NetIQ Identity Governance Administrator Guide

  NetIQ Identity Governance Administrator Guide
    Adding Identity Governance Users and Assigning Authorizations
      Understanding Authorizations in Identity Governance
      Adding Identity Governance Users
      Assigning Authorizations to Identity Governance Users
      Using Coverage Maps
    Customizing Identity Governance for Your Enterprise
      Customizing the Email Notification Templates
      Customizing the Collector Templates for Data Sources
      Customizing Categories
      Disabling Review Email Notifications
      Extending the Identity Governance Schema
    Creating and Managing Data Sources
      Understanding Collector Configuration
      Transforming Data During Collection
      Creating Identity and Application Sources
      Managing Identity and Application Sources
    Creating and Monitoring Scheduled Collections
      Creating a Scheduled Collection
      Monitoring Scheduled Collections
      Understanding the Cron Expression for a Custom Interval of Collection
    Integrating Collected Data with Identity Manager
      Understanding Synchronization and Reflection
      Ensuring Best Performance for Identity Matching
      Reflecting Permissions and Assignments from Applications Not Connected to Identity Manager
      Synchronizing Changes in Identity Governance Data with Objects in the Identity Vault
      Migrating User Objects to the Identity Vault
    Publishing the Collected Data
      Publishing Identity Sources
      Publishing Application Sources
    Managing Data in the Catalog
      Configuring the Data Source for Post Authentication Matching
      Understanding Identity, Application, and Permission Management
      Editing Attribute Values on Objects in the Catalog
      Searching for Items in the Catalog
      Managing Technical Roles
    Database Maintenance
      Understanding Database Maintenance
      Archiving the Operations Database and Purging Data
      Identifying Purgeable Data
    Setting up Fulfillment Targets and Fulfilling Changesets
      Understanding the Fulfillment Process
      Configuring Fulfillment
      Customizing Fulfillment Target Templates
      Specifying Additional Fulfillment Context Attributes
      Fulfilling the Changeset for a Review Instance
      Reviewing Fulfillment Requests
      Confirming the Fulfillment Activities
    Creating and Modifying Review Definitions
      Viewing the Catalog
      Understanding the Review Process
      Understanding Micro Certification
      Selecting a Review Type
      Creating a Review Definition
      Modifying a Review Definition
      Customizing Review Display
      Configuring Reasons for Review Actions
      Specifying Reviewers
      Downloading and Importing Review Definitions
      Improving Performance in Large Scale Reviews
    Running a Review Instance
      Completing Review Tasks
      Verifying and Approving a Review Instance
    Creating and Managing Separation of Duties Policies
      Understanding Separation of Duties
      Creating and Editing Separation of Duties Policies
      Understanding the Separation of Duties Policy Options
      Downloading and Importing Separation of Duties Policies
    Managing Separation of Duties Violations
      Understanding SoD Violation versus SoD Case
      Listing SoD Violations or SoD Cases
      Viewing SoD Case Details
      Understanding SoD Case Status
      Approving and Resolving an SoD Violation
      Closing an SoD Case
      Understanding Potential SoD Violations
      Approving or Resolving Potential SoD Violations
    Creating and Managing Business Roles
      Overview of Roles
      Understanding Business Roles
      Defining Business Roles
      Authorizing User Access Through Business Roles
      Adding Authorizations to a Business Role
      Adding a Business Role Approval Policy
      Publishing or Deactivating Business Roles
      Analyzing Business Roles
      Editing Business Roles
      Approving Business Roles
      Automated Access Provisioning and Deprovisioning
      Downloading and Importing Business Roles and Approval Policies
    Calculating and Customizing Risk
      Understanding Risk Levels and Risk Scoring
      Configuring Risk Levels
      Configuring Risk Scores
      Setting and Viewing Risk Calculation Schedules and Status
      Viewing Calculated Risk Scores
      Exporting and Importing Risk Policies
    Administering Access Request
      Understanding Access Request
      Configuring Access Request
      Assigning Request to Identity Governance Users
      Disabling the Access Request Service
    Creating and Managing Certification Policies
      Understanding Certification Policies
      Creating and Editing Certification Policies
      Scheduling Calculations and Calculating Certification Policy Violations
      Exporting and Importing Certification Policies
      Managing Certification Policy Violations
    Creating and Managing Delegation
      Understanding Delegation
      Assigning and Managing Delegates
    Analyzing Data and Monitoring Governance System
      Configuring Analytics and Role Mining Settings
      Monitoring Your Identity Governance System
    Running the Identity Governance Configuration Utility
      Identity Governance Server Details
      Authentication Server Details
      Security Settings
      Network Topology Settings
      Miscellaneous Settings
      Bulk Data Update Settings
      Workflow Settings
    Legal Notice