OpenText™ Identity Governance as a Service User and Administration Guide
- OpenText™ Identity Governance as a Service User and Administration Guide
- Introduction
- Understanding key administration and user tasks
- Understanding reporting
- Adding OpenText Identity Governance users and assigning authorizations
- Understanding authorizations in OpenText Identity Governance
- Adding OpenText Identity Governance users
- Assigning authorizations to OpenText Identity Governance users
- Using coverage maps
- Creating and managing delegation
- Understanding delegation
- Assigning and managing delegates for yourself
- Assigning and managing delegation for all users
- Exporting and importing delegation mappings
- Customizing and configuring OpenText Identity Governance for your enterprise
- Customizing headers and access request and approval menu names
- Enabling and disabling auditing events
- Managing logging levels
- Customizing email notification templates
- Customizing the collector templates for data sources
- Creating and assigning categories
- Disabling review email notifications
- Extending the OpenText Identity Governance schema
- Customizing download settings
- Using advanced filters for searches
- Using the expression builder to create advanced filters
- Creating and saving an advanced filter — example
- Using and managing saved filters
- Understanding data administration
- Checklist for collecting, publishing, and managing data
- Understanding service accounts
- Creating an integration account for data collection and fulfillment
- Understanding notifications
- Understanding the OpenText Identity Governance catalog
- Understanding data sources
- Understanding Cloud Bridge
- Collecting data using Cloud Bridge
- Understanding collectors
- Modifying collector configurations
- Upgrading collectors
- Understanding data cleanup and archiving
- Collecting identities
- Understanding collector templates for identity sources
- Understanding the variations for identity sources
- Collecting from identity sources with change events
- Creating identity sources
- Assigning OpenText Identity Manager as the primary identity source
- Collecting applications and application data
- Understanding the application definition template
- Understanding collectors for application data sources
- Understanding variations for application sources
- Understanding hybrid permission collectors
- Creating an application source
- Exporting and importing an application source and collectors
- Collecting application data from a single application source
- Collecting application data for multiple applications
- Understanding change event processing
- Collecting application and application definition data source change events
- Publishing the collected data
- Publishing identity sources
- Publishing application sources
- Creating and monitoring scheduled collections
- Creating a scheduled collection
- Monitoring scheduled collections
- Understanding the cron expression for a custom interval of collection
- Creating and managing data policies
- Understanding data policies
- Understanding data policy detections
- Creating and editing data policies
- Scheduling data policy calculations
- Manually calculating publication data policy metrics
- Comparing collections and publications
- Manually resolving detections
- Detecting and remediating violations in published data
- Monitoring data policy detections and remediations results
- Exporting and importing data policies
- Managing data in the catalog
- Configuring the data source for post authentication matching
- Understanding identity, application, and permission management
- Editing attribute values of objects in the catalog
- Resetting curated attribute values to collected values
- Searching for items in the catalog
- Analyzing data with insight queries
- Creating collection schedule for insight queries
- Downloading catalog entities
- Setting up fulfillment targets and fulfilling changesets
- Understanding the fulfillment process
- Configuring fulfillment
- Monitoring fulfillment status
- Customizing fulfillment target templates
- Specifying additional fulfillment context attributes
- Fulfilling changesets
- Reviewing fulfillment requests
- Confirming the fulfillment activities
- Instructions for fulfillers
- Understanding the fulfillment process
- Performing manual fulfillment
- Creating and managing technical roles
- Overview of roles
- Understanding technical roles
- Understanding technical role states
- Understanding technical role mining
- Understanding technical role detection and assignments
- Understanding technical role revocations
- Creating and defining technical roles
- Activating technical roles
- Promoting detected roles to assigned roles
- Editing and deleting a technical role
- Monitoring technical roles and downloading a list of detected and assigned users
- Downloading and importing technical roles
- Creating and managing business roles
- Understanding business roles
- Creating and defining business roles
- Adding a business role approval policy
- Publishing or deactivating business roles
- Analyzing business roles
- Editing business roles
- Approving business roles
- Automated access provisioning and deprovisioning
- Downloading and importing business roles and approval policies
- Creating and managing separation of duties policies
- Understanding separation of duties
- Understanding the separation of duties policy options
- Creating and editing separation of duties policies
- Downloading and importing separation of duties policies
- Creating and assigning separation of duties approval policies
- Configuring SoD violation options for technical roles
- Managing separation of duties violations
- Separation of duties violation versus separation of duties case
- Listing separation of duties violations and cases
- Viewing SoD case details
- Understanding SoD case status
- Approving or resolving an SoD violation
- Closing an SoD case
- Understanding potential SoD violations
- Approving or resolving potential SoD violations
- Calculating and customizing risk
- Understanding risk levels and risk scoring
- Configuring risk levels
- Configuring risk scores
- Setting and viewing risk calculation schedules and status
- Viewing calculated risk scores
- Exporting and importing risk policies
- Administering access request
- Understanding access request
- Configuring access request for OpenText Identity Governance users
- Optimizing access request search performance
- Creating access request policies
- Creating request approval policies
- Understanding the default SoD approval policy
- Creating and editing request and approval forms
- Using Workflows to approve requests
- Downloading and importing access request and approval policies
- Instructions for access requesters and approvers
- Reviewing current access and requesting access removal
- Requesting access
- Monitoring or retracting your requests
- Approving access requests and monitoring approvals
- Approving potential sod violations
- Comparing access of multiple users
- Understanding the review process
- Understanding the process flow
- Understanding micro certification
- Improving performance in large scale reviews
- Creating and modifying review definitions
- Creating a review definition
- Customizing review display
- Configuring reasons for review actions
- Downloading and importing review definitions
- Creating a new review definition from an existing review definition
- Understanding review run
- Understanding review run in preview mode
- Understanding review run in live mode
- Completing review tasks
- Verifying and approving a review run
- Instructions for review owners
- Managing a review in preview mode
- Managing a review in live mode
- Instructions for reviewers
- Performing a review
- Viewing completed reviews
- Creating and managing certification policies
- Understanding certification policies
- Creating and editing certification policies
- Scheduling calculations and calculating certification policy violations
- Exporting and importing certification policies
- Managing certification policy violations
- Analyzing data and using custom metrics
- Understanding analytics and role mining settings
- Configuring analytics and role mining settings
- Configuring metrics data stores for custom metrics
- Creating custom metrics
- Downloading and importing custom metric definitions
- Monitoring your governance and administration system
- Understanding the governance widgets and dashboards
- Creating new governance widgets
- Downloading custom governance widget data
- Creating and personalizing governance dashboards
- Viewing data collection statistics and summary
- Viewing governance risk score
- Viewing policies and controls status, violations, and trends
- Viewing account statistics and other details
- Viewing entitlement assignments statistics to leverage roles
- Viewing activity statistics and trends
- Exporting and importing
- Understanding file formats and import flows
- Exporting and downloading data
- Prerequisites for importing data
- Recommended order of import
- Importing data
- Exporting and importing quick reference
- Legal notice