Chat now with support
Chat with Support

Quest has tools and processes in place to identify, protect, detect, and remediate vulnerabilities and incidents when they occur, including external security partners. As part of our standard security operations, Quest does not use CrowdStrike in any of our operations. We are reviewing our third parties, and so far, there is minimal affect. It is Quest's policy not to provide further technical details unless they directly impact customer data.

Identity Manager 9.2 - Web Portal User Guide

General tips and getting started Managing reports Requests
Setting up and configuring request functions Requesting products Managing the Saved for Later list Pending requests Displaying request history Canceling requests Renewing products with limit validity periods Unsubscribing products Displaying requests Undoing approvals Managing request inquiries directed at you
Attestation
Managing attestations Pending attestations Displaying attestation history Managing attestation inquiries directed at you
Compliance Managing risk index functions Responsibilities
My responsibilities
Managing my departments Managing my application roles Managing my devices Managing my business roles Managing my identities Managing my cost centers Managing my multi-request resources Managing my multi requestable/unsubscribable resources Managing my resources Managing my software applications Managing my locations Managing my system entitlements Managing my system roles Managing my assignment resources
Managing task delegations Ownerships
Managing data
Managing departments Managing user accounts Managing business roles Managing identities Managing cost centers Managing multi-request resources Managing multi requestable/unsubscribable resources Managing resources Managing locations Managing system entitlements Managing system roles Managing assignment resources
Opening other web applications Managing tickets Appendix: Attestation conditions and approval policies from attestation procedures

Displaying my identities' rule violations

You can display the rule violations of identities for which you are responsible.

You can also display mitigating controls for each rule violation.

To display identities' rule violations

  1. In the menu bar, click Responsibilities > My Responsibilities.

  2. In the navigation, click Identities.

  3. On the Identities page, click the identity whose rule violations you want to display.

  4. In the Edit Identity pane, click the Rule Violations tab.

  5. (Optional) To display the mitigating controls of a rule violation, click View mitigating controls next to the rule violation.

Related topics

Managing my cost centers

You can perform a variety of actions on cost centers that you manage and gather information about them.

Detailed information about this topic

Displaying my cost centers

You can display all the cost centers for which you are responsible.

To display cost centers

  1. In the menu bar, click Responsibilities > My Responsibilities.

  2. In the navigation, click IdentitiesCost centers.

    This opens the Cost Centers page and displays all the cost centers for which you are responsible.

  3. (Optional) To display details of a cost center, click the cost center.

Creating your own cost centers

You can create new cost centers for which you are responsible.

Other properties (such as, memberships, entitlements, and so on) can be defined later during editing.

To create a cost center

  1. In the menu bar, click Responsibilities > My Responsibilities.

  2. In the navigation, click IdentitiesCost centers.

  3. On the Cost Centers page, click Create cost center.

  4. In the Create Cost Center pane, enter the main data of the cost center in the respective fields.

  5. Click Create.

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating