NetIQ Identity Governance Administrator Guide
- NetIQ Identity Governance Administrator Guide
- Adding Identity Governance Users and Assigning Authorizations
- Understanding Authorizations in Identity Governance
- Adding Identity Governance Users
- Assigning Authorizations to Identity Governance Users
- Using Coverage Maps
- Customizing Identity Governance for Your Enterprise
- Customizing the Email Notification Templates
- Customizing the Collector Templates for Data Sources
- Customizing Categories
- Disabling Review Email Notifications
- Extending the Identity Governance Schema
- Creating and Managing Data Sources
- Understanding Collector Configuration
- Transforming Data During Collection
- Creating Identity and Application Sources
- Managing Identity and Application Sources
- Creating and Monitoring Scheduled Collections
- Creating a Scheduled Collection
- Monitoring Scheduled Collections
- Understanding the Cron Expression for a Custom Interval of Collection
- Integrating Collected Data with Identity Manager
- Understanding Synchronization and Reflection
- Ensuring Best Performance for Identity Matching
- Reflecting Permissions and Assignments from Applications Not Connected to Identity Manager
- Synchronizing Changes in Identity Governance Data with Objects in the Identity Vault
- Migrating User Objects to the Identity Vault
- Publishing the Collected Data
- Publishing Identity Sources
- Publishing Application Sources
- Managing Data in the Catalog
- Configuring the Data Source for Post Authentication Matching
- Understanding Identity, Application, and Permission Management
- Editing Attribute Values on Objects in the Catalog
- Searching for Items in the Catalog
- Managing Technical Roles
- Database Maintenance
- Understanding Database Maintenance
- Archiving the Operations Database and Purging Data
- Identifying Purgeable Data
- Setting up Fulfillment Targets and Fulfilling Changesets
- Understanding the Fulfillment Process
- Configuring Fulfillment
- Customizing Fulfillment Target Templates
- Specifying Additional Fulfillment Context Attributes
- Fulfilling the Changeset for a Review Instance
- Reviewing Fulfillment Requests
- Confirming the Fulfillment Activities
- Creating and Modifying Review Definitions
- Viewing the Catalog
- Understanding the Review Process
- Understanding Micro Certification
- Selecting a Review Type
- Creating a Review Definition
- Modifying a Review Definition
- Customizing Review Display
- Configuring Reasons for Review Actions
- Specifying Reviewers
- Downloading and Importing Review Definitions
- Improving Performance in Large Scale Reviews
- Running a Review Instance
- Completing Review Tasks
- Verifying and Approving a Review Instance
- Creating and Managing Separation of Duties Policies
- Understanding Separation of Duties
- Creating and Editing Separation of Duties Policies
- Understanding the Separation of Duties Policy Options
- Downloading and Importing Separation of Duties Policies
- Managing Separation of Duties Violations
- Understanding SoD Violation versus SoD Case
- Listing SoD Violations or SoD Cases
- Viewing SoD Case Details
- Understanding SoD Case Status
- Approving and Resolving an SoD Violation
- Closing an SoD Case
- Understanding Potential SoD Violations
- Approving or Resolving Potential SoD Violations
- Creating and Managing Business Roles
- Overview of Roles
- Understanding Business Roles
- Defining Business Roles
- Authorizing User Access Through Business Roles
- Adding Authorizations to a Business Role
- Adding a Business Role Approval Policy
- Publishing or Deactivating Business Roles
- Analyzing Business Roles
- Editing Business Roles
- Approving Business Roles
- Automated Access Provisioning and Deprovisioning
- Downloading and Importing Business Roles and Approval Policies
- Calculating and Customizing Risk
- Understanding Risk Levels and Risk Scoring
- Configuring Risk Levels
- Configuring Risk Scores
- Setting and Viewing Risk Calculation Schedules and Status
- Viewing Calculated Risk Scores
- Exporting and Importing Risk Policies
- Administering Access Request
- Understanding Access Request
- Configuring Access Request
- Assigning Request to Identity Governance Users
- Disabling the Access Request Service
- Creating and Managing Certification Policies
- Understanding Certification Policies
- Creating and Editing Certification Policies
- Scheduling Calculations and Calculating Certification Policy Violations
- Exporting and Importing Certification Policies
- Managing Certification Policy Violations
- Creating and Managing Delegation
- Understanding Delegation
- Assigning and Managing Delegates
- Analyzing Data and Monitoring Governance System
- Configuring Analytics and Role Mining Settings
- Monitoring Your Identity Governance System
- Running the Identity Governance Configuration Utility
- Identity Governance Server Details
- Authentication Server Details
- Security Settings
- Network Topology Settings
- Miscellaneous Settings
- Bulk Data Update Settings
- Workflow Settings
- Legal Notice