Chatta subito con l'assistenza
Chat con il supporto

Identity Manager On Demand Hosted - Web Portal User Guide

General tips and getting started Requests
Setting up and configuring request functions Requesting products Saved for Later list Pending requests Displaying request history Canceling requests Renewing products with limit validity periods Unsubscribing products Displaying approvals Undoing approvals
Attestation Compliance Responsibilities
My responsibilities
Managing my departments Managing my application roles Managing my business roles Managing my identities Managing my cost centers Managing my locations Managing my system entitlements Managing my system roles
Delegating tasks Ownerships
Managing data
Managing identities Managing user accounts Managing system entitlements Managing departments Managing locations Managing cost centers Managing business roles Managing system roles
Appendix: Attestation conditions and approval policies from attestation procedures

Attesting PAM account groups

PAM account groups are attested using the PAM account group attestation attestation procedure.

Condition

Description

All PAM account groups

Attests all PAM account groups.

Specific PAM account groups

Select the PAM account groups to attest.

PAM user accounts on specific systems

PAM account groups on specific systems

Select the PAM appliances with PAM user accounts to attest.

Select the PAM appliances with PAM account groups to attest.

PAM account groups with matching name

Enter part of a name of PAM account groups with access to attest. All PAM account groups that have this pattern in their name are included.

Example: Per finds "Person", "Personal", "Perfection" and so on.

Attesting PAM directory accounts

PAM directory accounts are attested using the PAM directory account attestation attestation procedure.

Condition

Description

All PAM directory accounts

Attests all PAM directory accounts.

Specific PAM directory accounts

Select the PAM directory accounts to attest.

PAM directory accounts on specific directories

Select the directories. Attests directory accounts that are found in this directory.

PAM directory accounts with matching name

Enter part of a name of PAM directory accounts with access to attest. All PAM directory accounts that have this pattern in their name are included.

Example: Per finds "Person", "Personal", "Perfection" and so on.

Attesting PAM accesses

PAM access are attested using the PAM access attestation attestation procedure.

Condition

Description

All PAM accesses

Attests all PAM access.

Specific PAN asset accounts

Select the PAM asset accounts with access to attest.

Specific PAM assets

Select the PAM assets with access to attest.

Specific PAM user accounts

Select the PAM user accounts with access to attest.

Specific PAM directory accounts

Select the PAM directory accounts with access to attest.

Specific PAM directories

Select PAM directories. Attests access to these PAM directories.

Specific access type

Select access types. Attests access that uses one of these access types.

PAM user accounts mapped to specific employees

Select the identities. Attests access through PAM user accounts with these identities assigned to them.

PAM user accounts with defined risk index

Use the Lower limit and Upper limit fields to define a risk index range. Attests access through PAM user accounts with a risk index in the chosen range.

PAM user accounts with matching name

Enter part of a name of PAM user accounts with access to attest. All PAM user accounts that have this pattern in their name are included. Example: Per finds "Person", "Personal", "Perfection" and so on.

Attesting departments

Department properties are attested using the Department attestation attestation procedure.

Related Documents

The document was helpful.

Seleziona valutazione

I easily found the information I needed.

Seleziona valutazione