Chat now with support
Chat with Support

We are currently experiencing issues on our phone support and are working diligently to restore services. For support, please sign in and create a case or email for assistance

Identity Manager 9.1 - Web Designer Web Portal User Guide

General tips and getting started Security keys (WebAuthn) Requests
Setting up and configuring request functions Requesting products Saved for Later list Pending requests Displaying request history Resubmitting requests Canceling requests Renewing products with limit validity periods Unsubscribing products Displaying approvals Undoing approvals Request inquiries Auditing requests Escalated requests
Managing attestations Attestors for attestation cases Sending attestation reminders My attestation cases Pending attestations Displaying attestation history Attestation inquiries Auditing attestations Escalation
Compliance Responsibilities
My responsibilities
Specifying keywords for requestable products Managing my departments Managing my application roles Managing my devices Managing my business roles Managing my identities Managing my cost centers Managing my multi-request resources Managing my multi requestable/unsubscribable resources Managing my resources Managing my software applications Managing my locations Managing my system entitlements Managing my system roles Managing my assignment resources
Delegating tasks Ownerships Auditing
Auditing departments Auditing application roles Auditing devices Auditing business roles Auditing identities Auditing cost centers Auditing multi-request resources Auditing multi requestable/unsubscribable resources Auditing resources Auditing software Auditing locations Auditing system roles Auditing system entitlements Auditing assignment resources
Governance administration
Managing departments Managing business roles Managing identities Managing cost centers Managing multi-request resources Managing multi requestable/unsubscribable resources Managing resources Managing locations System entitlements Managing system roles Managing assignment resources
Applications Calls Discovering your statistics on the home page Appendix: Attestation conditions and approval policies from attestation procedures Appendix: Page and menu descriptions
Information (Menu description) My requests (Menu description) Profile (Menu description) Help (Menu description) Request (Menu description) Attestation (Menu description)
My attestation status (page description) My actions (page description)
Pending attestations (page description)
Pending attestations – Attestation policies (page description) Pending attestations: One Identity Manager application roles (page description) Pending attestations: Departments (page description) Pending attestations: System roles (page description) Pending attestations: Locations (page description) Pending attestations: Business roles (page description) Pending attestations: PAM assets (page description) Pending attestations: PAM user accounts (page description) Pending attestations: Employees (page description) Pending attestations: Cost centers (page description) Pending attestations: User accounts (page description) Pending attestations: System entitlements (page description) Pending attestations: Resources (page description) Pending attestations: Assignment resources (page description) Pending attestation: Multi-request resources (page description) Pending attestations: Software (page description) Pending attestations: Multi requestable/unsubscribable resources (page description) Pending attestations: Devices (page description) Pending attestations – approvals (page description)
Attestation history (page description) Attestation inquiries (page description)
Auditing (page description) Governance administration (page description) Attestation escalation approval (page description)
Compliance (Menu description) Responsibilities (Menu description)
My responsibilities (page description)
Identities (page description) System entitlements (page description) Business roles (page description) System roles (page description) Departments (page description) Cost centers (page description) Locations (page description) Application roles (page description) Resources (page description) Assignment resources (page description) Multi-request resources (page description) Software (page description) Multi requestable/unsubscribable resources (page description) Devices (page description)
Delegating tasks (page description) Ownerships (page description) Auditing (page description)
Auditing – Departments (page description) Auditing – Application roles (page description) Auditing – Device (page description) Auditing – Business roles (page description) Auditing – Identity details (page description) Auditing – Cost center (page description) Auditing – Multi-request resources (page description) Auditing – Multi requestable/unsubscribable resources (page description) Auditing - Resources (page description) Auditing – Software (page description) Auditing – Locations (page description) Auditing – System roles (page description) Auditing - Assignment resource (page description) Auditing – Active Directory (page description) Auditing – Azure Active Directory (page description) Auditing – Custom target system group (page description) Auditing – Google Workspace (page description) Auditing – Domino (page description) Auditing – LDAP (page description) Auditing – Oracle E-Business Suite (page description) Auditing – Privileged Account Management (page description) Auditing – SAP R/3 (page description) Auditing – Unix (page description)
Governance administration (page description)
Business roles (page description) Identities (page description) Multi-request resources (page description) Multi requestable/unsubscribable resources (page description) Organization (page description) Resources (page description) System entitlements (page description) System roles (page description) Assignment resources (page description)
Calls (Menu description)

Risk – System role (page description)

To open the Risk – System role page go to Responsibilities > Governance Administration > System Roles > Edit > Risk.

On the Risk – System role page, you can:

The risk index is calculated from the sum of all attribute-based values and the maximum of all assignment-based values.

The following tables give you an overview of the various features and content on the Risk – System role page.

Table 956: Controls



View risk functions

Use this button to show the attributes and assignments that contribute to the calculated risk index.

Table 957: Columns



Risk index

Shows which property/assignment affects the risk index.


  • At root level: Shows the summarized risk index of the property/assignment.

  • At other levels: Shows other details about the properties/assignments.

Weighting/change value

Shows, depending on the type of calculation, the value used to weigh the determined risk index in the overall calculation or the value used to alter the risk index respectively.

History – System role (page description)

To open the History - System Role page go to Responsibilities > Governance Administration > System Roles > Edit > History.

On the History – System role page, you can see all the changes made to the system role (see System role history).

NOTE: Which changes are shown depends on your system's configuration.

The information is divided out on to three tabs:

  • Events: Shows you all the events, which affect a system role, either on a timeline or in a table.

    TIP: To navigate along the timeline, click in the pane and move the mouse left or right whilst holding down the left button.

    To zoom in or out, turn the mouse wheel.

  • Status overview: Shows you an overview of all assignments. It also shows how long each change was valid for. Use the status overview to track when changes were made and by whom. This way, you not only see the initial and current status but you also see all the steps in between.

  • Status comparison: You can select a date and display all the changes made from then until now. You can also show what the value of the property was at the selected point in time and what the value is now.

The following tables give you an overview of the different functions and content on the History – System role page.

Table 958: Controls



Events tab

Filter by

Use this function to filter the changes by a specific criteria. For example, you can just display changes from a certain user.

TIP: To remove the filter again, click (Reset filter) next to the corresponding filter.

Switch to table view

Use this button to display the changes in table form.

Switch to timeline view

Use this button to display the changes as a timeline.

Status comparison tab

Time and date picker

Select from which point on you want to see the changes.

Display changed values only

Disable this check box if you also want to see properties that have not changed since they were created.

Table 959: Controls in the details pane of a change




Opens the Status comparison tab.

Use this button to show all the changes that were made from the selected point in time until now. You can also show what the value of the property was at the selected point in time and what the value is now.

Table 960: Columns



Events tab (table view)

Change type

Shows the type of change.


Shows the name of the property that was changed.


Shows the value that was changed. For example, the name of a department.


Shows the date the change was made.


Shows the user that made the change.

Status overview tab


Shows the type of change.


Shows the name of the property that was changed.


Shows the value that was changed. For example, the name of a department.

Run started

Shows when the change was made.


Shows for how long the changed value applied or whether it is currently in use.

Status comparison tab


Show whether the change took place or not.

Change type

Shows the type of change.

Object type

Show the type of object involved in the change.


Show the name of the object that was changed.

Historical value

Shows the value before the change was made.

Current value

Shows the value that is currently in use.

TIP: You can show less data by using the column filters. For more information, see Filtering.

Usage – System role (page description)

To open the Usage - System role page, go to Responsibilities > Governance Administration > System Roles > Edit > Usage.

On the Usage – System role page, you can see which roles system role members belong to (see Displaying role memberships of system role members).

The information is displayed as a hierarchical chart, which shows you more about the role inheritance.

The following tables give you an overview of the different functions on the Usage – System role page.

Table 961: Controls



Role classes

You can select the main category of roles and organizations you want to display from this menu.

More information

Use this button to show the legend that explains the content of the overview.

Compliance reports – system role (page description)

To open the Compliance Reports – System Role page go to Responsibilities > Governance Administration > System Roles > Edit > Compliance Reports.

On the Compliance Reports – System role page you can:

The information is divided into three parts:

  • Policy violations: Shows all the current policy violations caused by the system role.

  • Compliance rule violations: Shows you the current rule violations of the identities to which the system role is assigned.

    TIP: For more information about resolving rule violations, see Resolving rule violations.

  • Identities: Risk index and entitlements: Displays all identities to which the system role is assigned. In addition, the number of entitlements and risk index assigned to these identities is displayed.

To display the information, select the item you want from the View menu.

The following table gives an overview of the content of the Compliance reports – System role page.

Table 962: Columns



Policy violations

Violating object

Show which object caused the rule violation.


Show the policy that was violated.


Show the status of the rule policy.

Compliance rule violations


Shows you the identity that caused the rule violation.

Rule violation

Shows the violated rule.

Approval state

Shows how or whether approval is granted to the rule violation.

Risk index (reduced)

Shows the risk index taking mitigating controls into account. A rule’s risk index can be reduced by a significance amount after mitigating controls have been applied.

Mitigating controls are processes that exist outside the One Identity Manager solution and that reduce the risk of violation. For more information, see Compliance – Governance Administration.

Identities: Risk index and entitlements


Shows you the identity to which this system role is assigned.

Risk index (calculated)

Shows you the identity's calculated risk index.

Assigned permissions

Shows you all the entitlements assigned to this identity.

TIP: You can show less data by using the column filters. For more information, see Filtering.

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating