Chat now with support
Chat with Support

Identity Manager Data Governance Edition 8.0 - User Guide

Introduction Data Governance navigation node and views Administering Data Governance Edition Managing unstructured data access
Managing resource access Managing account access Working with security permissions Working with SharePoint security permissions Account access modeling Bringing data under governance
Classifying governed resources Managing governed resources using the web portal Data Governance Edition reports Troubleshooting Appendix: EMC, NetApp Filer, and SharePoint configuration details Appendix: PowerShell commands Appendix: Governed data attestation policies Appendix: Governed data company policies Appendix: Governed data risk index functions About us

Removing agents

All agents associated with a managed host are uninstalled when you remove a managed host. You can, however, remove a remote agent without removing the managed host using the Edit host settings task.

Note: You must have at least one agent assigned to the managed host in order to complete the edit operation.

To remove a remote agent from a managed host

  1. In the Navigation view, select Data Governance | Managed hosts.
  2. In the Managed hosts view (right pane), select the required managed host with a status of Managed.
  3. Select Edit host settings in the Tasks view or right-click menu.

    The Managed Host Settings dialog appears.

  4. Open the Agents page, select the agent to be removed and click Remove.

    Note: Removing the agent will also remove the managed paths associated with that agent. If that is the desired result, select Yes on the confirmation dialog.

  5. Click OK to remove the selected agent.

    Note: If you remove the last agent in the list, the OK button will not be available. You will need to specify at least one agent for the managed host before you can save your changes.

Managing unstructured data access

Managing resource access

One of the key security measures in an organization is to ensure that the access control policies are deployed effectively. Data Governance Edition provides you with several ways of managing access to data and measuring your progress to meet your security and compliance needs.

This section deals with looking at access management from a resource perspective. Managing account access provides details on managing access from an identity perspective.

Data Governance Edition enables you to:

  • Determine what is in your environment and who has access to it.

    Data Governance Edition provides a real-time view of data access, allowing for a centralized view and control of permission assignments throughout the managed domain.

  • Minimize IT’s role as gatekeeper.

    While IT is responsible for implementing access controls, the governing of data should be carried out by the people within the organization who actually own it. Data Governance Edition, along with the web portal, provides the workflow to accomplish this.

  • Improve access control consistency.

    Inconsistent application of permissions contributes to downtime, lost productivity, security breaches and more. Organizations seek to create a governed environment that provides users with access to exactly the resources they need — no more and no less.

Using Data Governance Edition, you can browse through the resources on the hosts in your managed domains to:

Related Topics

Browsing your environment

Searching for resources

Browsing your environment

A key challenge in improving data governance is keeping track of permissions within your environment. To ensure that data is secured in a manner that meets your business needs, you must be able to easily identify who has been given access and manage that access appropriately.

Once you have added a managed host, you can view access to its data through the:

  • Resource browser: This is a live view of data on the managed host. You can browse through the supported file systems and see all applied permissions and make changes where required. For more information, see Working with security permissions.

    Through the Resource browser you can also identify, in an easy to browse tree view, where the access on a resource differs from its parent and manage that access. For more information, see Managing security deviations.

  • Accounts view: This view displays the security index returned by Data Governance agents, which is controlled by the schedule and settings for each agent. You can browse to an account, and see all the data to which they have access on the managed host. For more information, see Managing account access.
  • Manage access view: This view summarizes the type of data to which an account has access and the specific data of that type. From here, you can also view detailed group membership information. For more information, see Managing account access and Viewing group membership. (You can only manage directly applied access from the Accounts view and the Security Index node. Accounts with indirect access, through group membership, can be managed from the Active Directory view.)

    Note: You can also view governed data access by selecting a user or group’s Account Overview.

    Note: You can also select to manage access from Active Directory users and groups. Select Active Directory in the Navigation view, choose the required user or group, and select Manage access from the Tasks view.

Once you have located the data, you can choose to edit the security as required or place it under governance to control access to it. For more information, see Bringing data under governance.

To view the access on a specific resource

  1. In the Navigation view, select Data Governance | Managed hosts.

    Note: To group this view by host type, right-click on the Host Type column header and select Group By This Column. If the Host Type column is not displayed, right-click on the column headers, select Column Chooser and drag Host Type into the column header.

  2. Open the Resource browser using one of the following methods:
    • Double-click the required managed host in the Managed hosts view.
    • Select the required managed host in the Managed hosts view and select Resource browser from the Tasks view or right-click menu.
  3. In the Resource browser, double-click through the resources to locate the required resource.

    The Resource browser displays the following information:

    • For a Windows computer, the shares and file system display.
    • For a SharePoint farm, each farm is represented as a hierarchy, with the farm as the top level, followed by web applications, site collections, sites and then the contents of the site. The contents of a list are shown as “list item”, regardless of the type of item in SharePoint. The Resource browser displays a list of the web applications on the selected farm.
    • For a Distributed File System Root, links are displayed at the top level. Browsing into a link shows its target paths and browsing into a target path takes you to the appropriate backing folder. While browsing a backing folder, the Distributed File System path is shown in the Location field at the top of the page.
    • For Cloud managed hosts, each site is represented by a folder hierarchy, with the Home top level site displayed as Site contents folder, followed by all other subsites. Each site contains a Site contents folder encompassing other nested folders. The contents of a site and document library are shown as 'folder' type, whereas, files are shown as 'file' type items. No other resource types are managed for Cloud managed hosts.

      NOTE: The resource browser and resource access reports do not display the limited access users or "previewer" accounts.

    You can use the Location field, at the top of the page, to view your current location. If you have navigated too far, you can move back by clicking the Up One Level button ( ).

  4. Select a resource in the top pane to display the permissions applied to that resource.

To view a selected user or group’s access on all managed hosts in your environment

  1. In the Navigation view, select Data Governance | Security Index.
  2. In the Accounts result list, double-click the required user or group.
  3. In the Tasks view, select Manage access.

    All the access points for the selected user or group are displayed. By default, the results are listed by managed host.

  4. Expand a managed host to display all the resources where the selected user or group has access.

    You are able to see if the access has been granted explicitly (Directly held — the account is in the ACL) or through group membership (Indirectly held — the account belongs to a group that is in the ACL).

  5. Browse through the managed hosts and their resources to view and manage the security on the object.

    Once you have located the resource, you can select to manage its access and create reports that detail account access and group membership information.

To view all the users and groups that have access on a specific managed host

  1. In the Navigation view, select Data Governance | Managed hosts.
  2. Select the required managed host from the Managed hosts view.
  3. In the Tasks view, select Accounts view.

    All resource types where users and groups have some level of access displays. By default, the results are grouped by resource type.

  4. Expand a resource type to display all the accounts that have access.

    For more information, see Managing account access.

Related Documents