Chat now with support
Chat with Support

Identity Manager 8.0 - Target System Base Module Administration Guide

Deferred Deletion of an Employee

Deferred Deletion of an Employee

When an employee is deleted, they are tested to see if user accounts and company resources are still assigned, or if there are still pending requests in the IT Shop. The employee is marked for deletion and therefore locked out of further processing. Before an employee can finally be deleted from the One Identity Manager database, you need to delete all company resource assignments and close all requests. You can do this manually or implement custom processes to do it. All the user accounts linked to one employee could be deleted by default by the One Identity Manager once this employee has been deleted. If no more company resources are assigned, the employee is finally deleted.

Scenario: user accounts are linked to employees and are managed through account definitions.

  • Specify in the account definitions, how deletion of an employee affects their user accounts. The user accounts can be locked or enabled for the period that deletion is deferred. In any case, the user accounts are deleted from the One Identity Manager database once the deferred deletion period has expired.

Scenario: user accounts are linked to employees. No account definition is applied.

  • Implement custom processes to delete linked user accounts. The employee stays marked for deletion until all user accounts are deleted and assignments to company resources have been removed. The user accounts remain enabled with deferred deletion until they are physically deleted.
Related Topics

Disabling and Deleting Account Definitions

Disabling and Deleting Account Definitions

If user accounts are managed through account definitions, you can specify the desired behavior for handling user accounts and group memberships through account definitions and manage levels for temporary disabling, permanent disabling, deletion and security risk to employees.

You can define special handling for each target system belonging to a target system type, through the relationship between the target system and account definition. For more information, see Using Account Definitions to Create User Accounts.

You can configure the following behavior:

  1. Assigning account definitions to employees

    The effects on account definition inheritance of temporary disabling, permanent disabling, deletion and security risk to employees is specified for each account definition. The settings of previous account definitions are overwritten.

    You may want employees that are disabled or marked for deletion to inherit account definitions to ensure that all necessary permissions are made immediately available when the employee is reactivated at a later time.

    IMPORTANT: An employee keeps its linked user accounts as long as an account definition applies to the employee. If the account definition assignment no longer applies, the user account created through this account definition, is deleted.

    The following user account definition options are available for mapping behavior.

    Table 8: Account Definition Master Data for Account Definition Assignment Behavior
    Property Description

    Retain account definition if permanently disabled

    Specifies the account definition assignment to permanently disabled employees.

    Option set: the account definition assignment remains in effect. The user account stays the same.

    Option not set: the account definition assignment is not in effect.The associated user account is deleted.

    Retain account definition if temporarily disabled

    Specifies the account definition assignment to temporarily disabled employees.

    Option set: the account definition assignment remains in effect. The user account stays the same.

    Option not set: the account definition assignment is not in effect.The associated user account is deleted.

    Retain account definition on deferred deletion

    Specifies the account definition assignment on deferred deletion of employees.

    Option set: the account definition assignment remains in effect. The user account stays the same.

    Option not set: the account definition assignment is not in effect.The associated user account is deleted.

    Retain account definition on security risk

    Specifies the account definition assignment to employees posing a security risk .

    Option set: the account definition assignment remains in effect. The user account stays the same.

    Option not set: the account definition assignment is not in effect.The associated user account is deleted.

  2. Handling employee user accounts

    The effects on user accounts of temporary disabling, permanent disabling, deletion and security risk of an employee is specified for each manage level.

    In order to remove permissions from an employee when they are being disabled or deleted, the employee’s user accounts can be locked. If the employee is reinstated at a later date, the user accounts are also reactivated.

    The following options are available for each manage level on an account definition for handling user accounts:

    Table 9: Manage Level Master Data for Handling User Accounts
    Property Description

    Lock user accounts if temporarily disabled

    Specifies whether user accounts of temporarily disabled employees are locked.

    Lock user accounts if permanently disabled

    Specifies whether user accounts of permanently disabled employees are locked.

    Lock user accounts if deletion is deferred

    Specifies whether user accounts of employees marked for deletion are locked.

    Lock user accounts if security is at risk

    Specifies whether user accounts of employees posing a security risk are locked.

  3. Inheritance of group memberships by the employee's user accounts

    The effects on user account group memberships of temporary disabling, permanent disabling, deletion and security risk of an employee is specified for each manage level.

    If an employee is deactivated or marked for deletion, inheritance of groups memberships can be suppressed for the account definition target system. You might want this behavior if an employee's user accounts and mailboxes are locked and therefore cannot be included in distribution lists. During this deactivation period, no inheritance processes should be calculated for this employee. Existing group memberships are deleted.

    The following options are available for each manage level on an account definition for handling group memberships:

    Table 10: Manage Level Master Data for Handling Group Memberships
    Property Description

    Retain groups if temporarily disabled

    Specifies whether user accounts of temporarily disabled employees retain their group memberships.

    Retain groups if permanently disabled

    Specifies whether user accounts of permanently disabled employees retain group memberships.

    Retain groups on deferred deletion

    Specifies whether user accounts of employees marked for deletion retain their group memberships.

    Retain groups on security risk

    Specifies whether user accounts of employees posing a security risk retain their group memberships.

    Retain groups if user account disabled

    Specifies whether locked user accounts retain their group memberships.

The Unified Namespace

The Unified Namespace

The Unified Namespace is a virtual system in which different target systems can be mapped with their structures, user accounts, system entitlements and memberships. The Unified Namespace allows a general, cross target system mapping of all connected target systems. This means that target systems like Active Directory domains can be mapped just the same as custom target systems.

You can use other One Identity Manager core functionality across target systems by mapping target systems in the Unified Namespace, such as identity audit, attestation or report functions. You are supplied with several reports by default.

Mapping Target System Objects in Unified Namespace

Mapping Target System Objects in Unified Namespace

Each Unified Namespace object type joins the various tables of the One Identity Manager data model required for mapping connected target systems. The various target system tables are joined in database layers. This allows different object properties to be mapped uniformly.

Use the following database views to execute compliance checks or attestation across target systems and also to create reports across target systems.

ClosedContainer (UNSContainer)
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating