Identity Governance 3.6 User and Administration Guide

  Identity Governance 3.6 User and Administration Guide
    Introduction
      Understanding Installation and Configuration
      Understanding Key Administration and User Tasks
      Understanding Reporting
      Understanding Licenses
      Understanding REST Services for Identity Governance
    Adding Identity Governance Users and Assigning Authorizations
      Understanding Authorizations in Identity Governance
      Adding Identity Governance Users
      Assigning Authorizations to Identity Governance Users
      Using Coverage Maps
    Customizing Identity Governance for Your Enterprise
      Customizing the Email Notification Templates
      Customizing the Collector Templates for Data Sources
      Customizing Categories
      Disabling Review Email Notifications
      Extending the Identity Governance Schema
      Customizing Download Settings
      Customizing Access Request Landing Page
    Understanding Data Administration
      Checklist for Collecting, Publishing, and Managing Data
      Understanding Collection and Publication Configuration Utility Settings
      Understanding the Identity Governance Catalog
      Understanding Data Sources
      Understanding Collectors
    Collecting Identities
      Understanding Collector Templates for Identity Sources
      Understanding the Variations for Identity Sources
      Creating Identity Sources
      Migrating an Identity Collector to a Change Event Identity Collector
    Collecting Applications and Application Data
      Understanding the Application Definition Template
      Understanding Collectors for Application Data Sources
      Creating an Application Source
      Collecting Application Data from a Single Application Source
      Collecting Application Data for Multiple Applications
    Integrating Collected Data with Identity Manager
      Understanding Synchronization and Reflection
      Ensuring Best Performance for Identity Matching
      Reflecting Permissions and Assignments from Applications Not Connected to Identity Manager
      Synchronizing Changes in Identity Governance Data with Objects in the Identity Vault
      Migrating User Objects to the Identity Vault
    Publishing the Collected Data
      Publishing Identity Sources
      Publishing Application Sources
    Creating and Monitoring Scheduled Collections
      Creating a Scheduled Collection
      Monitoring Scheduled Collections
      Understanding the Cron Expression for a Custom Interval of Collection
    Creating and Managing Data Policies
      Understanding Data Policies
      Creating and Editing Data Policies
      Scheduling Data Policy Calculations
      Manually Calculating Data Policy Metrics
      Comparing Collections and Publications
      Detecting and Remediating Violations in Published Data
      Exporting and Importing Data Policies
    Managing Data in the Catalog
      Configuring the Data Source for Post Authentication Matching
      Understanding Identity, Application, and Permission Management
      Configuring Bulk Data Update Settings
      Editing Attribute Values of Objects in the Catalog
      Searching for Items in the Catalog
      Analyzing Data with Insight Queries
      Downloading Catalog Entities
    Creating and Managing Delegation
      Understanding Delegation
      Assigning and Managing Delegates
    Database Maintenance
      Understanding Database Maintenance
      Archiving and Purging Data
      Disabling and Enabling Archiving
      Scheduling Data Maintenance
      Identifying Purgeable Data
    Setting up Fulfillment Targets and Fulfilling Changesets
      Understanding the Fulfillment Process
      Configuring Fulfillment
      Monitoring Fulfillment Status
      Customizing Fulfillment Target Templates
      Specifying Additional Fulfillment Context Attributes
      Fulfilling the Changeset for a Review Instance
      Reviewing Fulfillment Requests
      Confirming the Fulfillment Activities
    Creating and Managing Technical Roles
      Understanding Technical Role States
      Understanding Technical Role Mining
      Understanding Technical Roles Detection and Assignments
      Understanding Technical Role Revocations
      Creating Technical Roles
      Activating Technical Roles
      Promoting Detected Roles to Assigned Roles
      Editing and Deleting a Technical Role
      Downloading and Importing Technical Roles
    Creating and Managing Business Roles
      Overview of Roles
      Understanding Business Roles
      Defining Business Roles
      Authorizing User Access Through Business Roles
      Adding Authorizations to a Business Role
      Adding a Business Role Approval Policy
      Publishing or Deactivating Business Roles
      Analyzing Business Roles
      Editing Business Roles
      Approving Business Roles
      Automated Access Provisioning and Deprovisioning
      Downloading and Importing Business Roles and Approval Policies
    Creating and Managing Separation of Duties Policies
      Understanding Separation of Duties
      Creating and Editing Separation of Duties Policies
      Understanding the Separation of Duties Policy Options
      Downloading and Importing Separation of Duties Policies
    Managing Separation of Duties Violations
      Understanding SoD Violation versus SoD Case
      Listing SoD Violations or SoD Cases
      Viewing SoD Case Details
      Understanding SoD Case Status
      Approving and Resolving an SoD Violation
      Closing an SoD Case
      Understanding Potential SoD Violations
      Approving or Resolving Potential SoD Violations
    Calculating and Customizing Risk
      Understanding Risk Levels and Risk Scoring
      Configuring Risk Levels
      Configuring Risk Scores
      Setting and Viewing Risk Calculation Schedules and Status
      Viewing Calculated Risk Scores
      Exporting and Importing Risk Policies
    Administering Access Request
      Understanding Access Request
      Configuring Access Request
      Assigning Request to Identity Governance Users
      Disabling the Access Request Service
    Creating and Modifying Review Definitions
      Viewing the Catalog
      Understanding the Review Process
      Understanding Micro Certification
      Creating a Review Definition
      Modifying a Review Definition
      Customizing Review Display
      Configuring Reasons for Review Actions
      Specifying Reviewers
      Downloading and Importing Review Definitions
      Creating a New Review Definition from an Existing Review Definition
      Improving Performance in Large Scale Reviews
    Running a Review Instance
      Completing Review Tasks
      Verifying and Approving a Review Instance
    Creating and Managing Certification Policies
      Understanding Certification Policies
      Creating and Editing Certification Policies
      Scheduling Calculations and Calculating Certification Policy Violations
      Exporting and Importing Certification Policies
      Managing Certification Policy Violations
    Analyzing Data and Monitoring Governance System
      Configuring Analytics and Role Mining Settings
      Monitoring Your Identity Governance System
    Instructions for Users with Runtime Authorizations
      Instructions for Access Requesters and Approvers
        Understanding the Access Request Process
        Reviewing Current Access and Requesting Access Removal
        Requesting Access and Viewing Timeline
        Approving Access Requests
        Approving Potential SoD Violations
        Comparing Access of Multiple Users
        Retracting Access Requests
        Restarting Failed Access Requests
      Instructions for Review Owners
        Understanding the Review Process for Review Owners
        Managing a Review in Preview Mode
        Managing a Review in Live Mode
      Instructions for Reviewers
        Understanding Reviews
        Performing a Review
        Viewing Completed Reviews
      Instructions for Fulfillers
        Understanding the Fulfillment Process
        Performing Manual Fulfillment
    Legal Notice