Chat now with support
Chat with Support

Quest has tools and processes in place to identify, protect, detect, and remediate vulnerabilities and incidents when they occur, including external security partners. As part of our standard security operations, Quest does not use CrowdStrike in any of our operations. We are reviewing our third parties, and so far, there is minimal affect. It is Quest's policy not to provide further technical details unless they directly impact customer data.

Identity Manager 9.2 - Web Portal User Guide

General tips and getting started Managing reports Requests
Setting up and configuring request functions Requesting products Managing the Saved for Later list Pending requests Displaying request history Canceling requests Renewing products with limit validity periods Unsubscribing products Displaying requests Undoing approvals Managing request inquiries directed at you
Attestation
Managing attestations Pending attestations Displaying attestation history Managing attestation inquiries directed at you
Compliance Managing risk index functions Responsibilities
My responsibilities
Managing my departments Managing my application roles Managing my devices Managing my business roles Managing my identities Managing my cost centers Managing my multi-request resources Managing my multi requestable/unsubscribable resources Managing my resources Managing my software applications Managing my locations Managing my system entitlements Managing my system roles Managing my assignment resources
Managing task delegations Ownerships
Managing data
Managing departments Managing user accounts Managing business roles Managing identities Managing cost centers Managing multi-request resources Managing multi requestable/unsubscribable resources Managing resources Managing locations Managing system entitlements Managing system roles Managing assignment resources
Opening other web applications Managing tickets Appendix: Attestation conditions and approval policies from attestation procedures

Attesting PAM accesses

PAM access are attested using the PAM access attestation attestation procedure.

Condition

Description

All PAM accesses

Attests all PAM access.

Specific PAN asset accounts

Select the PAM asset accounts with access to attest.

Specific PAM assets

Select the PAM assets with access to attest.

Specific PAM user accounts

Select the PAM user accounts with access to attest.

Specific PAM directory accounts

Select the PAM directory accounts with access to attest.

Specific PAM directories

Select PAM directories. Attests access to these PAM directories.

Specific access type

Select access types. Attests access that uses one of these access types.

PAM user accounts mapped to specific identities

Select the identities. Attests access through PAM user accounts with these identities assigned to them.

PAM user accounts with defined risk index

Use the Lower limit and Upper limit fields to define a risk index range. Attests access through PAM user accounts with a risk index in the chosen range.

PAM user accounts with matching name

Enter part of a name of PAM user accounts with access to attest. All PAM user accounts that have this pattern in their name are included. Example: Per finds "Person", "Personal", "Perfection" and so on.

Attesting departments

Department properties are attested using the Department attestation attestation procedure.

Application role attestation

Application role properties are attested using the Application role attestation attestation procedure.

Business role attestation

Business role properties are attested using the Business role attestation attestation procedure.

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating