立即与支持人员聊天
与支持团队交流

Identity Manager 8.2 - Web Designer Web Portal User Guide

General tips and getting started Security keys (WebAuthn) Requests
Requesting products Saved for Later list Request templates Pending requests Displaying request history Resubmitting requests Canceling requests Renewing products with limit validity periods Unsubscribing products Displaying approvals Undoing approvals Request inquiries Auditing requests Escalated requests
Attestation
Attestors for attestation cases Sending attestation reminders My attestation cases Pending attestations Displaying attestation history Attestation inquiries Auditing attestations Attestation – Administration Escalation
Compliance Responsibilities
My responsibilities
Specifying keywords for requestable products My departments My application roles My devices My business roles My identities My cost centers My multi-request resources My multi requestable/unsubscribable resources My resources My software applications My locations My system entitlements My system roles My assignment resources
Delegating tasks Ownerships Auditing
Auditing departments Auditing application roles Auditing devices Auditing business roles Auditing identities Auditing cost centers Auditing multi-request resources Auditing multi requestable/unsubscribable resources Auditing resources Auditing software Auditing locations Auditing system roles Auditing system entitlements Auditing assignment resources
Governance administration
Managing departments Managing business roles Managing identities Managing cost centers Managing multi-request resources Managing multi requestable/unsubscribable resources Managing resources Managing locations System entitlements Managing system roles Managing assignment resources
Applications Calls Discovering your statistics on the home page Appendix: Attestation conditions and approval policies from attestation procedures Appendix: Page and menu descriptions
Information (Menu description) My requests (Menu description) Profile (Menu description) Help (Menu description) Request (Menu description) Attestation (Menu description)
My attestation status (page description) My actions (page description)
Pending attestations (page description)
Pending attestations – Attestation policies (page description) Pending attestations: One Identity Manager application roles (page description) Pending attestations: Departments (page description) Pending attestations: System roles (page description) Pending attestations: Locations (page description) Pending attestations: Business roles (page description) Pending attestations: PAM assets (page description) Pending attestations: PAM user accounts (page description) Pending attestations: Employees (page description) Pending attestations: Cost centers (page description) Pending attestations: User accounts (page description) Pending attestations: System entitlements (page description) Pending attestations: Resources (page description) Pending attestations: Assignment resources (page description) Pending attestation: Multi-request resources (page description) Pending attestations: Software (page description) Pending attestations: Multi requestable/unsubscribable resources (page description) Pending attestations – approvals (page description)
Attestation history (page description) Attestation inquiries (page description)
Auditing (page description) Governance administration (page description) Attestation escalation approval (page description)
Compliance (Menu description) Responsibilities (Menu description)
My responsibilities (page description)
Identities (page description) System entitlements (page description) Business roles (page description) System roles (page description) Departments (page description) Cost centers (page description) Locations (page description) Application roles (page description) Resources (page description) Assignment resources (page description) Multi-request resources (page description) Software (page description) Multi requestable/unsubscribable resources (page description) Devices (page description)
Delegating tasks (page description) Ownerships (page description) Auditing (page description)
Auditing – Departments (page description) Auditing – Application roles (page description) Auditing – Device (page description) Auditing – Business roles (page description) Auditing – Identity details (page description) Auditing – Cost center (page description) Auditing – Multi-request resources (page description) Auditing – Multi requestable/unsubscribable resources (page description) Auditing - Resources (page description) Auditing – Software (page description) Auditing – Locations (page description) Auditing – System roles (page description) Auditing - Assignment resource (page description) Auditing – Active Directory (page description) Auditing – Azure Active Directory (page description) Auditing – Custom target system group (page description) Auditing – Google Workspace (page description) Auditing – Domino (page description) Auditing – LDAP (page description) Auditing – Oracle E-Business Suite (page description) Auditing – Privileged Account Management (page description) Auditing – SAP R/3 (page description) Auditing – Unix (page description)
Governance administration (page description)
Business roles (page description) Identities (page description) Multi-request resources (page description) Multi requestable/unsubscribable resources (page description) Organization (page description) Resources (page description) System entitlements (page description) System roles (page description) Assignment resources (page description)
Calls (Menu description)

Enabling/disabling risk index functions

If you do not want to use a risk index function anymore, you can disable it. You can re-enable disabled risk index functions.

To disable a risk index function

  1. In the menu bar, click Compliance > Governance Administration.

  2. On the Governance Administration page, click Attestation Policy Runs.

  3. On the Risk Assessment page, in the list, click the risk index function that you want to disable.

  4. In the dialog, check the Disable check box.

  5. Click Save.

To enable a risk index function

  1. In the menu bar, click Compliance > Governance Administration.

  2. On the Governance Administration page, click Attestation Policy Runs.

  3. On the Risk Assessment page, in the list, click the risk index function that you want to enable.

  4. In the dialog, check the Enable check box.

  5. Click Save.

Related topics

Displaying compliance frameworks

Compliance frameworks are used for classifying attestation policies, compliance rules, and company policies according to regulatory requirements.

To display compliance frameworks

  1. In the menu bar, click Compliance > Governance Administration.

  2. On the Governance Administration page, click Compliance Frameworks.

    This opens the Compliance Frameworks page (see Compliance frameworks (page description)).

  3. (Optional) To display more details of a compliance framework, click on the compliance framework in the list.

    This opens a new page with an overview of the framework with all its assigned rules, policies, and attestation policies (see Compliance framework details (page description)).

Related topics

Displaying high risk objects

You can display an overview of the objects with the highest risk factor in Web Portal. This can help you prioritize when managing your business resources. Company resources have risk values, which provide the risk index when combined with risk index functions.

To display the high risk object overview

  1. In the menu bar, click Compliance > Governance Administration.

  2. On the Governance Administration page, click High Risk Overview.

    This opens the High Risk Overview page (see High risk overview (page description)).

  3. (Optional) Click a section header to display the corresponding objects.

  4. (Optional) To display all high risk objects, select the check box next to Show all high risk objects.

Related topics

Viewing compliance rules and violations

You can see an overview of the compliance rules and corresponding rule violations in the Web Portal. This information can help to determine gaps in your security or compliance policies and to develop attestation policies or mitigating controls. Mitigation comprises processes existing outside the One Identity Manager solution and that reduce the risk of violation.

You can generate reports that describe the rule violations exactly. These reports contain a risk assessment for you to use for prioritizing violations and on which to base subsequent planning. The reduced risk index takes into account many risk factors that arise from violations and represents the risk as a value between 0 (no risk) and 1 (high risk).

To display an overview of compliance rules and rule violations

  1. In the menu bar, click Compliance > Governance Administration.

  2. On the Governance Administration page, click Rule Violations.

    This opens the Rule Violations page (see Rule violations (page description)).

  3. Enable one of the options to specify how to display the compliance rules (see Rule violations (page description)).

  4. (Optional) To display more details about a compliance rules as a HyperView, perform the following:

    1. In the list, click the compliance rule whose details you want to show.

    2. In the details pane, click show details.

      This opens a new page (see Rule details (page description)).

To display a report about a compliance rule and its rule violations

  1. In the menu bar, click Compliance > Governance Administration.

  2. On the Governance Administration page, click Rule Violations.

  3. On the Rule Violations page, enable one of the options to specify how to display the compliance rules (see Rule violations (page description)).

  4. In the list, click the compliance rule that you want to display a report about.

  5. In the details pane, click Report.

Related topics
相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级