NetIQ Identity Governance User Guide

  NetIQ Identity Governance User Guide
    Overview
      Understanding Installation and Configuration
      Understanding Data Collection and Publication
      Understanding the Review Process
      Understanding Reporting
    Installing Identity Governance
      Planning to Install Identity Governance
        Checklist for Installing Identity Governance
        Understanding Authentication for Identity Governance
        Understanding Password Management in Identity Governance
        Understanding Identity Reporting
        Understanding the Identity Governance and Reporting Databases
        Recommended Installation Scenarios and Server Setup
        Prerequisites for Installing Identity Governance
        Hardware and Software Requirements
      Installing Tomcat, PostgreSQL, and ActiveMQ for Identity Governance
        Checklist for Installing Tomcat, PostgreSQL, and ActiveMQ
        Using the Wizard to Install Tomcat, PostgreSQL, and ActiveMQ
        Silently Installing Tomcat, PostgreSQL, and ActiveMQ
        Stopping, Starting, and Restarting Tomcat
        Stopping, Starting, and Restarting ActiveMQ
      Installing One SSO Provider
        Checklist for Installing One SSO Provider
        Using the Wizard to Install One SSO Provider
        Silently Installing One SSO Provider
      Installing Identity Governance
        Checklist for Installing and Configuring Identity Governance
        Preparing a PostgreSQL Database for Identity Governance
        Preparing an Oracle Database for Identity Governance
        Preparing an MS SQL Server Database for Identity Governance
        Using a Guided Process to Install Identity Governance and Identity Reporting
        Performing a Silent Installation of Identity Governance
      Installing Identity Reporting
        Checklist for Installing Identity Reporting
        Understanding the Installation Process for the Identity Reporting Components
        Preparing the Database Environment for Identity Reporting
        Installing Identity Reporting
      Completing the Installation Process
        Configuring the Databases after Installation
        Preparing One SSO Provider for Use
        Completing the Cluster Configuration for Identity Governance
        Ensuring Rapid Response to Authentication Requests
        Enabling Auditing
        Starting and Initializing Identity Governance
        Configuring Identity Governance for Two-Factor Authentication
        Updating the License Key
      Upgrading Identity Governance
        Planning to Upgrade Identity Governance
        Saving Customized Settings for Attributes in the Catalog
        Running the Cleanup Utility
        Changes to Passwords Stored in Environment Variables
        Upgrading Procedure
      Uninstalling Identity Governance
    Configuring and Managing Identity Governance
      Configuring Identity Governance Settings
        Running the Identity Governance Configuration Utility
        Using the TLS/SSL Protocol for Secure Connections
        Configuring the Mail Server for Notifications
        Configuring Fulfillment
        Configuring Analytics and Role Mining Settings
      Customizing Identity Governance for Your Enterprise
        Localizing to the User’s Preferred Language
        Customizing the User Interface
        Translating Content for Identity Governance and One SSO Provider
        Customizing the Email Notification Templates
        Customizing the Identity Governance Style Sheet
        Customizing the Collector Templates for Data Sources
        Customizing Fulfillment Target Templates
        Specifying Additional Fulfillment Context Attributes
        Using Coverage Maps
        Customizing Categories
        Customizing Review Display
        Configuring Reasons for Review Actions
        Disabling Review Email Notifications
        Extending the Identity Governance Schema
      Changing Passwords for Administrative Users
        How to Change the Password for the Bootstrap Administrator
        How to Change the Password for the Database Users
      Adding Identity Governance Users and Assigning Authorizations
        Understanding Authorizations in Identity Governance
        Adding Identity Governance Users
        Assigning Authorizations to Identity Governance Users
      Integrating Single Sign-on Access with Identity Manager
        Checklist for Integrating Identity Governance with Identity Manager
        Configuring Identity Governance for Integration
        Configuring Identity Manager for Integration
        Configuring a File Authentication Source for the Bootstrap Administrator
    Managing the Identity Governance Catalog
      Creating and Managing Data Sources
        Understanding Collector Configuration
        Transforming Data During Collection
        Creating Identity and Application Sources
        Managing Identity and Application Sources
      Creating and Monitoring Scheduled Collections
        Creating a Scheduled Collection
        Monitoring Scheduled Collections
        Understanding the Cron Expression for a Custom Interval of Collection
      Integrating Collected Data with Identity Manager
        Understanding Synchronization and Reflection
        Ensuring Best Performance for Identity Matching
        Reflecting Permissions and Assignments from Applications Not Connected to Identity Manager
        Synchronizing Changes in Identity Governance Data with Objects in the Identity Vault
        Migrating User Objects to the Identity Vault
      Publishing the Collected Data
        Publishing Identity Sources
        Publishing Application Sources
      Managing Data in the Catalog
        Configuring the Data Source for Post Authentication Matching
        Understanding Identity, Application, and Permission Management
        Editing Attribute Values on Objects in the Catalog
        Searching for Users or Groups
        Managing Technical Roles
      Grooming the Identity Governance Databases
        Understanding the Data Purge Utility
        Identifying Purgeable Data
        Purging Data from the Operations Database
        Creating a Parameters File to Run the Data Purge Utility
    Creating and Running Reviews
      Creating and Modifying Review Definitions
        Viewing the Catalog
        Understanding the Review Process
        Selecting a Review Type
        Creating a Review Definition
        Modifying a Review Definition
        Specifying Reviewers
        Downloading and Importing Review Definitions
        Improving Performance in Large Scale Reviews
      Running a Review Instance
        Completing Review Tasks
        Verifying and Approving a Review Instance
        Fulfilling the Changeset for a Review Instance
        Confirming the Fulfillment Activities
    Using Policies in Identity Governance
      Creating and Managing Separation of Duties Policies
        Understanding Separation of Duties
        Creating and Editing Separation of Duties Policies
        Understanding the Separation of Duties Policy Options
        Importing Separation of Duties Policies
        Downloading Separation of Duties Policies
      Managing Separation of Duties Violations
        Understanding SoD Violation versus SoD Case
        Listing SoD Violations or SoD Cases
        Viewing SoD Case Details
        Understanding SoD Case Status
        Approving and Resolving an SoD Violation
        Closing an SoD Case
      Creating and Managing Business Roles
        Overview of Roles
        Understanding Business Role States
        Understanding Business Role Mining
        Managing Business Roles
        Defining Business Roles
        Authorizing User Access Through Business Roles
        Adding Authorizations to a Business Role
        Adding a Business Role Approval Policy
        Publishing or Deactivating Business Roles
        Analyzing Business Roles
        Editing Business Roles
        Approving Business Roles
        Downloading and Importing Business Roles and Approval Policies
        Automated Access Provisioning and Deprovisioning
      Calculating and Customizing Risk
        Understanding Risk Levels and Risk Scoring
        Configuring Risk Levels
        Configuring Risk Scores
        Setting and Viewing Risk Calculation Schedules and Status
        Viewing Calculated Risk Scores
      Administering Access Request
        Understanding Access Request
        Configuring Access Request
        Assigning Request to Identity Governance Users
        Disabling the Access Request Service
      Creating and Managing Certification Policies
        Understanding Certification Policies
        Creating and Editing Certification Policies
        Scheduling and Calculating Certification Policy Violations
        Managing Certification Policy Violations
      Creating and Managing Delegation
        Understanding Delegation
        Assigning and Managing Delegates
      Creating and Managing Data Policies
        Creating and Editing Data Policies
    Reporting for Identity Governance
      Setting Up Identity Reporting
        Manually Generating the Database Schema
        Preparing Identity Reporting for Use
        Enabling Auditing for Identity Reporting after Installation
      Managing Identity Governance Reports
        Understanding the Provided Reports
        Running Identity Governance Reports
    Instructions for Identity Governance Users
      Instructions for Access Requesters and Approvers
        Understanding the Access Request Process
        Reviewing Current Access
        Requesting Access and Viewing Timeline
        Approving Access Requests
        Comparing Access of Multiple Users
        Retracting Access Request
        Restarting Failed Access Request
      Instructions for Reviewers
        Understanding Reviews
        Performing a Review
        Viewing Completed Reviews
      Instructions for Review Owners
        Understanding the Review Process for Review Owners
        Managing a Review in Preview Mode
        Managing a Review in Live Mode
      Instructions for Fulfillers
        Understanding the Fulfillment Process
        Performing a Manual Change
    Legal Notice