Identity Governance 3.6 User and Administration Guide

Identity Governance 3.6 User and Administration Guide

Identity Governance 3.6 User and Administration Guide April 2020 Legal Notice The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. For additional information, such as certification-related notices and trademarks, see http://www.microfocus.com/about/ legal/. © Copyright 2020 Micro Focus or one of its affiliates. 2 Contents About this Book and the Library 11 1 Introduction 13 1.1 Understanding Installation and Configuration . .14 1.2 Understanding Key Administration and User Tasks . .14 1.3 Understanding Reporting . .14 1.4 Understanding Licenses . .15 1.5 Understanding REST Services for Identity Governance . .15 2 Adding Identity Governance Users and Assigning Authorizations 17 2.1 Understanding Authorizations in Identity Governance . .17 2.1.1 Global Authorizations. .17 2.1.2 Runtime Authorizations . .20 2.2 Adding Identity Governance Users. .22 2.3 Assigning Authorizations to Identity Governance Users . .23 2.4 Using Coverage Maps . .24 2.4.1 Creating Coverage Map . .25 2.4.2 Loading the Coverage Map . .29 3 Customizing Identity Governance for Your Enterprise 31 3.1 Customizing the Email Notification Templates . .31 3.1.1 Modifying Email Templates . .32 3.1.2 Adding an Image to the Email Template. .37 3.2 Customizing the Collector Templates for Data Sources . 38 3.3 Customizing Categories. .38 3.4 Disabling Review Email Notifications . .39 3.5 Extending the Identity Governance Schema . .40 3.5.1 Adding or Editing Attributes to Extend the Schema . .40 3.5.2 Adding Attributes to a Collector . .42 3.5.3 Viewing Available Attributes in Business Roles . .43 3.6 Customizing Download Settings . .43 3.7 Customizing Access Request Landing Page . .44 4 Understanding Data Administration 45 4.1 Checklist for Collecting, Publishing, and Managing Data . 47 4.2 Understanding Collection and Publication Configuration Utility Settings. .48 4.2.1 Collection and Publication Batch Sizes . 48 4.2.2 Collection and Publication Settings. .48 4.3 Understanding the Identity Governance Catalog . .49 4.4 Understanding Data Sources . .50 4.5 Understanding Collectors . .51 4.5.1 Understanding Collector Configuration . .51 Contents 3 4.5.2 Transforming Data During Collection . .52 4.5.3 Testing Collections . .53 4.5.4 Creating Emulation Packages. .54 4.5.5 Downloading and Importing Collectors . .55 5 Collecting Identities 57 5.1 Understanding Collector Templates for Identity Sources . .57 5.1.1 Understanding Identity Collector Views . .57 5.1.2 Understanding Publication Behavior. .58 5.2 Understanding the Variations for Identity Sources. .59 5.2.1 Collecting from Active Directory with Azure Active Directory . .59 5.2.2 Collecting from a CSV File . .60 5.2.3 Collecting from Google Apps . .60 5.2.4 Collecting from Identity Sources with Change Events . .60 5.2.5 Collecting from Microsoft SharePoint. .62 5.3 Creating Identity Sources . .62 5.3.1 Assigning Identity Manager as the Primary Identity Source . .64 5.3.2 Understanding Change Event Collection Status . .65 5.3.3 Supported Attribute Syntaxes for eDirectory and Identity Manager Change Events Collection . .65 5.4 Migrating an Identity Collector to a Change Event Identity Collector. .66 6 Collecting Applications and Application Data 69 6.1 Understanding the Application Definition Template . .69 6.2 Understanding Collectors for Application Data Sources. 69 6.2.1 Understanding Account Collector Views . .70 6.2.2 Understanding Permission Collector Views . .70 6.2.3 Understanding the Identity Manager AE Permission Collector . .71 6.3 Creating an Application Source . .72 6.4 Collecting Application Data from a Single Application Source. .73 6.5 Collecting Application Data for Multiple Applications . .73 7 Integrating Collected Data with Identity Manager 75 7.1 Understanding Synchronization and Reflection . .75 7.1.1 Reflecting Application Permissions in Identity Manager. .75 7.1.2 Synchronizing Data Changes between Identity Governance and Identity Manager. .76 7.2 Ensuring Best Performance for Identity Matching . .77 7.3 Reflecting Permissions and Assignments from Applications Not Connected to Identity Manager . .78 7.4 Synchronizing Changes in Identity Governance Data with Objects in the Identity Vault. .79 7.4.1 Synchronizing New User Objects. .79 7.4.2 Synchronizing Resource Objects . .80 7.5 Migrating User Objects to the Identity Vault. .80 7.5.1 Targeting Identities that Do Not Exist in Identity Manager. .81 7.5.2 Adding Application Permissions after Migrating Identities. .81 8 Publishing the Collected Data 83 8.1 Publishing Identity Sources. ..

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    276 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us