Chat now with support
Chat with Support

Quest has tools and processes in place to identify, protect, detect, and remediate vulnerabilities and incidents when they occur, including external security partners. As part of our standard security operations, Quest does not use CrowdStrike in any of our operations. We are reviewing our third parties, and so far, there is minimal affect. It is Quest's policy not to provide further technical details unless they directly impact customer data.

Identity Manager 9.2 - Web Designer Web Portal User Guide

General tips and getting started Managing reports Security keys (WebAuthn) Requests
Setting up and configuring request functions Requesting products Managing the Saved for Later list Pending requests Displaying request history Resubmitting requests Canceling requests Renewing products with limit validity periods Unsubscribing products Displaying requests Undoing approvals Managing request inquiries directed at you Auditing requests Escalated requests
Attestation
Managing attestations Attestors for attestation cases My attestation cases Pending attestations Displaying attestation history Managing attestation inquiries directed at you Auditing attestations Escalation
Compliance Responsibilities
My responsibilities
Specifying keywords for requestable products Managing my departments Managing my application roles Managing my devices Managing my business roles Managing my identities Managing my cost centers Managing my multi-request resources Managing my multi requestable/unsubscribable resources Managing my resources Managing my software applications Managing my locations Managing my system entitlements Managing my system roles Managing my assignment resources
Managing task delegations Ownerships Auditing
Auditing departments Auditing application roles Auditing devices Auditing business roles Auditing identities Auditing cost centers Auditing multi-request resources Auditing multi requestable/unsubscribable resources Auditing resources Auditing software Auditing locations Auditing system roles Auditing system entitlements Auditing assignment resources
Governance administration
Managing departments Managing business roles Managing identities Managing cost centers Managing multi-request resources Managing multi requestable/unsubscribable resources Managing resources Managing locations System entitlements Managing system roles Managing assignment resources
Opening other web applications Managing tickets Discovering your statistics on the home page Appendix: Attestation conditions and approval policies from attestation procedures Appendix: Page and menu descriptions
Information (menu description) My requests (menu description) Profile (menu description) Help (menu description) Request (menu description) Attestation (menu description)
My attestation status (page description) My actions (page description)
Pending attestations (page description)
Pending attestations – Attestation policies (page description) Pending attestations: One Identity Manager application roles (page description) Pending attestations: Departments (page description) Pending attestations: System roles (page description) Pending attestations: Locations (page description) Pending attestations: Business roles (page description) Pending attestations: PAM assets (page description) Pending attestations: PAM user accounts (page description) Pending attestations: Identities (page description) Pending attestations: Cost centers (page description) Pending attestations: User accounts (page description) Pending attestations: System entitlements (page description) Pending attestations: Resources (page description) Pending attestations: Assignment resources (page description) Pending attestation: Multi-request resources (page description) Pending attestations: Software (page description) Pending attestations: Multi requestable/unsubscribable resources (page description) Pending attestations: Devices (page description) Pending attestations – approvals (page description)
Attestation history (page description) Attestation inquiries (page description)
Auditing (page description) Governance administration (page description) Attestation escalation approval (page description)
Compliance (menu description) Responsibilities (menu description)
My responsibilities (page description)
Identities (page description) System entitlements (page description) Business roles (page description) System roles (page description) Departments (page description) Cost centers (page description) Locations (page description) Application roles (page description) Resources (page description) Assignment resources (page description) Multi-request resources (page description) Software (page description) Multi requestable/unsubscribable resources (page description) Devices (page description)
Delegating tasks (page description) Ownerships (page description) Auditing (page description)
Auditing – Departments (page description) Auditing – Application roles (page description) Auditing – Device (page description) Auditing – Business roles (page description) Auditing – Identity details (page description) Auditing – Cost center (page description) Auditing – Multi-request resources (page description) Auditing – Multi requestable/unsubscribable resources (page description) Auditing - Resources (page description) Auditing – Software (page description) Auditing – Locations (page description) Auditing – System roles (page description) Auditing - Assignment resource (page description) Auditing – Active Directory (page description) Auditing – Azure Active Directory (page description) Auditing – Custom target system group (page description) Auditing – Google Workspace (page description) Auditing – Domino (page description) Auditing – LDAP (page description) Auditing – Oracle E-Business Suite (page description) Auditing – Privileged Account Management (page description) Auditing – SAP R/3 (page description) Auditing – Unix (page description)
Governance administration (page description)
Business roles (page description) Identities (page description) Multi-request resources (page description) Multi requestable/unsubscribable resources (page description) Organization (page description) Resources (page description) System entitlements (page description) System roles (page description) Assignment resources (page description)
Tickets (menu description)

Displaying cost center policy violations

You can display cost center policy violations.

To display policy violations

  1. In the menu bar, click Responsibilities > Governance Administration.

  2. On the Governance Administration page, perform the following actions:

    1. Click Organization.

    2. On the Organization page, click Cost centers in the Type drop-down.

  3. On the Cost Centers page, click the cost center whose policy violations you want to display.

  4. In the details pane, click Edit.

  5. On the overview page, click Compliance reports.

    This opens the Compliance reports - <cost center name> page (see Compliance reports – Cost center (page description)).

  6. In the View menu, select Policy violations.

Related topics

Displaying rule violations of cost center members

You can display the rule violations of identities that are assigned specific cost centers.

To display rule violations of a cost center's members

  1. In the menu bar, click Responsibilities > Governance Administration.

  2. On the Governance Administration page, perform the following actions:

    1. Click Organization.

    2. On the Organization page, click Cost centers in the Type drop-down.

  3. On the Cost Centers page, click the cost center whose rule violations you want to display.

  4. In the details pane, click Edit.

  5. On the overview page, click Compliance reports.

    This opens the Compliance reports - <cost center name> page (see Compliance reports – Cost center (page description)).

  6. In the View menu, select Compliance rule violations.

Related topics

Displaying risk indexes and entitlements of cost center members

For every cost center, you can see all the identities that have this cost center as primary or secondary assignment. You can also display the number of entitlements assigned and the risk index.

To display members of a cost center

  1. In the menu bar, click Responsibilities > Governance Administration.

  2. On the Governance Administration page, perform the following actions:

    1. Click Organization.

    2. On the Organization page, click Cost centers in the Type drop-down.

  3. On the Cost Centers page, click the cost center whose members you want to display.

  4. In the details pane, click Edit.

  5. On the overview page, click Compliance reports.

    This opens the Compliance reports - <cost center name> page (see Compliance reports – Cost center (page description)).

  6. In the View menu, select Identities: Risk indexes and entitlements.

  7. (Optional) To display more information about an identity, perform the following actions:

    1. In the list, click an identity.

    2. In the dialog, click Overview.

Related topics

Cost center attestations

You can use attestation to test the balance between security and compliance within your company. Managers or others responsible for compliance can use One Identity Manager attestation functionality to certify correctness of permissions, requests, or exception approvals either scheduled or on demand. Recertification is the term generally used to describe regular certification of permissions. One Identity Manager uses the same workflows for recertification and attestation.

There are attestation policies defined in One Identity Manager for carrying out attestations. Attestation policies specify which objects are attested when, how often, and by whom.Once an attestation is performed, One Identity Manager creates attestation cases that contain all the necessary information about the attestation objects and the attestor responsible. The attestor checks the attestation objects. They verify the correctness of the data and initiate any changes that need to be made if the data conflicts with internal rules.

Attestation cases record the entire attestation sequence. Each attestation step in an attestation case can be audit-proof reconstructed. Attestations are run regularly using scheduled tasks. You can also trigger single attestations manually.

Attestation is complete when the attestation case has been granted or denied approval. You specify how to deal with granted or denied attestations on a company basis.

Detailed information about this topic
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating