Chat now with support
Chat with Support

Quest has tools and processes in place to identify, protect, detect, and remediate vulnerabilities and incidents when they occur, including external security partners. As part of our standard security operations, Quest does not use CrowdStrike in any of our operations. We are reviewing our third parties, and so far, there is minimal affect. It is Quest's policy not to provide further technical details unless they directly impact customer data.

Identity Manager 9.0 LTS - Administration Guide for Connecting to a Universal Cloud Interface

Managing Universal Cloud Interface environments Synchronizing a cloud application in the Universal Cloud Interface
Setting up initial synchronization with a cloud application in the Universal Cloud Interface Customizing the synchronization configuration Running synchronization Tasks following synchronization Troubleshooting Ignoring data error in synchronization Pausing handling of target system specific processes (Offline mode)
Provisioning object changes Managing cloud user accounts and employees Managing assignments of cloud groups and system entitlements Login information for cloud user accounts Mapping cloud objects in One Identity Manager
Cloud target systems Container structures Cloud user accounts Cloud groups Cloud system entitlements Cloud permissions controls Reports about objects in cloud target systems
Handling cloud objects in the Web Portal Basic data for managing a Universal Cloud Interface environment Configuration parameters for managing cloud target systems Default project template for cloud applications in the Universal Cloud Interface

Account definitions for cloud user accounts

One Identity Manager has account definitions for automatically allocating user accounts to employees. You can create account definitions for every target system. If an employee does not yet have a user account in a target system, a new user account is created. This is done by assigning account definitions to an employee.

The data for the user accounts in the respective target system comes from the basic employee data. The employees must have a central user account. The assignment of the IT operating data to the employee’s user account is controlled through the primary assignment of the employee to a location, a department, a cost center, or a business role. Processing is done through templates. There are predefined templates for determining the data required for user accounts included in the default installation. You can customize templates as required.

Specify the manage level for an account definition for managing user accounts. The user account’s manage level specifies the extent of the employee’s properties that are inherited by the user account. This allows an employee to have several user accounts in one target system, for example:

  • Default user account that inherits all properties from the employee.

  • Administrative user account that is associated to an employee but should not inherit the properties from the employee.

For more detailed information about the principles of account definitions, manage levels, and determining the valid IT operating data, see the One Identity Manager Target System Base Module Administration Guide.

The following steps are required to implement an account definition:

  • Creating account definitions

  • Configuring manage levels

  • Creating the formatting rules for IT operating data

  • Collecting IT operating data

  • Assigning account definitions to employees and target systems

Detailed information about this topic

Creating account definitions

To create a new account definition

  1. In the Manager, select the Cloud Target Systems > Basic configuration data > Account definitions > Account definitions category.

  2. Click in the result list.

  3. On the main data form, enter the main data of the account definition.

  4. Save the changes.

Detailed information about this topic

Editing account definitions

To edit an account definition

  1. In the Manager, select the Cloud Target Systems > Basic configuration data > Account definitions > Account definitions category.

  2. Select an account definition in the result list.

  3. Select the Change main data task.

  4. Enter the account definition's main data.

  5. Save the changes.

Related topics

Main data for account definitions

Enter the following data for an account definition:

Table 11: Main data for an account definition

Property

Description

Account definition

Account definition name.

User account table

Table in the One Identity Manager schema that maps user accounts.

Target system

Target system to which the account definition applies.

Required account definition

Specifies the required account definition. Define the dependencies between account definitions. When this account definition is requested or assigned, the required account definition is assigned automatically.

Leave empty for cloud target systems.

Description

Text field for additional explanation.

Manage level (initial)

Manage level to use by default when you add new user accounts.

Risk index

Value for evaluating the risk of assigning the account definition to employees. Set a value in the range 0 to 1. This input field is only visible if the QER | CalculateRiskIndex configuration parameter is set.

For more information, see the One Identity Manager Risk Assessment Administration Guide.

Service item

Service item through which you can request the account definition resource in the IT Shop. Assign an existing service item or add a new one.

IT Shop

Specifies whether the account definition can be requested through the IT Shop. The account definition can be requested by an employee through the Web Portal and distributed using a defined approval process. The resource can also be assigned directly to employees and roles outside the IT Shop.

Only for use in IT Shop

Specifies whether the account definition can only be requested through the IT Shop. The account definition can be requested by an employee through the Web Portal and distributed using a defined approval process. The account definition cannot be directly assigned to roles outside the IT Shop.

Automatic assignment to employees

Specifies whether the account definition is automatically assigned to all internal employees. To automatically assign the account definition to all internal employee, use the Enable automatic assignment to employees The account definition is assigned to every employee that is not marked as external. Once a new internal employee is created, they automatically obtain this account definition.

To automatically remove the account definition assignment from all employees, use the Disable automatic assignment to employees. The account definition cannot be reassigned to employees from this point on. Existing account definition assignments remain intact.

Retain account definition if permanently disabled

Specifies the account definition assignment to permanently deactivated employees.

Option set: The account definition assignment remains in effect. The user account remains intact.

Option not set (default): The account definition assignment is not in effect.

Retain account definition if temporarily disabled

Specifies the account definition assignment to temporarily deactivated employees.

Option set: The account definition assignment remains in effect. The user account remains intact.

Option not set (default): The account definition assignment is not in effect.

Retain account definition on deferred deletion

Specifies the account definition assignment on deferred deletion of employees.

Option set: The account definition assignment remains in effect. The user account remains intact.

Option not set (default): The account definition assignment is not in effect.

Retain account definition on security risk

Specifies the account definition assignment to employees posing a security risk.

Option set: The account definition assignment remains in effect. The user account remains intact.

Option not set (default): The account definition assignment is not in effect.

Resource type

Resource type for grouping account definitions.

Spare field 01 - spare field 10

Additional company-specific information. Use the Designer to customize display names, formats, and templates for the input fields.

Groups can be inherited

Specifies whether the user account can inherit groups through the linked employee. If the option is set, the user account inherits groups through hierarchical roles, in which the employee is a member, or through IT Shop requests.

  • If you add an employee with a user account to a department, for example, and you have assigned groups to this department, the user account inherits these groups.

  • If an employee has requested group membership in the IT Shop and the request is granted approval, the employee's user account only inherits the group if the option is set.

System entitlements 1 can be inherited

System entitlements 2 can be inherited

System entitlements 3 can be inherited

Specifies whether the user account may inherit system entitlements of the corresponding type through the linked employee. If the option is set, the user account inherits groups through hierarchical roles, in which the employee is a member, or through IT Shop requests.

  • For example, if you add an employee with a user account to a department and you have assigned system entitlements to that department, the user account inherits those system entitlements.

  • If an employee has requested an assignment to a system entitlement in the IT Shop and this request is approved and assigned, then the employee's user account inherits this system entitlement only if the option is enabled.

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating