Application roles can be assigned reports that are automatically subscribed to by all identities to which the respective application role has been assigned.
Application roles can be assigned reports that are automatically subscribed to by all identities to which the respective application role has been assigned.
You can see which reports are assigned to application roles for which you are responsible.
To display an application role's reports
In the menu bar, click Responsibilities > My Responsibilities.
On the My Responsibilities page, click Application roles.
On the Application Roles page, click the application role whose assigned report you want to display.
On the overview page, click Entitlements.
This opens the Entitlements - <application role name> page (see Entitlements – Application role (page description)).
Companies have different requirements that they need for regulating internal and external identities' access to company resources. On the one hand, rule checks are used for locating rule violations and on the other hand, to prevent them. By using these rules, you can demonstrate compliance with legislated regulations such as the Sarbanes-Oxley Act (SOX). The following demands are made on compliance:
Compliance rules define what an employee is entitled to do or not do. For example, an identity may not have both entitlements A and B at the same time.
Company policies are very flexible, and can be defined for any company resources you are managing with Manager. For example, a policy might only allow identities from a certain department to own a certain entitlement.
Each item that an identity access can be given a risk value. A risk index can be calculated for identities, accounts, organization, roles, and for the groups of resources available for request. You can then use the risk indexes to help prioritize your compliance activities.
Some rules are preventative. For example, a request will not be processed if it violates the rules, unless exception approval is explicitly granted and an approver allows it. Compliance rules (if appropriate) and company policies are run on a regular schedule and violations appear in the identity’s Web Portal to be dealt with there. Company policies can contribute to mitigation control by reducing risk. For example, if risks are posed by identities running processes outside the One Identity Manager solution and causing violations. Reports and dashboards provide you with comprehensive compliance information
You can see the policy violations of application roles for which you are responsible.
To display policy violations
In the menu bar, click Responsibilities > My Responsibilities.
On the My Responsibilities page, click Application roles.
On the Application Roles page, click the application role whose policy violations you want to display.
On the overview page, click Compliance reports.
This opens the Compliance reports - <application role name> page (see Compliance reports – Application role (page description)).
In the View menu, select Policy violations.
© ALL RIGHTS RESERVED. 使用条款 隐私 Cookie Preference Center