Main data – System role (page description)
To open the Main data – System role page go to Responsibilities > My Responsibilities > System Roles > select system role > Main data.
On the Main data - System role page, you can show and edit the system role's main data (see Displaying and editing my system roles' main data).
The following tables give you an overview of the different functions and content on the Main data – System role page.
Table 336: Controls
Save |
Use this button to save the changes to the main data. |
You can change the following main data.
Table 337: System role main data
System role |
Enter a full, descriptive name for the system role. |
Display name |
Enter a name for displaying the system role in the One Identity Manager tools. |
Internal product name |
Enter a company internal name for the system role. |
System role type |
Select the role type of the system role.
The system role type specifies which type of company resources make up the system role. |
Service item |
Click Create a new service item and create a new service item (a product).
If a service item is already assigned, click Change and select a service item.
You cannot use a system role until a service item has been assigned to it. |
System role manager |
Click Change and select the identity responsible for the system role. This identity can edit the system role's main data and be used as an attestor for system role properties.
If the system role can be requested in the IT Shop, the manager will automatically be a member of the application role for product owners assigned the service item. |
Comment |
Enter a comment for the system role. |
IT shop |
Select the check box if the system role can also be requested through the IT Shop. This system role can be requested by identities through the Web Portal and the request granted by a defined approval process. The system role can still be assigned directly to identities and hierarchical roles. For detailed information about IT Shop, see the One Identity Manager IT Shop Administration Guide. |
Only use in IT Shop |
Select the check box if the system role can only be requested through the IT Shop. This system role can be requested by identities through the Web Portal and the request granted by a defined approval process. The system role may not be assigned directly to hierarchical roles. |
Entitlements – System role (page description)
To open the Entitlements – System role page go to Responsibilities > My Responsibilities > System Roles > select system role > Entitlements.
On the Entitlements – System role page, you can:
The following tables give you an overview of the different functions and content on the Entitlements – System role page.
Table 338: Controls
New |
Use this button to add a new entitlement to the system role (see Adding my system roles' entitlements). Identities that this system role is assigned to, automatically obtain membership in the object assigned here. |
Remove |
Use this button to delete selected entitlements . To do this, select the check box in front of the entitlement you want to delete and click the button. |
Table 339: Columns
Entitlement |
Shows you the entitlement's name. |
Origin |
Shows you how the entitlement was assigned. For example, the entitlement might have been assigned through a dynamic role. |
Entitlement type |
Shows the entitlement type (for example, report subscriptions, account definition, resources). |
TIP: You can show less data by using the column filters. For more information, see Filtering.
Memberships – System role (page description)
To open the Memberships – System role page go to Responsibilities > My Responsibilities > System Roles > select system role > Memberships.
On the Memberships - System role page, you can:
The following tables give you an overview of the different functions and content on the Memberships – System role page.
Table 340: Controls
Request memberships |
Use this button to request the system role for identities (see Assigning identities to my system roles). |
Deleting memberships |
Use this button to delete the system role's assignment for selected identities (see Removing identities from my system roles).
Select the check box in front of the identities whose membership in the system role you want to delete and click this button. |
Table 341: Columns
Identity |
Shows you the name of the identity to which the system role is assigned. |
Origin |
Shows you whether the system role was assigned to the identity directly or indirectly. |
TIP: For each identity, you can see more useful information in the details pane. To do this, click the appropriate instance in the list. If the identity did not receive the membership through a direct assignment (for example, through an assignment request or delegation), the Request tab provides more information:
-
Information: Displays general information about a request. The information displayed varies and is dependent on the service category from which the request was triggered.
-
Workflow: Displays the life cycle chronologically as from the time of request.
-
Compliance: Displays possible rule violations for this request.
-
Entitlements: Show which entitlement are assigned to the role (if a role was requested).
TIP: You can show less data by using the column filters. For more information, see Filtering.
Compliance – System role (page description)
To open the Compliance – System role page go to Responsibilities > My Responsibilities > System Roles > select system role > Compliance.
On the Compliance – System role page, you can see the rule violations caused by the system role. (see Displaying my system roles' rule violations).
The following table gives an overview of the content of the Compliance – System role page.
Table 342: Columns
Entitlement |
Shows the entitlement that caused the rule violation. |
Rule |
Shows the rule that was violated. |
Risk index |
Shows the severity of the rule violation (meaning the calculated risk index). The higher this value is, the higher the risk that this rule violation poses. |
Risk index (reduced) |
Shows the risk index taking mitigating controls into account. A rule’s risk index can be reduced by a significance amount after mitigating controls have been applied.
Mitigating controls are processes that exist outside the One Identity Manager solution and that reduce the risk of violation. For more information, see Compliance – Governance Administration. |
TIP: On the following tabs, you can show other useful information about each rule violation in the pane. To do this, click the corresponding entry in the list.
TIP: You can show less data by using the column filters. For more information, see Filtering.