立即与支持人员聊天
与支持团队交流

Identity Manager On Demand - Starling Edition Hosted - Web Portal User Guide

General tips and getting started Managing reports Requests
Setting up and configuring request functions Requesting products Managing the Saved for Later list Pending requests Displaying request history Displaying archived requests Resubmitting requests Canceling requests Renewing products with limit validity periods Unsubscribing products Displaying requests Undoing approvals Managing request inquiries directed at you
Attestation
Managing attestation inquiries directed at you Managing attestations Displaying attestation history My attestation cases Undo attestation case approvals Pending attestations
Compliance Managing risk index functions Responsibilities
Managing task delegations Ownerships My responsibilities
Managing my departments Managing my application roles Managing my devices Managing my business roles Managing my identities Managing my cost centers Managing my multi-request resources Managing my multi requestable/unsubscribable resources Managing my resources Managing my software applications Managing my locations Managing my system entitlements Managing my system roles Managing my assignment resources
Managing data
Managing departments Managing user accounts Managing business roles Managing identities Managing cost centers Managing multi-request resources Managing multi requestable/unsubscribable resources Managing resources Managing locations Managing system entitlements Managing system roles Managing assignment resources
Opening other web applications Managing tickets Appendix: Attestation conditions and approval policies from attestation procedures

Displaying and analyzing identities' risk indexes

You can display identities' risk indexes and analyze how they are put together.

NOTE: For more detailed information about risk assessment, see the One Identity Manager Risk Assessment Administration Guide.

To display and analyze an identity's risk index

  1. In the menu bar click Data administration > Data Explorer.

  2. In the Data Explorer navigation, click Identities.

  3. On the Identities page, click the identity whose risk index you want to display and analyze.

  4. In the Edit Identity pane, click (Actions) > Analyze risk.

Deactivating identities

You can deactivate identities permanently when an identity leaves a company, for example. This may be necessary to strip these identities of their permissions in the connected target system and from their company resources.

Effects of permanent deactivating an identity are:

  • The identity cannot be assigned to identities as a manager.

  • The identity cannot be assigned to roles as a supervisor.

  • The identity cannot be assigned to attestation policies as an owner.

  • The identity's user accounts are locked or deleted and then removed from group memberships.

To deactivate an identity

  1. On the Identities page, click the identity you want to deactivate.

  2. Click Save.

Reactivating identities

You can activate permanently deactivated identities if they have not been deactivated by certification.

To reactivate an identity

  1. In the menu bar click Data administration > Data Explorer.

  2. In the Data Explorer navigation, click Identities.

  3. On the Identities page, click the identity you want to activate.

  4. In the Edit Identity pane, toggle the switch next to Identity is inactive.

    The text next to the switch changes to Identity is active.

  5. Click Save.

Marking identities as security risks

You can mark identities as a security risk. Then the user accounts and resources of the affected identity are locked.

To mark an identity as a security risk

  1. In the menu bar click Data administration > Data Explorer.

  2. In the data explorer, click Identities.

  3. On the Identities page, click the identity you want to mark as a security risk.

  4. In the Edit Identity pane, toggle the switch next to Identity poses a security risk.

  5. In the Mark Identity as Security Risk dialog, confirm the prompt with Yes.

    The text next to the switch changes to Identity poses a security risk.

  6. Click Save.

相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级