Chat now with support
Chat with Support

Identity Manager 9.2 - Administration Guide for Privileged Account Governance

About this guide Managing a Privileged Account Management system in One Identity Manager Synchronizing a Privileged Account Management system
Setting up the initial synchronization of a One Identity Safeguard Customizing the synchronization configuration for One Identity Safeguard Running synchronization Tasks following synchronization Troubleshooting Ignoring data error in synchronization Pausing handling of target system specific processes (Offline mode)
Managing PAM user accounts and identities Managing assignments of PAM user groups Login credentials for PAM user accounts Mapping PAM objects in One Identity Manager
PAM appliances PAM user accounts PAM user groups PAM assets PAM asset groups PAM asset accounts PAM directory accounts PAM account groups PAM directories PAM partitions PAM entitlements PAM access request policies Reports about PAM objects
PAM access requests Handling of PAM objects in the Web Portal Basic data for managing a Privileged Account Management system Configuration parameters for managing a Privileged Account Management system Default project template for One Identity Safeguard Editing One Identity Safeguard system objects One Identity Safeguard connector settings Known issues about connecting One Identity Safeguard appliances

Creating manage levels

One Identity Manager supplies a default configuration for the Unmanaged and Full managed manage levels. You can define other manage levels depending on your requirements.

IMPORTANT: In the Designer, extend the templates by adding the procedure for the additional manage levels. For more information about templates, see the One Identity Manager Configuration Guide

To create a manage level

  1. In the Manager, select the Privileged Account Management > Basic configuration data > Account definitions > Manage levels category.

  2. Click in the result list.

  3. On the main data form, edit the main data of the manage level.

  4. Save the changes.

Related topics

Assigning manage levels to account definitions

IMPORTANT: The Unmanaged manage level is assigned automatically when you create an account definition and it cannot be removed.

To assign manage levels to an account definition

  1. In the Manager, select the Privileged Account Management > Basic configuration data > Account definitions > Account definitions category.

  2. Select an account definition in the result list.

  3. Select the Assign manage level task.

  4. In the Add assignments pane, assign the manage level.

    TIP: In the Remove assignments pane, you can remove assigned manage levels.

    To remove an assignment

    • Select the manage level and double-click .

  5. Save the changes.

Main data for manage levels

Enter the following data for a manage level.

Table 8: Main data for manage levels
Property Description

Manage level

Name of the manage level.

Description

Text field for additional explanation.

IT operating data overwrites

Specifies whether user account data formatted from IT operating data is automatically updated. Permitted values are:

  • Never: Data is not updated. (Default)

  • Always: Data is always updated.

  • Only initially: Data is only determined at the start.

Retain groups if temporarily disabled

Specifies whether user accounts of temporarily deactivated retain their group memberships.

Lock user accounts if temporarily disabled

Specifies whether user accounts of temporarily deactivated identities are locked.

Retain groups if permanently disabled

Specifies whether user accounts of permanently deactivated identities retain group memberships.

Lock user accounts if permanently disabled

Specifies whether user accounts of permanently deactivated identities are locked.

Retain groups on deferred deletion

Specifies whether user accounts of identities marked for deletion retain their group memberships.

Lock user accounts if deletion is deferred

Specifies whether user accounts of identities marked for deletion are locked.

Retain groups on security risk

Specifies whether user accounts of identities posing a security risk retain their group memberships.

Lock user accounts if security is at risk

Specifies whether user accounts of identities posing a security risk are locked.

Retain groups if user account disabled

Specifies whether disabled user accounts retain their group memberships.

creating mapping rules for IT operating data

An account definition specifies which rules are used to form the IT operating data and which default values will be used if no IT operating data can be found through the identity's primary roles.

The following IT operating data is used in the One Identity Manager default configuration for automatically creating user accounts for an identity in the target system and modifying them.

  • PAM authentication provider

  • PAM identity provider

  • PAM secondary authentication

  • PAM administrative entitlements

  • Groups can be inherited

  • Identity

  • Privileged user account.

To create a mapping rule for IT operating data

  1. In the Manager, select the Privileged Account Management > Basic configuration data > Account definitions > Account definitions category.

  2. Select an account definition in the result list.

  3. Select the Edit IT operating data mapping task.

  4. Click Add and enter the following information:

    • Column: User account property for which the value is set. In the menu, you can select the columns that use the TSB_ITDataFromOrg script in their template. For more information about this, see the One Identity Manager Target System Base Module Administration Guide.

    • Source: Specifies which roles to use in order to find the user account properties. You have the following options:

      • Primary department

      • Primary location

      • Primary cost center

      • Primary business roles

        NOTE: The business role can only be used if the Business Roles Module is available.

      • Empty

        If you select a role, you must specify a default value and set the Always use default value option.

    • Default value: Default value of the property for an identity's user account if the value is not determined dynamically from the IT operating data.

    • Always use default value: Specifies whether the user account property is always set with the default value. IT operating data is not determined dynamically from a role.

    • Notify when applying the default: Specifies whether an email is sent to a specific mailbox when the default value is used. The Identity - new user account with default properties created mail template is used.

      To change the mail template, in the Designer, adjust the TargetSystem | PAG | Accounts | MailTemplateDefaultValues configuration parameter.

  5. Save the changes.

Related topics
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating