지금 지원 담당자와 채팅
지원 담당자와 채팅

Identity Manager 9.1.3 - Web Portal User Guide

General tips and getting started Requests
Setting up and configuring request functions Requesting products Saved for Later list Managing my request templates Pending requests Displaying request history Canceling requests Renewing products with limit validity periods Unsubscribing products Displaying approvals Undoing approvals
Attestation Compliance Responsibilities
My responsibilities
Managing my departments Managing my application roles Managing my business roles Managing my identities Managing my cost centers Managing my locations Managing my system entitlements Managing my system roles
Delegating tasks Ownerships
Managing data
Managing identities Managing user accounts Managing system entitlements Managing departments Managing locations Managing cost centers Managing business roles Managing system roles
Appendix: Attestation conditions and approval policies from attestation procedures

Attesting PAM directory accounts

PAM directory accounts are attested using the PAM directory account attestation attestation procedure.

Condition

Description

All PAM directory accounts

Attests all PAM directory accounts.

Specific PAM directory accounts

Select the PAM directory accounts to attest.

PAM directory accounts on specific directories

Select the directories. Attests directory accounts that are found in this directory.

PAM directory accounts with matching name

Enter part of a name of PAM directory accounts with access to attest. All PAM directory accounts that have this pattern in their name are included.

Example: Per finds "Person", "Personal", "Perfection" and so on.

Attesting PAM accesses

PAM access are attested using the PAM access attestation attestation procedure.

Condition

Description

All PAM accesses

Attests all PAM access.

Specific PAN asset accounts

Select the PAM asset accounts with access to attest.

Specific PAM assets

Select the PAM assets with access to attest.

Specific PAM user accounts

Select the PAM user accounts with access to attest.

Specific PAM directory accounts

Select the PAM directory accounts with access to attest.

Specific PAM directories

Select PAM directories. Attests access to these PAM directories.

Specific access type

Select access types. Attests access that uses one of these access types.

PAM user accounts mapped to specific employees

Select the identities. Attests access through PAM user accounts with these identities assigned to them.

PAM user accounts with defined risk index

Use the Lower limit and Upper limit fields to define a risk index range. Attests access through PAM user accounts with a risk index in the chosen range.

PAM user accounts with matching name

Enter part of a name of PAM user accounts with access to attest. All PAM user accounts that have this pattern in their name are included. Example: Per finds "Person", "Personal", "Perfection" and so on.

Attesting departments

Department properties are attested using the Department attestation attestation procedure.

Application role attestation

Application role properties are attested using the Application role attestation attestation procedure.

관련 문서

The document was helpful.

평가 결과 선택

I easily found the information I needed.

평가 결과 선택