立即与支持人员聊天
与支持团队交流

Identity Manager Data Governance Edition 9.2.1 - User Guide

One Identity Manager Data Governance Edition User Guide Data Governance node and views Administering Data Governance Edition Managing unstructured data access
Managing resource access Managing account access Working with security permissions Working with SharePoint security permissions Account access modeling Bringing data under governance
Classifying governed resources Managing governed resources using the web portal Data Governance Edition reports Troubleshooting EMC, NetApp Filer, and SharePoint configuration details PowerShell commands Governed data attestation policies Governed data company policies Governed data risk index functions

Deleting a SharePoint permission level

If you no longer need a permission level, you can delete it.

Note: When you delete a permission level, you may be leaving users or groups without their accustomed access to SharePoint. Ensure that you have assigned appropriate permission levels to all affected accounts before deleting a permission level.

To delete a SharePoint permission level

  1. In the Resource browser, double-click through the farm to locate the required resource.

    The security for the resource displays in the lower pane.

  2. In the lower pane, click the Permission Levels toolbar button.
  3. In the Permission Levels dialog, select the permission level to be removed.
  4. Click Delete.
  5. Click Yes on the confirmation dialog.
  6. Click OK to exit the Permission Levels dialog.

Modifying an existing SharePoint permission level

You can change the permissions in a permission level, and the name or description.

To modify an existing SharePoint permission level

  1. In the Resource browser, double-click through the farm to locate the required resource.

    The security for the resource displays in the lower pane.

  2. In the lower pane, click the Permission Levels toolbar button.
  3. In the Permission Levels dialog, in the Permission Levels pane (left pane) select the permission level to be modified and click Modify.
  4. Modify the name, description and included permissions as needed.
  5. Click OK to save your selections and close the Permissions dialog.

Account access modeling

Note: This functionality is not available for NFS or Cloud managed hosts.

Before managing user or group access to data (for details, see Managing account access), you may want to compare the access for two accounts, or model what would happen if you modified an account’s group membership.

This enables you to model access including:

  • identify common or different access between two users or two groups
  • identify why two employees in the same department have different access rights
  • identify the access permissions granted or lost by adding/removing users to/from groups

The results of an account comparison shows where there are deviations between the two account's access (different access); and where the accounts hold identical access or have the same access but it was obtained differently (similar access).

You can save the results in customized layouts that will help you to see where and if changes are required to your current account access. For ease of use, Data Governance Edition includes predefined layouts that allow you to see the types of access (differences only, similar only), rights held by the source account only, and rights held by the target account only.

The results of an account simulation shows the rights that would be granted or revoked based on the change made to an account's group membership.

Comparing accounts

Comparing accounts can help you understand the group deployment within your organization. You can easily investigate two groups with similar or identical permissions to determine groups that could be consolidated into one.

Comparing accounts can also be helpful as a troubleshooting tool. If two accounts should have the same access to a resource but one account is being denied access, you can compare their access to see where the differences are found and make the necessary adjustments.

Note: If you see a message in the list of issues that the forest or domain could not be contacted, this could be because the trusted domain has not been synchronized with One Identity Manager.

To compare accounts

  1. Navigate to and select an account (through the Security Index node, Accounts view, Security editor, and so on)

  2. Select Account comparison in the Tasks view or right-click menu.
  3. Select one of the following options to define the type of access to be compared:

    • Compare explicit and indirect: Select this option to compare all access, including access granted through group membership. This option is selected by default.
    • Compare explicit: Select this option to compare access that has been granted explicitly.

    Note: For machine local trustees, well-known group accounts and built-in group accounts, the account comparison will compare only explicit rights, regardless of the option selected.

  4. The Source field defines the source account to be compared. By default, the selected account appears. Click the browse button to locate and select a different source account.

  5. The Target field defines the target account to be compared. Click the browse button to locate and select the target account.

  6. The Resource Types field defines the types of resources and the managed hosts to be included in the comparison. By default, all resource types and all managed hosts are included.

    Click the Change button to limit your comparison to selected resource types or managed hosts. Clicking the Change button displays additional fields allowing you to make your selections:

    • Host: Click the arrow control to select one or more managed hosts from a list of available managed hosts. To exclude a managed host, click the selected check box to clear it.
    • Type: Click the arrow control to select one or more types from a list of available resource types. To exclude a resource type, click the selected check box to clear it.

    Note: Running an account comparison against all hosts and resource types could take a significant amount of time to process. It is recommended that you select the hosts and resource types you are interested in to speed up the comparison process.

  7. Click Compare to run the account comparison for the selected accounts.

    For each resource path to which either account has access, the rights of both accounts are returned. If a column has no entry, that account has no access to the resource. See Account comparison results for more details on how to interpret the results.

  8. By default, the Default layout is used to display the results, which shows all resource access available. Other predefined layouts available include:

    • Rights Held by Source Only
    • Rights Held by Target Only
    • Show Differences
    • Show Similar Access

    NOTE: You can use the Layout controls to select a predefined layout for displaying data. If you do not see the Layout field or buttons, use the Toggle layout options task to display these controls.

    For more information, see Toggle layout options.

  9. (Optional) Click the Export to CSV button to export the results to a file. The Save As dialog appears allowing you to select the location where the report is to be saved and to specify a file name.

    Note: The exported .CSV file contains more information about the account comparison. For example, it contains the managed host ID which can be used to run scripts or commands against a particular managed host.

相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级