Identity Governance User and Administration Guide

  Identity Governance User and Administration Guide
    Introduction
      Understanding Installation and Configuration
      Understanding Key Administration and User Tasks
      Understanding Reporting
      Understanding Licenses
      Understanding REST Services for Identity Governance
    Adding Identity Governance Users and Assigning Authorizations
      Understanding Authorizations in Identity Governance
      Adding Identity Governance Users
      Assigning Authorizations to Identity Governance Users
      Using Coverage Maps
    Creating and Managing Delegation
      Understanding Delegation
      Assigning and Managing Delegates for Yourself
      Assigning and Managing Delegation for All Users
      Exporting and Importing Delegation Mappings
    Customizing and Configuring Identity Governance for Your Enterprise
      Enabling and Disabling Auditing Events
      Managing Logging Levels
      Changing Advanced Configuration Settings
      Customizing Email Notification Templates
      Customizing the Collector Templates for Data Sources
      Creating and Assigning Categories
      Disabling Review Email Notifications
      Extending the Identity Governance Schema
      Customizing Download Settings
      Customizing Access Request Landing Page
    Using Advanced Filters for Searches
      Using the Expression Builder to Create Advanced Filters
      Creating and Saving an Advanced Filter — Example
      Using and Managing Saved Filters
    Understanding Data Administration
      Checklist for Collecting, Publishing, and Managing Data
      Understanding Collection and Publication Configuration Utility Settings
      Creating an Integration Account
      Understanding Notifications
      Understanding the Identity Governance Catalog
      Understanding Data Sources
      Understanding Cloud Bridge
      Collecting Data Using Cloud Bridge
      Understanding Collectors
      Upgrading Collectors
      Understanding Data Cleanup and Archiving
    Collecting Identities
      Understanding Collector Templates for Identity Sources
      Understanding the Variations for Identity Sources
      Collecting from Identity Sources with Change Events
      Creating Identity Sources
      Assigning Identity Manager as the Primary Identity Source
    Collecting Applications and Application Data
      Understanding the Application Definition Template
      Understanding Collectors for Application Data Sources
      Understanding Variations for Application Sources
      Understanding Hybrid Permission Collectors
      Creating an Application Source
      Exporting and Importing an Application Source and Collectors
      Collecting Application Data from a Single Application Source
      Collecting Application Data for Multiple Applications
      Understanding Change Event Processing
      Collecting Application and Application Definition Data Source Change Events
    Publishing the Collected Data
      Publishing Identity Sources
      Publishing Application Sources
    Creating and Monitoring Scheduled Collections
      Creating a Scheduled Collection
      Monitoring Scheduled Collections
      Understanding the Cron Expression for a Custom Interval of Collection
    Creating and Managing Data Policies
      Understanding Data Policies
      Understanding Data Policy Detections
      Creating and Editing Data Policies
      Scheduling Data Policy Calculations
      Manually Calculating Publication Data Policy Metrics
      Comparing Collections and Publications
      Manually Resolving Detections
      Detecting and Remediating Violations in Published Data
      Monitoring Data Policy Detections and Remediations Results
      Exporting and Importing Data Policies
    Managing Data in the Catalog
      Configuring the Data Source for Post Authentication Matching
      Understanding Identity, Application, and Permission Management
      Editing Attribute Values of Objects in the Catalog
      Searching for Items in the Catalog
      Analyzing Data with Insight Queries
      Downloading Catalog Entities
    Database Maintenance
      Understanding Database Maintenance
      Understanding Archive Destinations
      Performing Database Maintenance
      Disabling and Enabling Archiving
      Scheduling Data Maintenance
      Identifying Purgeable Data
    Setting up Fulfillment Targets and Fulfilling Changesets
      Understanding the Fulfillment Process
      Configuring Fulfillment
      Monitoring Fulfillment Status
      Customizing Fulfillment Target Templates
      Specifying Additional Fulfillment Context Attributes
      Fulfilling Changesets
      Reviewing Fulfillment Requests
      Confirming the Fulfillment Activities
    Instructions for Fulfillers
      Understanding the Fulfillment Process
      Performing Manual Fulfillment
    List of Collector and Fulfillment Target Templates
    Understanding Variations in Collector and Fulfillment Target Configurations
      Understanding and Configuring Active Directory and eDirectory Templates
      Understanding and Configuring Azure AD MS Graph Templates
      Understanding and Configuring CSV Templates
      Understanding and Configuring Google Apps Templates
      Understanding and Configuring Identity Manager Templates
      Understanding and Configuring JDBC Templates
      Understanding and Configuring PAM Templates
      Understanding and Configuring MS Teams Templates
      Understanding and Configuring REST GitHub Templates
      Understanding and Configuring Salesforce Templates
      Understanding and Configuring SAP Templates
      Understanding and Configuring SCIM Templates
      Understanding and Configuring ServiceNow Templates
      Understanding and Configuring SharePoint Templates
      Understanding and Configuring Workday Templates
      About REST Generic Fulfillment
      About Workflow Service Fulfillment
    Creating and Managing Technical Roles
      Overview of Roles
      Understanding Technical Roles
      Understanding Technical Role States
      Understanding Technical Role Mining
      Understanding Technical Role Detection and Assignments
      Understanding Technical Role Revocations
      Creating and Defining Technical Roles
      Activating Technical Roles
      Promoting Detected Roles to Assigned Roles
      Editing and Deleting a Technical Role
      Monitoring Technical Roles and Downloading A List of Detected and Assigned Users
      Downloading and Importing Technical Roles
    Creating and Managing Business Roles
      Understanding Business Roles
      Creating and Defining Business Roles
      Adding a Business Role Approval Policy
      Publishing or Deactivating Business Roles
      Analyzing Business Roles
      Editing Business Roles
      Approving Business Roles
      Automated Access Provisioning and Deprovisioning
      Downloading and Importing Business Roles and Approval Policies
    Creating and Managing Separation of Duties Policies
      Understanding Separation of Duties
      Understanding the Separation of Duties Policy Options
      Creating and Editing Separation of Duties Policies
      Downloading and Importing Separation of Duties Policies
      Creating and Assigning Separation of Duties Approval Policies
      Configuring SoD Violation Options for Technical Roles
    Managing Separation of Duties Violations
      Separation of Duties Violation Versus Separation of Duties Case
      Listing Separation of Duties Violations and Cases
      Viewing SoD Case Details
      Understanding SoD Case Status
      Approving or Resolving an SoD Violation
      Closing an SoD Case
      Understanding Potential SoD Violations
      Approving or Resolving Potential SoD Violations
    Calculating and Customizing Risk
      Understanding Risk Levels and Risk Scoring
      Configuring Risk Levels
      Configuring Risk Scores
      Setting and Viewing Risk Calculation Schedules and Status
      Viewing Calculated Risk Scores
      Exporting and Importing Risk Policies
    Administering Access Request
      Understanding Access Request
      Configuring Access Request for Identity Governance Users
      Optimizing Access Request Search Performance
      Creating Access Request Policies
      Creating Request Approval Policies
      Understanding the Default SoD Approval Policy
      Creating and Editing Request and Approval Forms
      Using Workflows to Approve Requests
      Downloading and Importing Access Request and Approval Policies
      Disabling the Access Request Service
    Instructions for Access Requesters and Approvers
      Reviewing Current Access and Requesting Access Removal
      Requesting Access
      Monitoring, Retracting, or Retrying Your Requests
      Approving Access Requests and Monitoring Approvals
      Approving Potential SoD Violations
      Comparing Access of Multiple Users
    Understanding the Review Process
      Understanding the Process Flow
      Understanding Micro Certification
      Improving Performance in Large Scale Reviews
    Creating and Modifying Review Definitions
      Creating a Review Definition
      Customizing Review Display
      Configuring Reasons for Review Actions
      Downloading and Importing Review Definitions
      Creating a New Review Definition from an Existing Review Definition
    Understanding Review Run
      Understanding Review Run in Preview Mode
      Understanding Review Run in Live Mode
      Completing Review Tasks
      Verifying and Approving a Review Run
    Instructions for Review Owners
      Managing a Review in Preview Mode
      Managing a Review in Live Mode
    Instructions for Reviewers
      Performing a Review
      Viewing Completed Reviews
    Creating and Managing Certification Policies
      Understanding Certification Policies
      Creating and Editing Certification Policies
      Scheduling Calculations and Calculating Certification Policy Violations
      Exporting and Importing Certification Policies
      Managing Certification Policy Violations
    Analyzing Data and Using Custom Metrics
      Understanding Analytics and Role Mining Settings
      Configuring Analytics and Role Mining Settings
      Configuring Metrics Data Stores for Custom Metrics
      Creating Custom Metrics
      Downloading and Importing Custom Metric Definitions
    Monitoring Your Governance and Administration System
      Understanding the Governance Widgets and Dashboards
      Creating New Governance Widgets
      Downloading Custom Governance Widget Data
      Creating and Personalizing Governance Dashboards
      Viewing Data Collection Statistics and Summary
      Viewing Governance Risk Score
      Viewing Policies and Controls Status, Violations, and Trends
      Viewing Account Statistics and Other Details
      Viewing Entitlement Assignments Statistics to Leverage Roles
      Viewing Activity Statistics and Trends
    Exporting and Importing
      Understanding File Formats and Import Flows
      Exporting and Downloading Data
      Prerequisites for Importing Data
      Recommended Order of Import
      Importing Data
      Exporting and Importing Quick Reference
    Legal Notice