サポートと今すぐチャット
サポートとのチャット

Identity Manager 8.2.1 - Attestation Administration Guide

Attestation and recertification
One Identity Manager users for attestation Attestation base data Attestation policies Sample attestation Custom mail templates for notifications Suspending attestation
Approval processes for attestation cases
Approval policies for attestations Approval workflow for attestations Selecting attestors Setting up multi-factor authentication for attestation Prevent attestation by employee awaiting attestation Attestation by peer group analysis Managing attestation cases
Attestation sequence Default attestation and withdrawal of entitlements User attestation and recertification Mitigating controls Setting up attestation in a separate database Configuration parameters for attestation

Business role attestation

Installed modules: Business Roles Module

When you use the Business role membership attestation default attestation policy and have set up attestation policies with the Business role membership attestation default attestation procedure, you can configure automatic removal of business roles through the QER | Attestation | AutoRemovalScope | RoleMembership configuration parameter. After attestation approval has been denied, One Identity Manager checks which type of assignment was used for the user account to become a member in the business role.

Table 46: Effect of configuration parameters when attestation denied

Configuration parameter

Effect when set

QER | Attestation | AutoRemovalScope | RoleMembership | RemoveDirectRole

The employee's secondary membership in the business role is removed.

This removes all indirect assignments obtained by the employee through this business role. Membership in dynamic roles is not removed by this.

QER | Attestation | AutoRemovalScope | RoleMembership | RemoveRequestedRole

If the employee requested the business role through the IT Shop, the request is canceled or unsubscribed.

This removes all indirect assignments obtained by the employee through this business role.

Set the desired behavior in the QER | Attestation | AutoRemovalScope | PWOMethodName configuration parameter. For more information, see Default attestation and withdrawal of entitlements.

QER | Attestation | AutoRemovalScope | RoleMembership | RemoveDelegatedRole

If the business role was delegated to the employee, delegation is canceled or unsubscribed.

This removes all indirect assignments obtained by the employee through this business role.

Set the desired behavior in the QER | Attestation | AutoRemovalScope | PWOMethodName configuration parameter. For more information, see Default attestation and withdrawal of entitlements.

QER | Attestation | AutoRemovalScope | RoleMembership | RemoveDynamicRole

The employee is excluded from the business role's dynamic role.

This removes all indirect assignments obtained by the employee through this business role. This does not remove memberships in the business role that were created in another way.

User attestation and recertification

Use the One Identity Manager attestation functionality to regularly check and authorize employees' main data and target system entitlements and assignments. In addition, One Identity Manager provides default procedures for managers to quickly attest and certify the main data of newly added One Identity Manager users in the One Identity Manager database. This functionality can be used, for example, if external employees, such as contract workers, are provided with temporary access to the One Identity Manager. The sequence is different for internal and external employees.

Regular recertification can be run through scheduled tasks.

In the context of an attestation, a manager can check and update the main data of the user to be certified, if necessary. Use the Web Portal for attestation.

Detailed information about this topic

One Identity Manager users for attesting and recertifying users

The following users are used for attesting and recertifying employees.

Table 47: Users

Users

Tasks

Employee administrators

Employee administrators must be assigned to the Identity Management | Employees| Administrators application role.

Users with this application role:

  • Can edit main data for all employees

  • Assign managers to employees.

  • Can assign company resources to employees.

  • Check and authorize employee main data.

  • Create and edit risk index functions.

  • Edit password policies for employee passwords

  • Delete employee's security keys (WebAuthn)

  • Can see everyone's requests, attestations, and delegations and edit delegations in the Web Portal.

Manager

  • Check employee main data of the internal user to be certified.
  • Update employee main data as required.
  • Assign another manager if required.
  • Attests the main data.

Attestors for external users

Attestors for external users must be assigned to the Identity & Access Governance | Attestation | Attestors for external users application role.

Users with this application role:

  • Attests new, external employees.

Administrators for attestation cases

Administrators must be assigned to the Identity & Access Governance | Attestation | Administrators application role.

Users with this application role:

  • Modify the attestation policies if necessary.

  • Create more schedules if required.

Web Portal users

  • Log on to the Web Portal and enter their main data,

Self-registered employees

External employees, who have self-registered in the Web Portal, are assigned to the Base roles | Self-registered employees application role through a dynamic role.

Users with this application role:

  • Specify their password and password questions for logging in to One Identity Manager tools.

Configuring user attestation and recertification

To use the attestation and recertification function for new internal users

  1. In the Designer, set the QER | Attestation | UserApproval configuration parameter.

  2. Assign at least one employee to the Identity Management | Employees | Administrators application role.

    All employees with this application role can assign a manager to the employee being attested during the attestation process.

To use the attestation and recertification function for new external users

  1. In the Designer, set the following configuration parameters:

    • QER | Attestation | ApproveNewExternalUsers: Select the value 1.

    • QER | WebPortal | PasswordResetURL: Enter the URL for the Password Reset Portal.

    • QER | Attestation | MailTemplateIdents | NewExternalUserVerification: Mail template sending verification links.

    • QER | Attestation | NewExternalUserTimeoutInHours: For new external users, specify the duration of the verification link in hours.

      The default is 4 hours. If logging in to the Password Reset Portal fails because the timeout has expired, the user can ask for a new verification link to be sent. To change the duration of the verification link, change the value in the configuration parameter.

    • QER | Attestation | NewExternalUserFinalTimeoutInHours: Specify the duration in hours, within which self-registration must be successfully completed.

      If the user does not complete registration with 24 hours, the attestation case quits. To register anyway, the user must log in again to the Web Portal from the beginning. To change the checkout duration of registration, change the value of the configuration parameter.

  2. Assign at least one employee to the Identity & Access Governance | Attestation | Attestor for external users application role.

Detailed information about this topic
関連ドキュメント

The document was helpful.

評価を選択

I easily found the information I needed.

評価を選択