Novell® Identity Manager is a system software product that your organization uses to securely manage the access needs of its user community. If you’re a member of that user community, you benefit from Identity Manager in a number of ways. For example, Identity Manager enables your organization to:
Give users access to the information (such as group org charts, department white pages, or employee lookup) and resources (such as equipment or accounts on internal systems) that they need, right from day one
Synchronize multiple passwords into a single login for all your systems
Modify or revoke access rights instantly when necessary (such as when someone transfers to a different group or leaves the organization)
Support compliance with government regulations
To bring these benefits directly to you and your team, the Identity Manager User Application provides a user interface that you can use from your Web browser.
The Identity Manager User Application is your view into the information, resources, and capabilities of Identity Manager. Your system administrator determines the details of what you can see and do in the Identity Manager User Application. Typically, this includes:
Identity self-service, which enables you to:
Display organization charts
Report applications associated with a user if you are an administrator. (Requires the Roles Based Provisioning Module for Identity Manager.)
Edit the information in your profile
Search a directory
Change your password, password challenge response, and password hint
Review your password policy status and password synchronization status
Create accounts for new users or groups (if you are authorized)
Requests and approvals, which enable you to:
Request resources
Check the approval of your resource requests
Work on tasks assigned to you for approving other resource requests
Perform requests and approvals as a proxy or delegate for someone else
Assign someone else to be your proxy or delegate (if you are authorized)
Manage all of these request and approval features for your team (if you are authorized)
Optionally provide a digital signature for each request or approval
NOTE:Requests and approvals require the Roles Based Provisioning Module for Identity Manager.
Roles, which enable you to:
Request role assignments and manage the approval process for role assignment requests
Check the status of your role requests
Define roles and role relationships
Define separation of duties (SoD) constraints and manage the approval process in situations where a user requests an override to a constraint
Browse the Role Catalog
Look at detailed reports that list the roles and separation of duties constraints defined in the catalog, as well as the current state of role assignments, separation of duties exceptions, and user entitlements
NOTE:Roles require the Roles Based Provisioning Module for Identity Manager.
Compliance, which enable you to:
Request user profile attestation processes
Request separation of duties (SoD) attestation processes
Request role assignment attestation processes
Request user assignment attestation processes
NOTE:Compliance requires the Roles Based Provisioning Module for Identity Manager.
IMPORTANT:The User Application is an application and not a framework. The areas within the User Application that are supported to be modified are outlined within the product documentation. Modifications to areas not outlined within the product documentation are not supported.
Figure 1-1 The IDM User Application Provides the User Interface to Identity Manager
Here are some examples of how people typically use the Identity Manager User Application within an organization.
Ella (an end user) recovers her forgotten password through the identity self-service features when logging in.
Erik (an end user) performs a search for all employees who speak German at his location.
Eduardo (an end user) browses the organization chart, finds Ella, and clicks the e-mail icon to send a message to her.
Ernie (an end user) browses a list of resources available to him, and requests access to the Siebel* system.
Amy (an approver) receives notification of an approval request via e-mail (which contains an URL). She clicks the link, is presented with an approval form, and approves it.
Ernie checks on the status of his previous request for Siebel access (which has now gone to a second person for approval). He sees that it is still in progress.
Amy is going on vacation, so she indicates that she is temporarily unavailable. No new approval tasks are assigned to her while she is unavailable.
Amy opens her approval task list, sees that there are too many for her to respond to in a timely manner, and reassigns several to co-workers.
Pat (an administrative assistant, acting as a proxy user for Amy) opens Amy’s task list and performs an approval task for her.
Max (a manager) views the task lists of people in his department. He knows that Amy is on vacation, so he reassigns tasks to others in his department.
Max initiates a request for a database account for someone in his department who reports directly to him.
Max assigns Dan to be an authorized delegate for Amy.
Dan (now a delegated approver) receives Amy’s tasks when she is unavailable.
Max engages an unpaid intern, who should not be entered into the HR system. The system administrator creates the user record for this intern and requests that he be given access to Notes, Active Directory*, and Oracle*.
Maxine (a Role Manager) creates the Nurse and Doctor business roles and the Administer Drugs and Write Prescriptions IT roles.
Maxine (a Role Manager) defines a relationship between the Nurse and Administer Drugs roles, specifying that the Nurse role contains the Administer Drugs role. Max also defines a relationship between the Write Prescriptions and Doctor roles, specifying that the Doctor role contains the Write Prescriptions role.
Chester (a Security Officer) defines a separation of duties constraint that specifies that a potential conflict exists between the Doctor and Nurse roles. This means that ordinarily the same user should be not assigned to both roles at the same time. In some circumstances, an individual who requests a role assignment may want to override this constraint. To define a separation of duties exception, the individual who requests the assignment must provide a justification.
Ernest (an end user) browses a list of roles available to him, and requests assignment to the Nurse role.
Amelia (an approver) receives notification of an approval request via e-mail (which contains an URL). She clicks the link, is presented with an approval form, and approves it.
Arnold (a Role Manager) requests that Ernest be assigned to the Doctor role. He is notified that a potential conflict exists between the Doctor role and Nurse role, to which Ernest has already been assigned. He provides a justification for making an exception to the separation of duties constraint.
Edward (a separation of duties approver) receives notification of a separation of duties conflict via e-mail. He approves Arnold’s request to override the separation of duties constraint.
Amelia (an approver) receives notification of an approval request for the Doctor role via e-mail. She approves the Arnold’s request to assign Ernest to the Doctor role.
Bill (a Role Auditor) looks at the SoD Violations and Exceptions Report and sees that Ernest has been assigned to both the Doctor and Nurse roles.
Maxine (a Role Manager) creates the Nurse and Doctor business roles and the Administer Drugs and Write Prescriptions IT roles.
Maxine (a Role Manager) defines a relationship between the Nurse and Administer Drugs roles, specifying that the Nurse role contains the Administer Drugs role. Max also defines a relationship between the Write Prescriptions and Doctor roles, specifying that the Doctor role contains the Write Prescriptions role.
Chester (a Security Officer) defines a separation of duties constraint that specifies that a potential conflict exists between the Doctor and Nurse roles. This means that ordinarily the same user should be not assigned to both roles at the same time. In some circumstances, an individual who requests a role assignment may want to override this constraint. To define a separation of duties exception, the individual who requests the assignment must provide a justification.
Arnold (a Role Manager) requests that Ernest be assigned to the Doctor role. He is notified that a potential conflict exists between the Doctor role and Nurse role, to which Ernest has already been assigned. He provides a justification for making an exception to the separation of duties constraint.
Philip (a Compliance Module Administrator) initiates a role assignment attestation process for the Nurse role.
Fiona (an attester) receives notification of the attestation task via e-mail (which contains an URL). She clicks the link and is presented with an attestation form. She provides an affirmative answer to the attestation question, thereby giving her consent that the information is correct.
Philip (a Compliance Module Administrator) initiates a new request for a user profile attestation process for users in the Human Resources group.
Each user in the Human Resources group receives notification of the attestation task via e-mail (which contains an URL). Each user clicks the link and is presented with an attestation form. The form gives the user an opportunity to review the values for various user profile attributes. After reviewing the information, each user answers the attestation question.