Chat now with support
Chat with Support

Identity Manager 8.1.5 - Administration Guide for Connecting to a Universal Cloud Interface

Managing Universal Cloud Interface environments Setting up synchronization with a cloud application in Universal Cloud Interface Basic data for managing a Universal Cloud Interface environment Cloud target systems Container structures in a cloud target system Cloud user accounts Cloud groups Cloud permissions controls Provisioning object changes Reports about objects in cloud target systems Configuration parameters for managing cloud target systems Default project template for cloud applications in the Universal Cloud Interface

Editing search criteria for automatic employee assignment

The criteria for employee assignments are defined for the target system. In this case, you specify which user account properties must match the employee’s properties such that the employee can be assigned to the user account. You can limit search criteria further by using format definitions. The search criterion is written in XML notation to the Search criteria for automatic employee assignment column (AccountToPersonMatchingRule) in the CSMRoot table.

Search criteria are evaluated when employees are automatically assigned to user accounts. Furthermore, you can create a suggestion list for assignments of employees to user accounts based on the search criteria and make the assignment directly.

NOTE: When the employees are assigned to user accounts on the basis of search criteria, user accounts are given the default manage level of the account definition entered in the user account's target system. You can customize user account properties depending on how the behavior of the manage level is defined.

It is not recommended to make assignments to administrative user accounts based on search criteria. Use Change master data to assign employees to administrative user accounts for the respective user account.

To define employee assignment criteria for a cloud target system

  1. Select the Cloud Target Systems | Basic configuration data | Cloud target systems category.
  2. Select the target system in the result list.
  3. Select the Define search criteria for employee assignment task.
  4. Specify which user account properties must match with which employee so that the employee is linked to the user account.
    Table 33: Example of search criteria for user accounts
    Apply to Column for employee Column for user account
    Cloud user accounts FirstName AND LastName FirstName AND LastName
  5. Save the changes.
Direct assignment of employees to user accounts based on a suggestion list

In the Assignments pane, you can create a suggestion list for assignments of employees to user accounts based on the search criteria and make the assignment directly. User accounts are grouped in different views for this.

Table 34: Manual assignment view

View

Description

Suggested assignments

This view lists all user accounts to which One Identity Manager can assign an employee. All employees are shown who were found using the search criteria and can be assigned.

Assigned user accounts

This view lists all user accounts to which an employee is assigned.

Without employee assignment

This view lists all user accounts to which no employee is assigned and for which no employee was found using the search criteria.

TIP: By double-clicking on an entry in the view, you can view the user account and employee master data.

To apply search criteria to user accounts

  • Click Reload.

    All possible assignments based on the search criteria are found in the target system for all user accounts. The three views are updated.

To assign employees directly using a suggestion list

  1. Click Suggested assignments.
    1. Check the Selection box of all the user accounts to which you want to assign the suggested employees. Multi-select is possible.
    2. Click Assign selected.
    3. Confirm the security prompt with Yes.

      The employees found using the search criteria are assigned to the selected user accounts.

    – OR –

  2. Click No employee assignment.
    1. Click the Select employee option of the user account to which you want to assign an employee. Select an employee from the menu.
    2. Check the Selection box of all the user accounts to which you want to assign the selected employees. Multi-select is possible.
    3. Click Assign selected.
    4. Confirm the security prompt with Yes.

      The employees displayed in the Employee column are assigned to the selected user accounts.

To remove assignments

  1. Click Assigned user accounts.
    1. Click the Selection box of all user accounts you want to delete the employee assignment from. Multi-select is possible.
    2. Click Remove selected.
    3. Confirm the security prompt with Yes.

      The assigned employees are removed from the selected user accounts.

For more detailed information about defining search criteria, see the One Identity Manager Target System Base Module Administration Guide.

Related topics

Locking and unlocking user accounts

The way you disable user accounts depends on how they are managed.

Scenario:
  • The user account is linked to employees and is managed through account definitions.

User accounts managed through account definitions are disabled when the employee is temporarily or permanently disabled. The behavior depends on the user account manage level. Accounts with the Full managed manage level are disabled depending on the account definition settings. For user accounts with a manage level, configure the required behavior using the template in the CSMUser.AccountDisabled column.

Scenario:
  • The user accounts are linked to employees. No account definition is applied.

User accounts managed through user account definitions are disabled when the employee is temporarily or permanently disabled. The behavior depends on the QER | Person | TemporaryDeactivation configuration parameter

  • If the configuration parameter is set, the employee’s user accounts are disabled when the employee is permanently or temporarily disabled.

  • If the configuration parameter is not set, the employee’s properties do not have any effect on the associated user accounts.

To disable the user account when the configuration parameter is disabled

  1. In the Manager, select the Cloud Target Systems | <target system> | User accounts category.

  2. Select the user account in the result list.

  3. Select the Change master data task.

  4. On the General tab, set the Account is disabled option.

  5. Save the changes.
Scenario:
  • User accounts not linked to employees.

To disable a user account that is no longer linked to an employee

  1. In the Manager, select the Cloud Target Systems | <target system> | User accounts category.

  2. Select the user account in the result list.

  3. Select the Change master data task.

  4. On the General tab, set the Account is disabled option.

  5. Save the changes.
Related topics

For more detailed information about deactivating and deleting employees and user accounts, see the One Identity Manager Target System Base Module Administration Guide.

Deleting user accounts

You can delete a user account from the result list or the menu base. After the security prompt has been confirmed, the user account is deleted from the One Identity Manager database.

Configuring deferred deletion

By default, user accounts are finally deleted from the database after 30 days. During this period you have the option to reactivate the user accounts. A restore is not possible once deferred deletion has expired. In the Designer, you can set an alternative delay on the CMSUser table.

To delete a user account

  1. Select the Cloud Target Systems | <target system> | User accounts category.
  2. Select the user account in the result list.
  3. Click in the result list.
  4. Confirm the security prompt with Yes.

Once you have deleted a user account, it is also deleted in the Universal Cloud Interface Module through the provisioning process and then in the cloud application. The deletion is logged as a pending change. You can see whether the user account has been deleted in the cloud application from the process status for the pending change. The same applies if memberships of user accounts in groups are deleted.

User accounts are not allowed to be deleted in certain cloud applications. These user accounts cannot be deleted in the Manager, only disabled. You can configure the appropriate behavior in the cloud target system.

To prevent user accounts from being deleted

  1. Select the Cloud Target Systems | Basic configuration data | Cloud target systems category.
  2. Select the target system in the result list. Select the Change master data task.
  3. Set the User account deletion not permitted option.
  4. Save the changes.
Detailed information about this topic

Cloud groups

Groups map the objects that control access to cloud resources though the cloud application. A user account obtains access permissions to cloud resources through its group memberships.

To edit group master data

  1. In the Manager, select the Cloud Target Systems | <target system> | Groups category.

  2. Select the group in the result list and run the Change master data task.

  3. On the master data form, edit the master data for the group.

  4. Save the changes.
Detailed information about this topic
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating