立即与支持人员聊天
与支持团队交流

Identity Manager 8.2 - Web Designer Web Portal User Guide

General tips and getting started Security keys (WebAuthn) Requests
Requesting products Saved for Later list Request templates Pending requests Displaying request history Resubmitting requests Canceling requests Renewing products with limit validity periods Unsubscribing products Displaying approvals Undoing approvals Request inquiries Auditing requests Escalated requests
Attestation
Attestors for attestation cases Sending attestation reminders My attestation cases Pending attestations Displaying attestation history Attestation inquiries Auditing attestations Attestation – Administration Escalation
Compliance Responsibilities
My responsibilities
Specifying keywords for requestable products My departments My application roles My devices My business roles My identities My cost centers My multi-request resources My multi requestable/unsubscribable resources My resources My software applications My locations My system entitlements My system roles My assignment resources
Delegating tasks Ownerships Auditing
Auditing departments Auditing application roles Auditing devices Auditing business roles Auditing identities Auditing cost centers Auditing multi-request resources Auditing multi requestable/unsubscribable resources Auditing resources Auditing software Auditing locations Auditing system roles Auditing system entitlements Auditing assignment resources
Governance administration
Managing departments Managing business roles Managing identities Managing cost centers Managing multi-request resources Managing multi requestable/unsubscribable resources Managing resources Managing locations System entitlements Managing system roles Managing assignment resources
Applications Calls Discovering your statistics on the home page Appendix: Attestation conditions and approval policies from attestation procedures Appendix: Page and menu descriptions
Information (Menu description) My requests (Menu description) Profile (Menu description) Help (Menu description) Request (Menu description) Attestation (Menu description)
My attestation status (page description) My actions (page description)
Pending attestations (page description)
Pending attestations – Attestation policies (page description) Pending attestations: One Identity Manager application roles (page description) Pending attestations: Departments (page description) Pending attestations: System roles (page description) Pending attestations: Locations (page description) Pending attestations: Business roles (page description) Pending attestations: PAM assets (page description) Pending attestations: PAM user accounts (page description) Pending attestations: Employees (page description) Pending attestations: Cost centers (page description) Pending attestations: User accounts (page description) Pending attestations: System entitlements (page description) Pending attestations: Resources (page description) Pending attestations: Assignment resources (page description) Pending attestation: Multi-request resources (page description) Pending attestations: Software (page description) Pending attestations: Multi requestable/unsubscribable resources (page description) Pending attestations – approvals (page description)
Attestation history (page description) Attestation inquiries (page description)
Auditing (page description) Governance administration (page description) Attestation escalation approval (page description)
Compliance (Menu description) Responsibilities (Menu description)
My responsibilities (page description)
Identities (page description) System entitlements (page description) Business roles (page description) System roles (page description) Departments (page description) Cost centers (page description) Locations (page description) Application roles (page description) Resources (page description) Assignment resources (page description) Multi-request resources (page description) Software (page description) Multi requestable/unsubscribable resources (page description) Devices (page description)
Delegating tasks (page description) Ownerships (page description) Auditing (page description)
Auditing – Departments (page description) Auditing – Application roles (page description) Auditing – Device (page description) Auditing – Business roles (page description) Auditing – Identity details (page description) Auditing – Cost center (page description) Auditing – Multi-request resources (page description) Auditing – Multi requestable/unsubscribable resources (page description) Auditing - Resources (page description) Auditing – Software (page description) Auditing – Locations (page description) Auditing – System roles (page description) Auditing - Assignment resource (page description) Auditing – Active Directory (page description) Auditing – Azure Active Directory (page description) Auditing – Custom target system group (page description) Auditing – Google Workspace (page description) Auditing – Domino (page description) Auditing – LDAP (page description) Auditing – Oracle E-Business Suite (page description) Auditing – Privileged Account Management (page description) Auditing – SAP R/3 (page description) Auditing – Unix (page description)
Governance administration (page description)
Business roles (page description) Identities (page description) Multi-request resources (page description) Multi requestable/unsubscribable resources (page description) Organization (page description) Resources (page description) System entitlements (page description) System roles (page description) Assignment resources (page description)
Calls (Menu description)

High risk overview (page description)

To open the High Risk Overview page go to Compliance > Governance Administration > High Risk Overview.

On the High Risk Overview page, you can get overview of the objects with the highest risk factor (see Displaying high risk objects). This can help you prioritize when managing your business resources. Company resources have risk values, which provide the risk index when combined with risk index functions.

The following tables give you an overview of the various features and content on the High Risk Overview page.

Table 252: Controls

Control

Description

Show all high risk objects

Select this check box if you want to show all the high risk objects (instead of just the top 10) (see Displaying high risk objects).

Table 253: Columns

Column

Description

High Risk Objects

Display name

Shows you the object's display name.

Object type

Shows you the type of object.

Risk index

Show the object's risk index.

High Risk Employees

Full name

Shows the identity's name.

Primary department

Shows you to which department the identity is primarily assigned.

Risk index (calculated)

Shows you the identity's calculated risk index.

High Risk Business roles

Business role

Shows the business role's name.

Role class

Shows the business role's role class.

Risk index (calculated)

Shows you the business role's calculated risk index.

High Risk System roles

System role

Shows the system role's internal name.

Display name

Shows the system role's display name.

System role manager

Shows you the name of the identity responsible for the system role.

Risk index (calculated)

Shows you the system role's calculated risk index.

High Risk System entitlements

Display

Shows the system entitlement's display name.

Group type

Shows the system entitlement's group type.

Risk index

Shows the system entitlement's risk index.

High Risk User accounts

Login name

Shows you the user name of the user account used to log in.

Name

Shows you the user account's display name.

Employee

Shows you the name of the identity to which the user account is primarily assigned.

Container

Shows you in which container the user account is located.

Risk index (calculated)

Shows you the calculated user account's risk index.

TIP: You can show less data by using the column filters. For more information, see Filtering.

Rule violations (page description)

To open the Rule Violations page go to Compliance > Governance Administration > Rule Violations.

On the Rule Violations page, you get an overview of compliance rules and the corresponding rule violations and generate detailed reports on them (see Viewing compliance rules and violations). This information can help to determine gaps in your security or compliance policies and to develop attestation policies or mitigating controls. Mitigation comprises processes existing outside the One Identity Manager solution and that reduce the risk of violation.

The following tables give you an overview of the various features and content on the Rule Violations page.

Table 254: Controls

Control

Description

By framework

Enable this option to display all compliance rules associated with compliance frameworks for which you are responsible.

By department

Enable this option to display all compliance rules violated by identities belonging to departments for which you are responsible.

By rule

Enable this option to display all compliance rules for which you are responsible.

By approval role

Enable this option to display all compliance rules for which you are allowed to grant exceptions.

All compliance rules

Enable this option to display all compliance rules.

Table 255: Controls in the detail pane of a compliance rule

Control

Description

Show details

This opens the <rule> page (see Rule details (page description)).

Use this button to display more details about the compliance rule as a HyperView (see Viewing compliance rules and violations).

Report

Use this button to generate a report listing the rule violations (see Viewing compliance rules and violations).

The report contains a risk assessment for you to use for prioritizing violations and on which to base subsequent planning. The risk assessment takes into account many risk factors that arise from violations and represents the risk as a value between 0 (no risk) and 1 (high risk).

Table 256: Columns

Column

Description

Rule name

Shows you the compliance rule's name.

Risk index

Shows the severity of the rule violation (meaning the calculated risk index). The higher this value is, the higher the risk that this rule violation poses.

Risk index (reduced)

Shows the risk index taking mitigating controls into account. A rule’s risk index can be reduced by a significance amount after mitigating controls have been applied.

Mitigating controls are processes that exist outside the One Identity Manager solution and that reduce the risk of violation. For more information, see Compliance – Governance Administration.

Rule violations (new)

Shows you how often the compliance rule has been violated recently.

Rule violations (all)

Shows you how often the compliance rule is violated.

Rule group

Shows you the rule group to which the compliance rule belongs based on its content.

Compliance framework

Shows you the compliance framework to which the compliance rule belongs.

TIP: You can show less data by using the column filters. For more information, see Filtering.

TIP: You can see more information about each compliance rule in the details pane. To do this, click the corresponding entry in the list.

Rule details (page description)

To open the <rule name> details page go to Compliance > Governance Administration > Rule Violations > click an entry in the list.

On the <rule name> details page, you will see a overview of a specific company policy displayed as a HyperView (after you select Show Details on the Rule violations page) and you can create a report listing the rule violations.

The following table gives you an overview of the various features on the <rule name> details pane.

Table 257: Controls

Control

Description

Report

Use this button to generate a report listing the rule violations.

The report contains a risk assessment for you to use for prioritizing violations and on which to base subsequent planning. The risk assessment takes into account many risk factors that arise from violations and represents the risk as a value between 0 (no risk) and 1 (high risk).

Policy violations (page description)

To open the Policy Violations page go to Compliance > Governance Administration > Policy Violations.

On the Policy Violations page, you get an overview of company policies and the corresponding policy violations, and generate detailed reports about them (see Displaying company policies and violations). This information can help to determine gaps in your security or compliance policies and to develop attestation policies or mitigating controls. Mitigation comprises processes existing outside the One Identity Manager solution and that reduce the risk of violation.

The following tables give you an overview of the various features and content on the Policy Violations page.

Table 258: Controls

Control

Description

For framework owners

Enable this option to display all company policies associated with compliance frameworks for which you are responsible.

For policy owners

Enable this option to display all company policies for which you are responsible.

For exception approvers

Enable this option to display all company policies for which you are allowed to grant exceptions.

All policies

Enable this option to display all company policies.

Table 259: Controls in the company policy's details pane

Control

Description

Show details

This opens the <policy> (Policy) page (see Policy details (page description)).

Use this button to display more details about the company policy as a HyperView (see Displaying company policies and violations).

Report

Use this button to generate a report listing the policy violations (see Displaying company policies and violations).

The report contains a risk assessment for you to use for prioritizing violations and on which to base subsequent planning. The risk assessment takes into account many risk factors that arise from violations and represents the risk as a value between 0 (no risk) and 1 (high risk).

Table 260: Columns

Column

Description

Policy

Shows you the name of the company policy.

Risk index

Shows the severity of the policy violation (meaning the calculated risk index). The higher this value is, the higher the risk that this policy violation poses.

Risk index (reduced)

Shows the risk index taking mitigating controls into account. The risk of a policy violation can be reduced by a significance amount after mitigating controls have been applied.

Mitigating controls are processes that exist outside the One Identity Manager solution and that reduce the risk of a policy violation. For more information, see Compliance – Governance Administration.

Policy violations (new)

Shows you how often the company policy has been violated recently.

Policy violations (all)

Shows you how often the company policy is violated.

Policy group

Shows you the policy group to which the company policy belongs, based on its content.

Compliance framework

Shows you the compliance framework to which the company policy belongs.

TIP: You can show less data by using the column filters. For more information, see Filtering.

TIP: You can see more information about each company policy in the details pane. To do this, click the corresponding entry in the list.

相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级