지금 지원 담당자와 채팅
지원 담당자와 채팅

Identity Manager 9.1.3 - Web Designer Web Portal User Guide

General tips and getting started Security keys (WebAuthn) Requests
Setting up and configuring request functions Requesting products Saved for Later list Pending requests Displaying request history Resubmitting requests Canceling requests Renewing products with limit validity periods Unsubscribing products Displaying approvals Undoing approvals Request inquiries Auditing requests Escalated requests
Attestation
Managing attestations Attestors for attestation cases Sending attestation reminders My attestation cases Pending attestations Displaying attestation history Attestation inquiries Auditing attestations Escalation
Compliance Responsibilities
My responsibilities
Specifying keywords for requestable products Managing my departments Managing my application roles Managing my devices Managing my business roles Managing my identities Managing my cost centers Managing my multi-request resources Managing my multi requestable/unsubscribable resources Managing my resources Managing my software applications Managing my locations Managing my system entitlements Managing my system roles Managing my assignment resources
Delegating tasks Ownerships Auditing
Auditing departments Auditing application roles Auditing devices Auditing business roles Auditing identities Auditing cost centers Auditing multi-request resources Auditing multi requestable/unsubscribable resources Auditing resources Auditing software Auditing locations Auditing system roles Auditing system entitlements Auditing assignment resources
Governance administration
Managing departments Managing business roles Managing identities Managing cost centers Managing multi-request resources Managing multi requestable/unsubscribable resources Managing resources Managing locations System entitlements Managing system roles Managing assignment resources
Applications Calls Discovering your statistics on the home page Appendix: Attestation conditions and approval policies from attestation procedures Appendix: Page and menu descriptions
Information (Menu description) My requests (Menu description) Profile (Menu description) Help (Menu description) Request (Menu description) Attestation (Menu description)
My attestation status (page description) My actions (page description)
Pending attestations (page description)
Pending attestations – Attestation policies (page description) Pending attestations: One Identity Manager application roles (page description) Pending attestations: Departments (page description) Pending attestations: System roles (page description) Pending attestations: Locations (page description) Pending attestations: Business roles (page description) Pending attestations: PAM assets (page description) Pending attestations: PAM user accounts (page description) Pending attestations: Employees (page description) Pending attestations: Cost centers (page description) Pending attestations: User accounts (page description) Pending attestations: System entitlements (page description) Pending attestations: Resources (page description) Pending attestations: Assignment resources (page description) Pending attestation: Multi-request resources (page description) Pending attestations: Software (page description) Pending attestations: Multi requestable/unsubscribable resources (page description) Pending attestations: Devices (page description) Pending attestations – approvals (page description)
Attestation history (page description) Attestation inquiries (page description)
Auditing (page description) Governance administration (page description) Attestation escalation approval (page description)
Compliance (Menu description) Responsibilities (Menu description)
My responsibilities (page description)
Identities (page description) System entitlements (page description) Business roles (page description) System roles (page description) Departments (page description) Cost centers (page description) Locations (page description) Application roles (page description) Resources (page description) Assignment resources (page description) Multi-request resources (page description) Software (page description) Multi requestable/unsubscribable resources (page description) Devices (page description)
Delegating tasks (page description) Ownerships (page description) Auditing (page description)
Auditing – Departments (page description) Auditing – Application roles (page description) Auditing – Device (page description) Auditing – Business roles (page description) Auditing – Identity details (page description) Auditing – Cost center (page description) Auditing – Multi-request resources (page description) Auditing – Multi requestable/unsubscribable resources (page description) Auditing - Resources (page description) Auditing – Software (page description) Auditing – Locations (page description) Auditing – System roles (page description) Auditing - Assignment resource (page description) Auditing – Active Directory (page description) Auditing – Azure Active Directory (page description) Auditing – Custom target system group (page description) Auditing – Google Workspace (page description) Auditing – Domino (page description) Auditing – LDAP (page description) Auditing – Oracle E-Business Suite (page description) Auditing – Privileged Account Management (page description) Auditing – SAP R/3 (page description) Auditing – Unix (page description)
Governance administration (page description)
Business roles (page description) Identities (page description) Multi-request resources (page description) Multi requestable/unsubscribable resources (page description) Organization (page description) Resources (page description) System entitlements (page description) System roles (page description) Assignment resources (page description)
Calls (Menu description)

Approving escalated requests from newly created Active Directory groups

Identities can create Active Directory groups by requesting the New Active Directory security group or the New Active Directory distribution group product. As approver, you can make approval decisions about requests like this. If you approve the request, you must provide additional information about the group.

To approve a request to create a new Active Directory group

  1. In the menu bar, click Request > Escalation.

  2. On the IT Shop escalation page, apply a filter to limit the results to a specific requester, specific recipient or a specific request (see Displaying escalated requests).

  3. In the list, click the request for the new Active Directory group.

  4. In the details pane, click Configure the new group.

  5. In the dialog, enter additional information about the new group:

    • Name: Enter a name for the group.

    • Group scope: Select the scope that specifies the range of the group's usage within the domain or forest. The group's scope specifies where the group is allowed to issue permissions. You can select one of the following group scopes:

      • Global group: Global groups can be used to provide cross-domain authorizations. Members of a global group are only user accounts, computers, and groups belonging to the global group’s domain.

      • Local: Local groups are used when authorizations are issued within the same domain. Members of a domain local group can be user accounts, computers, or groups in any domain.

      • Universal: Universal groups can be used to provide cross-domain authorizations available. Universal group members can be user accounts and groups from all domains in one domain structure.

    • Container: Click Assign/Change and select a container for the group.

  6. Click OK.

  7. Next to the request, click (Approve).

  8. Click Next.

  9. On the IT Shop escalation - Approvals page, perform the following actions:

    • To provide a reason for all request approvals, enter the reason in the Reason for approvals field.

    • To use a predefined standard reason for all request approvals, select the reason in the Standard reason.

    • To provide an individual reason for an approval decision, click Enter a reason and enter your reason.

    TIP: By giving reasons, your approvals are more transparent and support the audit trail.

    NOTE: For more detailed information about standard reasons, see the One Identity Manager IT Shop Administration Guide.

  10. (Optional) To specify the validity period for a requested product, perform the following actions:

    1. In the list, in the Valid from column, click on a value.

    2. In the Valid from dialog, specify from when the product is valid.

    3. Click Close.

    4. In the list, in the Valid until column, click on a value.

    5. In the Valid until dialog, specify until when the product is valid.

  11. Click Save.

Related topics

Approving escalated requests from newly created SharePoint groups

Identities can create SharePoint groups by requesting the New SharePoint group product. As approver, you can make approval decisions about requests like this. If you approve the request, you must provide additional information about the group.

To approve a request to create a new SharePoint group

  1. In the menu bar, click Request > Escalation.

  2. On the IT Shop escalation page, apply a filter to limit the results to a specific requester, specific recipient or a specific request (see Displaying escalated requests).

  3. In the list, click the request for the new SharePoint group.

  4. In the details pane, click Enter information for the new group.

  5. In the dialog, enter additional information about the new group:

    • Site collection: Select a site collection where the group will be applied. A site collection groups sites together. User account and their access permissions are managed on the sites.

    • Display name: Enter a name for the new group.

    • Description: Enter a description for the SharePoint group.

  6. Click OK.

  7. Next to the request, click (Approve).

  8. Click Next.

  9. On the IT Shop escalation - Approvals page, perform the following actions:

    • To provide a reason for all request approvals, enter the reason in the Reason for approvals field.

    • To use a predefined standard reason for all request approvals, select the reason in the Standard reason.

    • To provide an individual reason for an approval decision, click Enter a reason and enter your reason.

    TIP: By giving reasons, your approvals are more transparent and support the audit trail.

    NOTE: For more detailed information about standard reasons, see the One Identity Manager IT Shop Administration Guide.

  10. (Optional) To specify the validity period for a requested product, perform the following actions:

    1. In the list, in the Valid from column, click on a value.

    2. In the Valid from dialog, specify from when the product is valid.

    3. Click Close.

    4. In the list, in the Valid until column, click on a value.

    5. In the Valid until dialog, specify until when the product is valid.

  11. Click Save.

Related topics

Approving new manager's escalated assignments

Managers can allocate new managers for their identities. To do this, they must select the new manager and a deadline in the future for changing managers (see Assigning other managers to my identities). An assignment of this type triggers a request of type New manager assignment.

You can cancel entitlements already assigned to the identity on the given date.

To approve an escalated assignment of a new manager

  1. In the menu bar, click Request > Escalation.

  2. On the IT Shop escalation page, apply a filter to limit the results to a specific requester, specific recipient or a specific request (see Displaying escalated requests).

  3. In the list, click the New manager assignment request.

  4. In the details pane, click Show the identity's entitlements.

  5. (Optional) If the identity has already been assigned entitlements or products, these will be removed or unsubscribed by default on the effective date. If you want the identity to retain these entitlements or products when transferring to the new manager, in the New manager assignment dialog, disable the check boxes next to the respective entitlements and products.

  6. Click Save.

  7. Next to the request, click (Approve).

  8. Click Next.

  9. On the IT Shop escalation - Approvals page, perform the following actions:

    • To provide a reason for all request approvals, enter the reason in the Reason for approvals field.

    • To use a predefined standard reason for all request approvals, select the reason in the Standard reason.

    • To provide an individual reason for an approval decision, click Enter a reason and enter your reason.

    TIP: By giving reasons, your approvals are more transparent and support the audit trail.

    NOTE: For more detailed information about standard reasons, see the One Identity Manager IT Shop Administration Guide.

  10. (Optional) To specify from when the new manager is responsible for the identity, perform the following:

    1. Click Valid from.

    2. In the Valid from field in the dialog, enter the date from which you want the new manager to take over.

    3. Click Close.

  11. Click Save.

Related topics

Appointing other approvers for escalated requests

You can give an another identity the task of approving a product request. To do this, you have the following options:

관련 문서

The document was helpful.

평가 결과 선택

I easily found the information I needed.

평가 결과 선택