditing – Departments (page description) Auditing – Application roles (page description) Auditing – Device (page description) Auditing – Business roles (page description) Auditing – Identity details (page description) Auditing – Cost center (page description) Auditing – Multi-request resources (page description) Auditing – Multi requestable/unsubscribable resources (page description) Auditing - Resources (page description) Auditing – Software (page description) Auditing – Locations (page description) Auditing – System roles (page description) Auditing - Assignment resource (page description) Auditing – Active Directory (page description) Auditing – Azure Active Directory (page description) Auditing – Custom target system group (page description) Auditing – Google Workspace (page description) Auditing – Domino (page description) Auditing – LDAP (page description) Auditing – Oracle E-Business Suite (page description) Auditing – Privileged Account Management (page description) Auditing – SAP R/3 (page description) Auditing – Unix (page description)
Governance administration (page description)
Business roles (page description) Identities (page description) Multi-request resources (page description) Multi requestable/unsubscribable resources (page description) Organization (page description) Resources (page description) System entitlements (page description) System roles (page description) Assignment resources (page description)
Calls (Menu description)

Usage – Business role (page description)

To open the Usage - Business role page go to Responsibilities > Governance Administration > Business Roles > Edit > Usage.

On the Usage - Business role page, you can see which roles the business role members belong to (see Displaying role memberships of business role members).

The information is displayed as a hierarchical chart, which shows you more about the role inheritance.

The following tables give you an overview of the different functions on the Usage – Business role page.

Table 821: Controls

Control

Description

Role classes

You can select the main category of roles and organizations you want to display from this menu.

More information

Use this button to show the legend that explains the content of the overview.

Compliance reports – Business role (page description)

To open the Compliance Reports – Business Role page go to Responsibilities > Governance Administration > Business Roles > Edit > Compliance Reports.

On the Compliance Reports – Business role page you can:

The information is divided into three parts:

  • Policy violations: Shows all the current policy violations caused by the application role.

  • Compliance rule violations: Shows you the current rule violations of the identities to which the business role is assigned.

    TIP: For more information about resolving rule violations, see Resolving rule violations.

  • Identities: Risk index and entitlements: Displays all identities to which the business role is assigned. In addition, the number of entitlements and risk index assigned to these identities is displayed.

To display the information, select the item you want from the View menu.

The following table gives an overview of the content of the Compliance reports – Business role page.

Table 822: Columns

Column

Description

Policy violations

Violating object

Show which object caused the rule violation.

Policy

Show the policy that was violated.

Status

Show the status of the rule policy.

Compliance rule violations

Employee

Shows you the identity that caused the rule violation.

Rule violation

Shows the violated rule.

Approval state

Shows how or whether approval is granted to the rule violation.

Risk index (reduced)

Shows the risk index taking mitigating controls into account. A rule’s risk index can be reduced by a significance amount after mitigating controls have been applied.

Mitigating controls are processes that exist outside the One Identity Manager solution and that reduce the risk of violation. For more information, see Compliance – Governance Administration.

Identities: Risk index and entitlements

Identity

Shows you the identity to which this business role is assigned.

Risk index (calculated)

Shows you the identity's calculated risk index.

Assigned permissions

Shows you all the entitlements assigned to this identity.

TIP: You can show less data by using the column filters. For more information, see Filtering.

Identities (page description)

To open the Identities page go to Responsibilities > Governance Administration > Identities.

On the Identities page, you can:

If you click an identity in the list, a new page opens, which contains more information and configuration options for the identity (see Identity (page description)).

The following tables give you an overview of the various features and content on the Identities page.

Table 823: Controls

Control

Description

Add a new identity

Opens the Add a New Identity page (see Adding a new identity (page description)).

Use this button to add a new identity to the system (see Adding identities).

Table 824: Columns

Column

Description

Display

Shows you the identity's name.

Primary department

Shows the department that the identity is primarily assigned to.

TIP: You can show less data by using the column filters. For more information, see Filtering.

Adding a new identity (page description)

To open the Add a New Identity page go to Responsibilities > Governance Administration > Identities > Add a new identity.

On the Add a New Identity page, you can add a new identity by providing its main data (see Adding your own identities).

Enter the following main data.

Table 825: Identities main data

Property

Description

Personal data

Last name

Enter the identity's last name.

First name

Enter the identity's first name.

Middle name

Enter the identity's middle name.

Date of birth

Enter the identity's date of birth. Click the (Calendar) to do this and use the date picker to select the date of birth.

Personnel number

Enter the identity's personnel number.

Gender

In the menu, select the identity's gender.

Central user account

Enter the name of the identity's central user account.

Default email address

Enter the identity's default email address.

Organizational information

Primary cost center

Click Assign/Change and select the identity's primary cost center.

Primary department

Click Assign/Change and select the identity's primary department.

External

Select the check box if this is an external identity.

Employee type

In the menu, select what type of identity this is. For example, an identity of this company or a trainee.

Entry date

Enter the date the identity started at the company. Click the (Calendar) and use the date picker to select the starting date.

Leaving date

Enter the date that the identity leaves the company. Click the (Calendar) to do this and use the date picker to select the leaving date.

Manager

Shows you the identity's manager.

TIP: If necessary, you can transfer the identity's manager at a later date (see Assigning other managers to my identities).

Primary location

Click Assign/Change and select the identity's primary location.

Building

Enter the building where the identity works.

Floor

Enter which floor the identity works on.

Room

Enter the room the identity works in.

Street

Enter the road where the identity works.

Zip code

Enter the zip code of the identity's work location.

City

Enter the city where the identity works.

Related Documents

The document was helpful.

Seleziona valutazione

I easily found the information I needed.

Seleziona valutazione