You can quickly and easily locate specific resources to manage through the search option.
|
Note: The search feature is not available for SharePoint and DFS managed hosts. |
Once you have located the resource, you can choose to place the resource under governance so that it is available to use in policies and attestations, publish it to the IT Shop so that it is available for employees and business owners to request and grant access to it, assign a business owner, or edit the security as required.
To search for a resource
In the search field, enter the search criteria.
You can use the * character to search for resources. For example, enter Finance* to return all resources that begin with Finance, *.txt returns all resources that end with .txt, and *Fin* returns all resources that contain Fin in their name.
By default all items that match your query are returned. To limit the search results, click the arrow control to the right of the search button and select how many items you would like to return.
You have the option of returning the top 100, 200, or 500 results, or all the items that match your query.
As people join, depart, and move through your organization, you need to change their data access. With Data Governance Edition, you can validate that users and groups have been granted access to all the resources they need, ensure that they do not have access to excess resources, and manage their access when problems arise.
Whether you select to manage a particular user or group through the Security Index node in the Navigation view or through the Accounts view for a selected managed host, you have access to all the detailed security index information that has been returned by the agents within your environment.
You are able to:
Before altering access for users or groups, you may want to compare accounts or view the potential effects of group membership changes. For more information, see Comparing accounts.
|
Note: To identify where accounts have access, for SharePoint web apps that use Windows claims, the claim is associated with the relevant Active Directory account for all governed data. |
To view access for a specific managed host
Select Accounts view from the Tasks view or right-click menu.
All resource types where users and groups have some level of access displays. By default, the results are grouped by resource type. Expand a resource type to display all the accounts that have access.
Browse through the resources, select the required user or group, and select Manage access from the Tasks view or right-click menu.
The Manage Access view appears displaying the managed hosts where the selected user or group has access.
Select the Group Memberships tab to see how the account has gained access through group membership.
|
Note: This tab is not available for SharePoint account types. |
The first level beneath the root is all the groups for which the account is a direct member. The groups contained beneath each of those groups the account has gained access indirectly from the first-level groups, and so on.
You are able to see if the access has been granted explicitly (Directly held — the account is in the ACL) or through group membership (Indirectly held — the account belongs to a group that is in the ACL).
Once you have located the resource, you can choose to place the resource under governance to secure it; publish it to the IT Shop so that it is available for users and business owners to request and grant access to it; copy, remove, or replace access on the resource; edit the security as required; and create reports that detail account access and group membership information.
To manage access for a specific user or group
In the Navigation view, select Data Governance | Security Index.
All the users and groups that have been returned by the agent's scan is available in the Accounts result list.
From here, you can see the access for a selected user or group on all managed hosts within your environment. You can quickly see whether this access has been granted explicitly (Directly held — the account is in the ACL) or through group membership (Indirectly held — the account belongs to a group that is in the ACL) and select to manage their access.
The first level beneath the root is all the groups for which the account is a direct member. The groups contained beneath each of those groups the account has gained access indirectly from the first-level groups, and so on.
Once you have located the resource, you can choose to place the resource under governance to secure it; publish it to the IT Shop so that it is available for users and business owners to request and grant access to it; copy, remove, or replace access on the resource; edit the security as required; and create reports that detail account access and group membership information.
Cloning, replacing, and removing access for a group of accounts
Adding an account to a resource with no associated access information
Bringing data under governance
Working with security permissions
Because user and group access may be the result of several layers of nested groups, it may be difficult to assess how a specific account has gained access to a resource. Using the Group Memberships view, you can easily see group membership, computers, and resource types where the user or group has both direct access and indirect access by group membership and ensure that group access is properly assigned.
To view group membership information
On the Manage Access view, click the Group Memberships tab to view all group members for the selected user or group — both direct and indirect.
|
Note: The Group Membership tab is only available for Active Directory users and groups. |
This opens a tree view with the selected account at the root. The first level beneath the root is all the groups for which the account is a direct member. The groups contained beneath each of those groups the account has gained access indirectly from the first-level groups, and so on. This view allows you to select any group to see the resource access granted by being a member of that particular group.
When you select Manage access for a user or group, you will see all the resources they have access to on the managed hosts within your organization. This access may be both applied directly and indirectly (gained through group membership).
From here, you can select to clone, replace, or remove access for a single account or for multiple users and groups at once. It is important to note that all actions are made on the actual security settings for the resource; actions will not alter group membership.
You can view the progress of these changes by selecting Data Governance | Background Operations in the Navigation view.
To clone, replace, or remove access for a group of accounts
In the bottom pane, select the resource and select one of the following tasks from the Tasks view:
Replace account to grant the currently configured access to another user or group. Select the user or group that you want to replace the existing user or group with, and click OK.
|
Note: If you see a message in the list of issues that the forest or domain could not be contacted, this could be because the trusted domain has not been synchronized with One Identity Manager. |
© 2021 One Identity LLC. ALL RIGHTS RESERVED. Feedback Terms of Use Privacy