Usage – Location (page description)
To open the Usage - Location page go to Responsibilities > Governance Administration > Organization > Edit > Usage.
On the Usage - Location page, you can see which roles the location members belong to (see Displaying role memberships of location members).
The information is displayed as a hierarchical chart, which shows you more about the role inheritance.
The following tables give you an overview of the different functions on the Usage – Location page.
Table 914: Controls
Role classes |
You can select the main category of roles and organizations you want to display from this menu. |
More information |
Use this button to show the legend that explains the content of the overview. |
Compliance reports - Location (page description)
To open the Compliance Reports – Location page go to Responsibilities > Governance Administration > Organization > Edit > Compliance Reports.
On the Compliance Reports – Location page you can:
The information is divided into three parts:
-
Policy violations: Shows all the current policy violations caused by the location.
-
Compliance rule violations: Shows you all current rule violations of the identities assigned to the location.
-
Identities: Risk index and entitlements: Shows all identities assigned to the location. In addition, the number of entitlements and risk index assigned to these identities is displayed.
To display the information, select the item you want from the View menu.
The following table gives an overview of the content of the Compliance reports – Location page.
Table 915: Columns
Policy violations |
Violating object |
Show which object caused the rule violation. |
Policy |
Show the policy that was violated. |
Status |
Show the status of the rule policy. |
Compliance rule violations |
Employee |
Shows you the identity that caused the rule violation. |
Rule violation |
Shows the violated rule. |
Approval state |
Shows how or whether approval is granted to the rule violation. |
Risk index (reduced) |
Shows the risk index taking mitigating controls into account. A rule’s risk index can be reduced by a significance amount after mitigating controls have been applied.
Mitigating controls are processes that exist outside the One Identity Manager solution and that reduce the risk of violation. For more information, see Compliance – Governance Administration. |
Identities: Risk index and entitlements |
Identity |
Shows you the identity to which this location is assigned. |
Risk index (calculated) |
Shows you the identity's calculated risk index. |
Assigned permissions |
Shows you all the entitlements assigned to this identity. |
TIP: You can show less data by using the column filters. For more information, see Filtering.
Resources (page description)
To open the Resources page go to Responsibilities > Governance Administration > Resources.
On the Resources page you can see all resources (see Displaying all resources).
If you click Edit in a resource's details pane, a new page opens, which contains more information and configuration options for the resource (see Resource (page description)).
The following table gives you an overview of the various content of the Resources page.
Table 916: Columns
Display |
Shows you the resource's name. |
TIP: You can show less data by using the column filters. For more information, see Filtering.
Resource (page description)
To open the Resource page go to Responsibilities > Governance Administration > Resources > Edit.
On the Resource page, you can perform various actions on the resource you selected beforehand.
To do this, click on one of the tiles: