Chat now with support
Chat with Support

Quest has tools and processes in place to identify, protect, detect, and remediate vulnerabilities and incidents when they occur, including external security partners. As part of our standard security operations, Quest does not use CrowdStrike in any of our operations. We are reviewing our third parties, and so far, there is minimal affect. It is Quest's policy not to provide further technical details unless they directly impact customer data.

Identity Manager 9.1 - Web Designer Web Portal User Guide

General tips and getting started Security keys (WebAuthn) Requests
Setting up and configuring request functions Requesting products Saved for Later list Pending requests Displaying request history Resubmitting requests Canceling requests Renewing products with limit validity periods Unsubscribing products Displaying approvals Undoing approvals Request inquiries Auditing requests Escalated requests
Attestation
Managing attestations Attestors for attestation cases Sending attestation reminders My attestation cases Pending attestations Displaying attestation history Attestation inquiries Auditing attestations Escalation
Compliance Responsibilities
My responsibilities
Specifying keywords for requestable products Managing my departments Managing my application roles Managing my devices Managing my business roles Managing my identities Managing my cost centers Managing my multi-request resources Managing my multi requestable/unsubscribable resources Managing my resources Managing my software applications Managing my locations Managing my system entitlements Managing my system roles Managing my assignment resources
Delegating tasks Ownerships Auditing
Auditing departments Auditing application roles Auditing devices Auditing business roles Auditing identities Auditing cost centers Auditing multi-request resources Auditing multi requestable/unsubscribable resources Auditing resources Auditing software Auditing locations Auditing system roles Auditing system entitlements Auditing assignment resources
Governance administration
Managing departments Managing business roles Managing identities Managing cost centers Managing multi-request resources Managing multi requestable/unsubscribable resources Managing resources Managing locations System entitlements Managing system roles Managing assignment resources
Applications Calls Discovering your statistics on the home page Appendix: Attestation conditions and approval policies from attestation procedures Appendix: Page and menu descriptions
Information (Menu description) My requests (Menu description) Profile (Menu description) Help (Menu description) Request (Menu description) Attestation (Menu description)
My attestation status (page description) My actions (page description)
Pending attestations (page description)
Pending attestations – Attestation policies (page description) Pending attestations: One Identity Manager application roles (page description) Pending attestations: Departments (page description) Pending attestations: System roles (page description) Pending attestations: Locations (page description) Pending attestations: Business roles (page description) Pending attestations: PAM assets (page description) Pending attestations: PAM user accounts (page description) Pending attestations: Employees (page description) Pending attestations: Cost centers (page description) Pending attestations: User accounts (page description) Pending attestations: System entitlements (page description) Pending attestations: Resources (page description) Pending attestations: Assignment resources (page description) Pending attestation: Multi-request resources (page description) Pending attestations: Software (page description) Pending attestations: Multi requestable/unsubscribable resources (page description) Pending attestations: Devices (page description) Pending attestations – approvals (page description)
Attestation history (page description) Attestation inquiries (page description)
Auditing (page description) Governance administration (page description) Attestation escalation approval (page description)
Compliance (Menu description) Responsibilities (Menu description)
My responsibilities (page description)
Identities (page description) System entitlements (page description) Business roles (page description) System roles (page description) Departments (page description) Cost centers (page description) Locations (page description) Application roles (page description) Resources (page description) Assignment resources (page description) Multi-request resources (page description) Software (page description) Multi requestable/unsubscribable resources (page description) Devices (page description)
Delegating tasks (page description) Ownerships (page description) Auditing (page description)
Auditing – Departments (page description) Auditing – Application roles (page description) Auditing – Device (page description) Auditing – Business roles (page description) Auditing – Identity details (page description) Auditing – Cost center (page description) Auditing – Multi-request resources (page description) Auditing – Multi requestable/unsubscribable resources (page description) Auditing - Resources (page description) Auditing – Software (page description) Auditing – Locations (page description) Auditing – System roles (page description) Auditing - Assignment resource (page description) Auditing – Active Directory (page description) Auditing – Azure Active Directory (page description) Auditing – Custom target system group (page description) Auditing – Google Workspace (page description) Auditing – Domino (page description) Auditing – LDAP (page description) Auditing – Oracle E-Business Suite (page description) Auditing – Privileged Account Management (page description) Auditing – SAP R/3 (page description) Auditing – Unix (page description)
Governance administration (page description)
Business roles (page description) Identities (page description) Multi-request resources (page description) Multi requestable/unsubscribable resources (page description) Organization (page description) Resources (page description) System entitlements (page description) System roles (page description) Assignment resources (page description)
Calls (Menu description)

Menu bar

The menu bar is displayed horizontally in the upper part of the screen and provides different menus and submenus.

Menus are structured by topic. Each menu corresponds to a topic and holds further menu items that are respective subtopics.

To open a menu

  1. In the menu bar, mouse-over a menu.

    This expands the menu and shows more menu items.

  2. Click a menu item.

Table 18: Menus in the menu bar

Menu

Menu item

Actions

Request

 

My requests

 

My actions

 

Auditing

 

Escalation

  • Edit escalate requests

Attestation

 

My attestation status

  • Show your pending
    attestation cases

  • Send reminder emails to attestors

 

My actions

 

Auditing

  • Show all attestation cases

 

Governance administration

  • Show attestation runs
  • Manage attestation policies

 

Escalation

  • Show escalated attestations

Compliance

 

 

 

My actions

 

Auditing

  • Show rule violations

  • Show policy violations

 

Governance
Administration

  • Show and edit risk index functions

  • Show compliance information

  • Show critical object overview

  • Show compliance rules and rule violations

  • Show company policies and policy violations

  • Show compliance rules with SAP functions and respective rule violations

  • Show compliance rules with SAP functions and respective rule violations

  • Show compliance rule violations of identities with critical SAP functions

Responsibilities

 

My responsibilities

 

Delegation

 

Responsibilities

 

Auditing

  • Audit identities

  • Audit business roles

  • Audit system roles

  • Audit application roles

  • Audit departments

  • Audit cost centers

  • Audit locations

  • Audit resources

  • Audit assignment resources

  • Audit multi-request resources

  • Audit multi requestable/unsubscribable resources

  • Audit software

  • Audit (Azure Active Directory, LDAP, SAP R/3, Universal Cloud Interface, UNIX)

 

Governance
Administration

  • Show and manage the company structure (organization)
  • Show and manage identities and their entitlements
  • Show and edit business roles
  • Show and manage system entitlements

Calls

 

 

 

New Call

 

Call history

Applications

 

Call stored application

Security keys (WebAuthn)

To open the Security key page, go to > My profile > Security keys (see Displaying security keys).

One Identity offers you the option to log in, simply and securely, to One Identity Manager web applications with help of (physical) security keys. If your system is configured for it and you own security keys like this, you must use the security key when you enter your password to log in to a web application (for example, to the Web Portal). These security keys support the W3C standard WebAuthn.

IMPORTANT: The WebAuthn standard is NOT support in Internet Explorer. Therefore, use another browser if you want to log in to One Identity Manager web application using security keys.

For more information about how you log in to the Web Portal with the help of security keys, see Logging in with security keys.

If you loose your security key or you cannot use it for any other reason, you can set up a new one using a passcode in the Password Reset Portal (see Setting up security keys).

On the Security keys page, view your security keys, set up new security keys, edit security keys and delete security keys.

The following tables give you an overview of the various functions and contents of the Security Keys page.

Table 19: Security keys

Column

Description

Registered

Shows you the date on which the key was registered.

Last used

Shows you the date on which the security key was last used.

Times used

Shows you how often the security key has been used.

Table 20: Controls

Control

Description

Edit

Use this button, to edit the respective security key.

Delete

Use this button to delete the respective security key.

New security key

Use this button to set up a new security key.

Detailed information about this topic

Displaying security keys

You can display your security keys at any time.

To display your security keys in the Web Portal

  1. In the header, click (Profile) > My profile.

  2. On the Overview page, click the Security keys tile.

    This opens the Security keys page and shows you your security keys and details.

To display your security keys in the Password Reset Portal

  1. Log in to the Password Reset Portal (see Logging in to the Password Reset Portal).

  2. On the Manage my passwords page, select the I want to manage my security keys option.

    This will display your security keys and details.

Related topics

Setting up security keys

You can set up or register new security keys at anytime.

NOTE: To set up a security key, you require a physical key that you can connect to your computer by USB or NFC, for example.

To set up a security key in the Web Portal

  1. In the header, click (Profile) > My profile.

  2. On the Overview page, click the Security keys tile.

  3. On the Security keys page, click New security key.

  4. Follow the instructions.

    This sets up the security key. On the Security keys page, you can edit the security key at anytime.

To set up a security key in the Password Reset Portal

  1. Log in to the Password Reset Portal (see Logging in to the Password Reset Portal).

    TIP: If you loose your security key or you cannot use it for any other reason, you can set up a new one using a passcode in the Password Reset Portal. To do this, you must ask your manager for a passcode and use it to log in to the Password Reset Portal.

  2. On the Manage my passwords page, select the I want to manage my security keys option.

  3. Click New security key.

  4. Follow the instructions.

    This sets up the security key. You can edit the security key at anytime.

Related topics
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating