Identity Governance 3.6 User and Administration Guide
- Identity Governance 3.6 User and Administration Guide
- Introduction
- Understanding Installation and Configuration
- Understanding Key Administration and User Tasks
- Understanding Reporting
- Understanding Licenses
- Understanding REST Services for Identity Governance
- Adding Identity Governance Users and Assigning Authorizations
- Understanding Authorizations in Identity Governance
- Adding Identity Governance Users
- Assigning Authorizations to Identity Governance Users
- Using Coverage Maps
- Customizing Identity Governance for Your Enterprise
- Customizing the Email Notification Templates
- Customizing the Collector Templates for Data Sources
- Customizing Categories
- Disabling Review Email Notifications
- Extending the Identity Governance Schema
- Customizing Download Settings
- Customizing Access Request Landing Page
- Understanding Data Administration
- Checklist for Collecting, Publishing, and Managing Data
- Understanding Collection and Publication Configuration Utility Settings
- Understanding the Identity Governance Catalog
- Understanding Data Sources
- Understanding Collectors
- Collecting Identities
- Understanding Collector Templates for Identity Sources
- Understanding the Variations for Identity Sources
- Creating Identity Sources
- Migrating an Identity Collector to a Change Event Identity Collector
- Collecting Applications and Application Data
- Understanding the Application Definition Template
- Understanding Collectors for Application Data Sources
- Creating an Application Source
- Collecting Application Data from a Single Application Source
- Collecting Application Data for Multiple Applications
- Integrating Collected Data with Identity Manager
- Understanding Synchronization and Reflection
- Ensuring Best Performance for Identity Matching
- Reflecting Permissions and Assignments from Applications Not Connected to Identity Manager
- Synchronizing Changes in Identity Governance Data with Objects in the Identity Vault
- Migrating User Objects to the Identity Vault
- Publishing the Collected Data
- Publishing Identity Sources
- Publishing Application Sources
- Creating and Monitoring Scheduled Collections
- Creating a Scheduled Collection
- Monitoring Scheduled Collections
- Understanding the Cron Expression for a Custom Interval of Collection
- Creating and Managing Data Policies
- Understanding Data Policies
- Creating and Editing Data Policies
- Scheduling Data Policy Calculations
- Manually Calculating Data Policy Metrics
- Comparing Collections and Publications
- Detecting and Remediating Violations in Published Data
- Exporting and Importing Data Policies
- Managing Data in the Catalog
- Configuring the Data Source for Post Authentication Matching
- Understanding Identity, Application, and Permission Management
- Configuring Bulk Data Update Settings
- Editing Attribute Values of Objects in the Catalog
- Searching for Items in the Catalog
- Analyzing Data with Insight Queries
- Downloading Catalog Entities
- Creating and Managing Delegation
- Understanding Delegation
- Assigning and Managing Delegates
- Database Maintenance
- Understanding Database Maintenance
- Archiving and Purging Data
- Disabling and Enabling Archiving
- Scheduling Data Maintenance
- Identifying Purgeable Data
- Setting up Fulfillment Targets and Fulfilling Changesets
- Understanding the Fulfillment Process
- Configuring Fulfillment
- Monitoring Fulfillment Status
- Customizing Fulfillment Target Templates
- Specifying Additional Fulfillment Context Attributes
- Fulfilling the Changeset for a Review Instance
- Reviewing Fulfillment Requests
- Confirming the Fulfillment Activities
- Creating and Managing Technical Roles
- Understanding Technical Role States
- Understanding Technical Role Mining
- Understanding Technical Roles Detection and Assignments
- Understanding Technical Role Revocations
- Creating Technical Roles
- Activating Technical Roles
- Promoting Detected Roles to Assigned Roles
- Editing and Deleting a Technical Role
- Downloading and Importing Technical Roles
- Creating and Managing Business Roles
- Overview of Roles
- Understanding Business Roles
- Defining Business Roles
- Authorizing User Access Through Business Roles
- Adding Authorizations to a Business Role
- Adding a Business Role Approval Policy
- Publishing or Deactivating Business Roles
- Analyzing Business Roles
- Editing Business Roles
- Approving Business Roles
- Automated Access Provisioning and Deprovisioning
- Downloading and Importing Business Roles and Approval Policies
- Creating and Managing Separation of Duties Policies
- Understanding Separation of Duties
- Creating and Editing Separation of Duties Policies
- Understanding the Separation of Duties Policy Options
- Downloading and Importing Separation of Duties Policies
- Managing Separation of Duties Violations
- Understanding SoD Violation versus SoD Case
- Listing SoD Violations or SoD Cases
- Viewing SoD Case Details
- Understanding SoD Case Status
- Approving and Resolving an SoD Violation
- Closing an SoD Case
- Understanding Potential SoD Violations
- Approving or Resolving Potential SoD Violations
- Calculating and Customizing Risk
- Understanding Risk Levels and Risk Scoring
- Configuring Risk Levels
- Configuring Risk Scores
- Setting and Viewing Risk Calculation Schedules and Status
- Viewing Calculated Risk Scores
- Exporting and Importing Risk Policies
- Administering Access Request
- Understanding Access Request
- Configuring Access Request
- Assigning Request to Identity Governance Users
- Disabling the Access Request Service
- Creating and Modifying Review Definitions
- Viewing the Catalog
- Understanding the Review Process
- Understanding Micro Certification
- Creating a Review Definition
- Modifying a Review Definition
- Customizing Review Display
- Configuring Reasons for Review Actions
- Specifying Reviewers
- Downloading and Importing Review Definitions
- Creating a New Review Definition from an Existing Review Definition
- Improving Performance in Large Scale Reviews
- Running a Review Instance
- Completing Review Tasks
- Verifying and Approving a Review Instance
- Creating and Managing Certification Policies
- Understanding Certification Policies
- Creating and Editing Certification Policies
- Scheduling Calculations and Calculating Certification Policy Violations
- Exporting and Importing Certification Policies
- Managing Certification Policy Violations
- Analyzing Data and Monitoring Governance System
- Configuring Analytics and Role Mining Settings
- Monitoring Your Identity Governance System
- Instructions for Users with Runtime Authorizations
- Instructions for Access Requesters and Approvers
- Understanding the Access Request Process
- Reviewing Current Access and Requesting Access Removal
- Requesting Access and Viewing Timeline
- Approving Access Requests
- Approving Potential SoD Violations
- Comparing Access of Multiple Users
- Retracting Access Requests
- Restarting Failed Access Requests
- Instructions for Review Owners
- Understanding the Review Process for Review Owners
- Managing a Review in Preview Mode
- Managing a Review in Live Mode
- Instructions for Reviewers
- Understanding Reviews
- Performing a Review
- Viewing Completed Reviews
- Instructions for Fulfillers
- Understanding the Fulfillment Process
- Performing Manual Fulfillment
- Legal Notice