23.3 Understanding the Separation of Duties Policy Options

When you create an SoD policy, you must define what conditions make up the policy, what happens when the policy is violated, and how to solve the violation. Use the following information to create the SoD policies that work best in your environment.

23.3.1 Providing Resolution Instructions for the Separation of Duties Policies

When a violation of the SoD policy occurs, Identity Governance displays the violations on the Policy > Violations tab. Users with the proper access can access and review these violations. When you provide resolution instructions, users can see what to do in Identity Governance without having to wait for further instructions on how to solve the violations. Providing these instructions is optional.

You add the resolution instructions when you create the SoD policy in the Resolve field. You can embed HTML links in these instructions to point to additional information or instructions for a user to follow.

23.3.2 Deciding what Occurs when the Separation of Duties Policy is Violated

When users review and manage an SoD case, they can resolve the violation or allow the violation to continue for a certain period of time. A user can specify compensating controls for an SoD policy. When allowing a violation to continue, if compensating controls have been defined for the policy, the user can select one or more of them to specify what controls should be in place in order to allow the violation to continue.

When users allow a violation to continue, the user can select one or more of the defined compensating controls to enforce during the continuation period of the violation. They can also specify the amount of time that the violation can continue, but the time must be less than or equal to the maximum control period defined in the policy. The maximum time is 32768 days.

You add these compensating controls when you create the SoD policy in the Compensating Controls field.

23.3.3 Defining Separation of Duties Conditions

An SoD policy specifies what combinations of permissions and roles are illegal for a user to hold by defining one or more conditions. Each condition specifies some combination of permissions and roles that are illegal. Most of the time, a single condition suffices, but there are scenarios where you must define multiple conditions to cover more complicated combinations.

Identity Governance tests a user’s permissions and roles against a condition to see if the user has the combination of permissions and roles specified in the condition. If the user’s permissions and roles match the condition, the user violates that condition. If a user’s permissions and roles violate every condition in the SoD policy, the user is in violation of the policy.

Identity Governance also tests unmapped accounts against the SoD policies. Unmapped accounts or accounts with no associated users may have permissions assigned to them. Identity Governance uses the same procedure for unmapped accounts as it does for users. It tests if the account has the combination of permissions specified in the condition. If the account's permissions match the condition, the account violates that condition. If an account's permissions violate every condition in the SoD policy, the account is in violation of the policy.

Many simple policies require only a single condition to specify illegal permission and role combinations. More complex combinations require multiple conditions, but it is probably very rare that you need more than two conditions.

A condition consists of two parts:

  • A list of one or more permissions and roles that Identity Governance tests against a user’s permissions and roles. The list can consist of all permissions, all roles, or a mixture of permissions and roles.

  • A condition type specifies how Identity Governance evaluates the user’s permissions and roles. There are three types of policy conditions:

    User has all of the following

    A user violates this condition if the user has all of the listed permissions and roles. This the most commonly used type of condition. You can specify most illegal combinations of permissions and roles using a single condition.

    User has one or more of the following

    A user violates this condition if the user has any of the specified permissions and roles. The condition must always be used in conjunction with one or more of the other conditions. Identity Governance does not allow an SoD policy with a single condition of this type.

    NOTE:Identity Governance does not allow a SoD policy that would make it illegal for a user or account to possess a single permission or role all by itself. For example, a policy with a single User has all of the following condition that lists a single permission or role, or a policy that has a single User has one or more of the following condition.

    To enforce this restriction, Identity Governance tests each permission or role specified in a policy's conditions. For each listed permission and role, it simulates a dummy user that possesses exactly that one permission or role and determines if the dummy user would violate all of the conditions of the policy. If it does, the policy is invalid and Identity Governance does not allow the SoD policy to be saved in that state.

    User has more than one of the following

    A user violates this condition if the user has two or more of the specified permissions and roles. A condition of this type must list at least two permissions and roles. If the condition lists exactly two permissions and roles, it is equivalent to a User has all of the following condition with two permissions and roles.