NetIQ Identity Governance User Guide
- NetIQ Identity Governance User Guide
- Overview
- Understanding Installation and Configuration
- Understanding Data Collection and Publication
- Understanding the Review Process
- Understanding Reporting
- Installing Identity Governance
- Planning to Install Identity Governance
- Checklist for Installing Identity Governance
- Understanding Authentication for Identity Governance
- Understanding Password Management in Identity Governance
- Understanding Identity Reporting
- Understanding the Identity Governance and Reporting Databases
- Recommended Installation Scenarios and Server Setup
- Prerequisites for Installing Identity Governance
- Hardware and Software Requirements
- Installing Tomcat, PostgreSQL, and ActiveMQ for Identity Governance
- Checklist for Installing Tomcat, PostgreSQL, and ActiveMQ
- Using the Wizard to Install Tomcat, PostgreSQL, and ActiveMQ
- Silently Installing Tomcat, PostgreSQL, and ActiveMQ
- Stopping, Starting, and Restarting Tomcat
- Stopping, Starting, and Restarting ActiveMQ
- Installing One SSO Provider
- Checklist for Installing One SSO Provider
- Using the Wizard to Install One SSO Provider
- Silently Installing One SSO Provider
- Installing Identity Governance
- Checklist for Installing and Configuring Identity Governance
- Preparing a PostgreSQL Database for Identity Governance
- Preparing an Oracle Database for Identity Governance
- Preparing an MS SQL Server Database for Identity Governance
- Using a Guided Process to Install Identity Governance and Identity Reporting
- Performing a Silent Installation of Identity Governance
- Installing Identity Reporting
- Checklist for Installing Identity Reporting
- Understanding the Installation Process for the Identity Reporting Components
- Preparing the Database Environment for Identity Reporting
- Installing Identity Reporting
- Completing the Installation Process
- Configuring the Databases after Installation
- Preparing One SSO Provider for Use
- Completing the Cluster Configuration for Identity Governance
- Ensuring Rapid Response to Authentication Requests
- Enabling Auditing
- Starting and Initializing Identity Governance
- Configuring Identity Governance for Two-Factor Authentication
- Updating the License Key
- Upgrading Identity Governance
- Planning to Upgrade Identity Governance
- Saving Customized Settings for Attributes in the Catalog
- Running the Cleanup Utility
- Changes to Passwords Stored in Environment Variables
- Upgrading Procedure
- Uninstalling Identity Governance
- Configuring and Managing Identity Governance
- Configuring Identity Governance Settings
- Running the Identity Governance Configuration Utility
- Using the TLS/SSL Protocol for Secure Connections
- Configuring the Mail Server for Notifications
- Configuring Fulfillment
- Configuring Analytics and Role Mining Settings
- Customizing Identity Governance for Your Enterprise
- Localizing to the User’s Preferred Language
- Customizing the User Interface
- Translating Content for Identity Governance and One SSO Provider
- Customizing the Email Notification Templates
- Customizing the Identity Governance Style Sheet
- Customizing the Collector Templates for Data Sources
- Customizing Fulfillment Target Templates
- Specifying Additional Fulfillment Context Attributes
- Using Coverage Maps
- Customizing Categories
- Customizing Review Display
- Configuring Reasons for Review Actions
- Disabling Review Email Notifications
- Extending the Identity Governance Schema
- Changing Passwords for Administrative Users
- How to Change the Password for the Bootstrap Administrator
- How to Change the Password for the Database Users
- Adding Identity Governance Users and Assigning Authorizations
- Understanding Authorizations in Identity Governance
- Adding Identity Governance Users
- Assigning Authorizations to Identity Governance Users
- Integrating Single Sign-on Access with Identity Manager
- Checklist for Integrating Identity Governance with Identity Manager
- Configuring Identity Governance for Integration
- Configuring Identity Manager for Integration
- Configuring a File Authentication Source for the Bootstrap Administrator
- Managing the Identity Governance Catalog
- Creating and Managing Data Sources
- Understanding Collector Configuration
- Transforming Data During Collection
- Creating Identity and Application Sources
- Managing Identity and Application Sources
- Creating and Monitoring Scheduled Collections
- Creating a Scheduled Collection
- Monitoring Scheduled Collections
- Understanding the Cron Expression for a Custom Interval of Collection
- Integrating Collected Data with Identity Manager
- Understanding Synchronization and Reflection
- Ensuring Best Performance for Identity Matching
- Reflecting Permissions and Assignments from Applications Not Connected to Identity Manager
- Synchronizing Changes in Identity Governance Data with Objects in the Identity Vault
- Migrating User Objects to the Identity Vault
- Publishing the Collected Data
- Publishing Identity Sources
- Publishing Application Sources
- Managing Data in the Catalog
- Configuring the Data Source for Post Authentication Matching
- Understanding Identity, Application, and Permission Management
- Editing Attribute Values on Objects in the Catalog
- Searching for Users or Groups
- Managing Technical Roles
- Grooming the Identity Governance Databases
- Understanding the Data Purge Utility
- Identifying Purgeable Data
- Purging Data from the Operations Database
- Creating a Parameters File to Run the Data Purge Utility
- Creating and Running Reviews
- Creating and Modifying Review Definitions
- Viewing the Catalog
- Understanding the Review Process
- Selecting a Review Type
- Creating a Review Definition
- Modifying a Review Definition
- Specifying Reviewers
- Downloading and Importing Review Definitions
- Improving Performance in Large Scale Reviews
- Running a Review Instance
- Completing Review Tasks
- Verifying and Approving a Review Instance
- Fulfilling the Changeset for a Review Instance
- Confirming the Fulfillment Activities
- Using Policies in Identity Governance
- Creating and Managing Separation of Duties Policies
- Understanding Separation of Duties
- Creating and Editing Separation of Duties Policies
- Understanding the Separation of Duties Policy Options
- Importing Separation of Duties Policies
- Downloading Separation of Duties Policies
- Managing Separation of Duties Violations
- Understanding SoD Violation versus SoD Case
- Listing SoD Violations or SoD Cases
- Viewing SoD Case Details
- Understanding SoD Case Status
- Approving and Resolving an SoD Violation
- Closing an SoD Case
- Creating and Managing Business Roles
- Overview of Roles
- Understanding Business Role States
- Understanding Business Role Mining
- Managing Business Roles
- Defining Business Roles
- Authorizing User Access Through Business Roles
- Adding Authorizations to a Business Role
- Adding a Business Role Approval Policy
- Publishing or Deactivating Business Roles
- Analyzing Business Roles
- Editing Business Roles
- Approving Business Roles
- Downloading and Importing Business Roles and Approval Policies
- Automated Access Provisioning and Deprovisioning
- Calculating and Customizing Risk
- Understanding Risk Levels and Risk Scoring
- Configuring Risk Levels
- Configuring Risk Scores
- Setting and Viewing Risk Calculation Schedules and Status
- Viewing Calculated Risk Scores
- Administering Access Request
- Understanding Access Request
- Configuring Access Request
- Assigning Request to Identity Governance Users
- Disabling the Access Request Service
- Creating and Managing Certification Policies
- Understanding Certification Policies
- Creating and Editing Certification Policies
- Scheduling and Calculating Certification Policy Violations
- Managing Certification Policy Violations
- Creating and Managing Delegation
- Understanding Delegation
- Assigning and Managing Delegates
- Creating and Managing Data Policies
- Creating and Editing Data Policies
- Reporting for Identity Governance
- Setting Up Identity Reporting
- Manually Generating the Database Schema
- Preparing Identity Reporting for Use
- Enabling Auditing for Identity Reporting after Installation
- Managing Identity Governance Reports
- Understanding the Provided Reports
- Running Identity Governance Reports
- Instructions for Identity Governance Users
- Instructions for Access Requesters and Approvers
- Understanding the Access Request Process
- Reviewing Current Access
- Requesting Access and Viewing Timeline
- Approving Access Requests
- Comparing Access of Multiple Users
- Retracting Access Request
- Restarting Failed Access Request
- Instructions for Reviewers
- Understanding Reviews
- Performing a Review
- Viewing Completed Reviews
- Instructions for Review Owners
- Understanding the Review Process for Review Owners
- Managing a Review in Preview Mode
- Managing a Review in Live Mode
- Instructions for Fulfillers
- Understanding the Fulfillment Process
- Performing a Manual Change
- Legal Notice