0% found this document useful (0 votes)
16 views226 pages

OneIM IdentityManagementBaseModule Administration

The One Identity Manager 9.2 Administration Guide provides comprehensive instructions for managing identities, devices, and company resources within an organization. It outlines the hierarchical role structure, principles for assigning resources, and methods for calculating inheritance. The guide also includes detailed sections on dynamic roles, departmental management, and identity administration, ensuring users can effectively utilize the software for identity management tasks.

Uploaded by

m.lashen.work
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views226 pages

OneIM IdentityManagementBaseModule Administration

The One Identity Manager 9.2 Administration Guide provides comprehensive instructions for managing identities, devices, and company resources within an organization. It outlines the hierarchical role structure, principles for assigning resources, and methods for calculating inheritance. The guide also includes detailed sections on dynamic roles, departmental management, and identity administration, ensuring users can effectively utilize the software for identity management tasks.

Uploaded by

m.lashen.work
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

One Identity Manager 9.

Identity Management Base Module


Administration Guide
Copyright 2023 One Identity LLC.
ALL RIGHTS RESERVED.
This guide contains proprietary information protected by copyright. The software described in this
guide is furnished under a software license or nondisclosure agreement. This software may be used
or copied only in accordance with the terms of the applicable agreement. No part of this guide may
be reproduced or transmitted in any form or by any means, electronic or mechanical, including
photocopying and recording for any purpose other than the purchaser’s personal use without the
written permission of One Identity LLC .
The information in this document is provided in connection with One Identity products. No license,
express or implied, by estoppel or otherwise, to any intellectual property right is granted by this
document or in connection with the sale of One Identity LLC products. EXCEPT AS SET FORTH IN THE
TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT,
ONE IDENTITY ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR
STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-
INFRINGEMENT. IN NO EVENT SHALL ONE IDENTITY BE LIABLE FOR ANY DIRECT, INDIRECT,
CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT
LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF
INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF
ONE IDENTITY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. One Identity makes
no representations or warranties with respect to the accuracy or completeness of the contents of this
document and reserves the right to make changes to specifications and product descriptions at any
time without notice. One Identity does not make any commitment to update the information
contained in this document.
If you have any questions regarding your potential use of this material, contact:
One Identity LLC.
Attn: LEGAL Dept
4 Polaris Way
Aliso Viejo, CA 92656
Refer to our Web site ([Link] for regional and international office
information.
Patents
One Identity is proud of our advanced technology. Patents and pending patents may apply to this
product. For the most current information about applicable patents for this product, please visit our
website at [Link]
Trademarks
One Identity and the One Identity logo are trademarks and registered trademarks of One Identity
LLC. in the U.S.A. and other countries. For a complete list of One Identity trademarks, please visit
our website at [Link]/legal/[Link]. All other trademarks are
the property of their respective owners.
Legend

WARNING: A WARNING icon highlights a potential risk of bodily injury or property


damage, for which industry-standard safety precautions are advised. This icon is
often associated with electrical hazards related to hardware.

CAUTION: A CAUTION icon indicates potential damage to hardware or loss of data


if instructions are not followed.

One Identity Manager Identity Management Base Module Administration Guide


Updated - 29 September 2023, 03:25
For the most recent documents and product information, see Online product documentation.
Contents

Basics for mapping company structures in One Identity Manager 10


Hierarchical role structure basic principles 11
Inheritance directions within a hierarchy 11
Discontinuing inheritance 13
Basic principles for assigning company resources 15
Direct company resource assignments 16
Indirect company resource assignments 16
Secondary assignment of company resources 16
Primary assignment of company resources 17
Assigning company resources through dynamic roles 19
Assigning company resources through IT Shop requests 19
Basics of calculating inheritance 20
Calculating inheritance by hierarchical roles 21
Calculation of assignments 22
Preparing hierarchical roles for company resource assignments 24
Possible assignments of company resources through roles 25
Permitting assignments of identities, devices, workdesks, and company resources
to roles 29
Blocking inheritance using roles 30
Preventing identities, devices, or workdesks from inheriting individual roles 31
Preventing inheritance to individual identities, devices, or workdesks 31
Inheritance exclusion: Specifying conflicting roles 33

Dynamic roles 35
Creating and editing dynamic roles 36
Tips about conditions for dynamic roles 37
Testing dynamic role conditions 38
Calculating role memberships for dynamic roles 39
Schedules for calculating dynamic roles 40
Creating and editing dynamic role schedules 40
Starting dynamic role schedules immediately 43
Assigning dynamic roles to schedules 43

One Identity Manager 9.2 Identity Management Base Module


Administration Guide
3
Calculating dynamic roles immediately if objects change 44
Calculating role memberships for dynamic roles immediately 46
Editing properties for immediate recalculation 46
Excluding dynamic roles from recalculation 47
Excluding identities from dynamic roles 48
Removing identities from the exclusion list 48
Main data of exclude lists for dynamic roles 49
Displaying the dynamic role overview 49
Main data for dynamic roles 50

Departments, cost centers, and locations 52


One Identity Manager users for managing departments, cost centers, and locations 53
Basic information for departments, cost centers, and locations 55
Role classes for departments, cost centers, and locations 56
Assigning role types to role classes for departments, cost centers, and locations 57
Role types for departments, cost centers, and locations 57
Creating role types for departments, cost centers, and locations 58
Assigning role classes to role types for departments, cost centers, and locations 59
Functional areas for departments, cost centers, and locations 59
Attestors for departments, cost centers, and locations 61
Approvers and approvers (IT) for departments, cost centers, and locations 62
Creating and editing departments 63
General main data for departments 64
Contact data for departments 66
Functional area and risk assessment for departments 67
Creating and editing cost centers 68
General main data for cost centers 68
Functional area and risk assessment for cost centers 71
Creating and editing locations 72
General main data for locations 72
Location address information 75
Configuring location networks 76
Directions to location 76
Functional area and risk assessment for locations 76
Setting up IT operating data for departments, cost centers, and locations 77
Modify IT operating data 81

One Identity Manager 9.2 Identity Management Base Module


Administration Guide
4
Assigning identities, devices, and workdesks to departments, cost centers, and
locations 82
Assigning company resources to departments, cost centers, and locations 83
Creating dynamic roles for departments, cost centers, and locations 85
Dynamic roles with incorrectly excluded identities 86
Assign organizations 87
Specifying inheritance exclusion for departments, cost centers, and locations 88
Assigning extended properties to departments, cost centers, and locations 90
Certifying departments, cost centers, and locations 90
Reports about departments, cost centers, and locations 91

Identity administration 93
One Identity Manager users for managing identities 94
Basics for managing identities 95
Main identities and subidentities 97
Identity's central user account 98
Identity's default email address 98
Identity's central password 99
Creating and editing identities 100
General main data of identities 101
Organizational main data of identities 104
Address data for identities 106
Miscellaneous main data of identities 107
Assigning company resources to identities 110
Assigning identities to departments, cost centers, and locations 115
Assigning identities to business roles 116
Adding identities to IT Shop custom nodes 117
Assigning application roles to identities 117
Assigning resources directly to identities 118
Assigning system roles directly to identities 119
Assigning subscribable reports directly to identities 119
Assigning software directly to identities 120
Displaying the origin of identities' roles and entitlements 120
Analyzing role memberships and identity assignments 123
Deactivating and deleting identities 124
Temporarily deactivating identities 124

One Identity Manager 9.2 Identity Management Base Module


Administration Guide
5
Permanently deactivating identities 125
Reactivate permanently deactivated identities 126
Deferred deletion of identities 127
Deleting all personal data 127
Limited access to One Identity Manager 128
Changing the certification status of identities 128
Displaying the identities overview 129
Displaying and deleting identities' Webauthn security keys 130
Determining the language for identities 131
Determining identities working hours 132
Manually assigning user accounts to identities 133
Entering tickets for identities 133
Assigning extended properties to identities 133
Reports about identities 134
Basic configuration data for identities 137
Creating and editing business partners for external identities 137
Mail templates for notifications about identities 139
Creating and editing mail definitions for identities 139
Base objects for mail templates about identities 140
Editing mail templates for identities 141
Password policies for identities 142
Predefined password policies 142
Applying identity password policies 143
Changing the password policy for password columns 144
Assigning password policies to departments, cost centers, locations, and
business roles 144
Editing password policies for identities 145
Creating password policies for identities 146
General main data for password policies 146
Password policy settings 147
Character classes for passwords 148
Custom scripts for password requirements 150
Defining the excluded list for passwords 153
Checking identity passwords 153
Generating passwords for testing identities 153

One Identity Manager 9.2 Identity Management Base Module


Administration Guide
6
Informing identities about expiring passwords 154
Displaying locked identities and system users 154

Managing devices and workdesks 156


Basic data for device admin 157
Creating and editing device models 157
General main data for device models 158
Inventory data for device models 159
Creating and editing business partners 160
Creating and editing device statuses 162
Creating and editing workdesk statuses 163
Creating and editing workdesk types 163
Creating and editing devices 164
General main data for devices 165
Device networking data 168
Assigning company resources to devices 169
Assigning devices to departments, cost centers, and locations 171
Assigning devices to business roles 172
Entering service agreements and tickets for devices 173
Displaying the device overview 173
Creating and editing workdesks 174
General main data of workdesks 174
Location information for workdesks 176
Additional information for workdesks 176
Assigning company resources to workdesks 177
Assigning workdesks to departments, cost centers, and locations 179
Assigning workdesks to business roles 180
Assigning system roles directly to workdesks 181
Assigning software directly to workdesks 181
Displaying the workdesk overview 182
Assigning devices to workdesks 182
Assigning workdesks to identities 183
Entering tickets for workdesks 183
Asset data for devices 184
Creating and editing asset classes for devices 185
Creating and editing asset types for devices 185

One Identity Manager 9.2 Identity Management Base Module


Administration Guide
7
Entering investments and investment plans for devices 186
Editing device asset data 187
Main data for devices' asset data 187
Commercial data for devices 189

Managing resources 191


One Identity Manager users for managing resources 192
Basic data for resources 193
Resource types 193
Creating and editing resources 194
Main data for resources 195
Assigning resources to identities 196
Assigning resources to departments, cost centers, and locations 196
Assigning resources to business roles 197
Assigning resources directly to identities 198
Adding resources to the IT Shop 198
Adding resources in system roles 199
Displaying the resources overview 200
Assigning extended properties to resources 200
Creating and editing multi-request resources 201
Main data for multi-request resources 202
Assigning multi-request resources to identities 203
Adding multi-request resources to the IT Shop 203
Displaying the multi-request resource overview 205
Reports about resources 205

Setting up extended properties 206


One Identity Manager users for managing extended properties 206
Creating property groups for extended properties 207
Creating and editing extended properties 208
Main data for extended properties 208
Assigning extended properties to property groups 209
Assigning additional property groups to extended properties 210
Specifying scope limits for extended properties 210
Assigning objects to extended properties 211
Displaying the extended properties overview 212

One Identity Manager 9.2 Identity Management Base Module


Administration Guide
8
Appendix: Configuration parameters for managing departments, cost
centers, and locations 213

Appendix: Configuration parameters for managing identities 215

Appendix: Configuration parameters for managing devices and workdesks218

About us 220
Contacting us 220
Technical support resources 220

Index 221

One Identity Manager 9.2 Identity Management Base Module


Administration Guide
9
1

Basics for mapping company


structures in One Identity Manager

One Identity Manager supplies identities in a company with company resources. For
example, permissions, or software, according to their function. To do this, the company
structures are represented in hierarchical role form in One Identity Manager.
Roles are objects through which company resources can be assigned. Identities, devices,
and workdesks are assigned to roles as members. Members can obtain their company
resources through these roles when One Identity Manager is appropriately configured.
Company resource assignments are not made to individual identities, devices or workdesks
but centrally and then inherited automatically through a predefined distribution list.
In One Identity Manager, the following roles are defined for mapping company structures:
l Departments, cost centers, and locations
Departments, cost centers, locations, and business roles are each mapped to their
own hierarchy under Organizations. This is due to their special significance for daily
work schedules in many companies.
l Business roles
Business roles map company structures with similar functionality that exist in
addition to departments, cost centers, and locations. This might be projects groups,
for example. For more information about business roles, see the
One Identity Manager Business Roles Administration Guide.
NOTE: This function is only available if the Business Roles Module is installed.
l Application roles
Application roles are used to grant One Identity Manager object permissions to
One Identity Manager users. For more information about application roles, see the
One Identity Manager Authorization and Authentication Guide.

Detailed information about this topic


l Hierarchical role structure basic principles on page 11
l Basic principles for assigning company resources on page 15

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 10
Basics for mapping company structures in One Identity Manager
l Basics of calculating inheritance on page 20
l Preparing hierarchical roles for company resource assignments on page 24

Hierarchical role structure basic


principles
Departments, cost centers, locations, and application roles are arranged hierarchically.
Assigned company resources are inherited by members through these hierarchies.
Company resource assignments are not made to individual identities, devices or workdesks
but centrally and then inherited automatically through a predefined distribution list.
Hierarchies can either be created following the top-down or the bottom-up model in
One Identity Manager. In the top-down model, roles are defined based on the area of
activity and the company resources required to fulfill the activities are assigned to the
roles. In the case of the bottom-up model, company resource assignments are analyzed
and the roles result from this.

Detailed information about this topic


l Inheritance directions within a hierarchy on page 11
l Discontinuing inheritance on page 13

Inheritance directions within a hierarchy


The direction of inheritance decides the distribution of company resources within a
hierarchy. One Identity Manager basically recognizes two directions of inheritance:
l Top-down inheritance
In One Identity Manager, top-down inheritance maps the default structure within a
company. With its help, a company’s multilevel form can be represented with main
departments and respective subdepartments.
l Bottom-up inheritance
Whereas in top-down inheritance, assignments are inherited in the direction of more
detailed classifications, bottom-up inheritance operates in the other direction. This
inheritance direction was introduced to map project groups in particular. The aim
being, to provide someone coordinating several project groups with the company
resources in use by each of the project groups.

NOTE: The direction of inheritance is only taken into account in relation to the inheritance
of company resources. The direction of inheritance does not have any effect on the
selection of the manager responsible. The manager with a parent role is always respons-
ible for all child roles.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 11
Basics for mapping company structures in One Identity Manager
The effect on the allocation of company resources is explained in the following example for
assigning an application.

Example: Assigning company resources top-down

In the diagram above a section of a company’s structure is illustrated. In addition,


software applications are listed that are assigned to the respective department. An
identity in dealer sales is assigned all the software applications that are allocated to
their department and all those on the entire organization path. In this case, they are
email, text processing, address management and internet software.

Figure 1: Assignment through top-down inheritance

Example: Assigning company resources bottom-up

The next figure shows bottom-up inheritance based on a project framework. In


addition, software applications are listed that are assigned to the respective project
group. An identity from the "Project lead" project group receives software
applications from the project group as well as those from the projects groups below.
In this case, it is project management, CASE tool, development environment,
assembler tool, and prototyping tool.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 12
Basics for mapping company structures in One Identity Manager
Figure 2: Assignment through bottom-up inheritance

Discontinuing inheritance
There are particular cases where you may not want to have inheritance over several
hierarchical levels. That is why it is possible to discontinue inheritance within a hierarchy.
The point at which the inheritance should be discontinued within a hierarchy is specified by
the Block inheritance option. The effects of this depend on the chosen direction of
inheritance.
l Roles marked with the Block inheritance option do not inherit any assignments
from parent levels in top-down inheritance. It can, however, pass on its own directly
assigned company resources to lower level structures.
l In bottom-up inheritance, the role labeled with the “Block inheritance” option inherits
all assignments from lower levels in the hierarchy. However, it does not pass any
assignments further up the hierarchy.

The Block inheritance option does not have any effect on the calculation of the manager
responsible.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 13
Basics for mapping company structures in One Identity Manager
Example: Discontinuing inheritance top-down

If the Block inheritance option is set for the "Sales" department in the top-down
example, it results in sales identities only being assigned the "Address management"
software and identities in the "Dealer sales" department inherit the "Address
management" and "Internet" software. Software applications in the "Entire
organization" department are however, assigned to identities in the "Sales" and
"Dealer sales" departments.

Figure 3: Discontinuing inheritance top-down

Example: Discontinuing inheritance bottom-up

An identity from the "Programming" project group receives software applications


from the project group as well as those from the projects groups below. In this case,
the development environment, assembler tool and the prototyping tool. If the
"Programming" project group has labeled with the Block inheritance option, it no
longer passes down inheritance. As a result, only the CASE tool is assigned to
identities in the "Project lead" project group along with the software application
project management. Software applications from the "Programming", "System
programming", and "Interface design" projects groups are not distributed to the
project lead.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 14
Basics for mapping company structures in One Identity Manager
Figure 4: Discontinuing inheritance bottom-up

Related topics
l Blocking inheritance using roles on page 30

Basic principles for assigning company


resources
You can assign company resources to identities, devices, and workdesks in
One Identity Manager. You can use different assignments types to assign company
resources.
Assignments types are:
l Direct company resource assignments
l Indirect company resource assignments
l Assigning company resources through dynamic roles
l Assigning company resources through IT Shop requests

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 15
Basics for mapping company structures in One Identity Manager
Direct company resource assignments
Direct assignment of company resources results from the assignment of a company
resource to an identity, device, or workdesk, for example. Direct assignment of company
resources makes it easier to react to special requirements.

Figure 5: Schema of a direct assignment based on the example of an identity

Indirect company resource assignments


In the case of indirect assignment of company resources, identities, devices, and
workdesks are arranged in departments, cost centers, locations, business roles, or
application roles. The total of assigned company resources for an identity, device, or
workdesk is calculated from the position within the hierarchies, the direction of inheritance
(top-down or bottom-up) and the company resources assigned to these roles. In the
Indirect assignment methods a difference between primary and secondary assignment is
taken into account.

Figure 6: Schema of an indirect assignment based on the example of an identity

Related topics
l Secondary assignment of company resources on page 16
l Primary assignment of company resources on page 17

Secondary assignment of company resources


You make a secondary assignment by classifying an identity, a device, or a workdesk within
a role hierarchy. Secondary assignment is the default method for assigning and inheriting
company resources through roles. In the role classes for departments, locations, cost

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 16
Basics for mapping company structures in One Identity Manager
centers, business roles, and application roles, specify whether a secondary assignment of
company resources to identities, device, and workdesk is possible.

Figure 7: Secondary assignment inheritance schema

Related topics
l Permitting assignments of identities, devices, workdesks, and company resources to
roles on page 29

Primary assignment of company resources


You make a primary assignment using a department, cost center, or location foreign
key reference in identity, device and workdesk objects. To do this, use the role fields
on the identity, device, and workdesk main data forms. Primary assignment inheritance
can be enabled through configuration parameters. Primary assignment is enabled for
identities by default.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 17
Basics for mapping company structures in One Identity Manager
Figure 8: A primary assignment schema

NOTE: Changes to the configuration parameter result in the inheritance data being
recalculated! That means: if the primary assignment is disabled at a later date, the
inheritance data created in this way will be removed from the database.

Table 1: Configuration parameters for primary assignment

Configuration parameter Effect when set

QER | Structures | Inherite | Identities can inherit through primary assignment.


Person

QER | Structures | Inherite | Identities inherit assignments from their primary


Person | GroupExclusion department (Person.UID_Department).

QER | Structures | Inherite | Identities inherit assignments from their primary


Person | FromLocality location (Person.UID_Locality).

QER | Structures | Inherite | Identities inherit assignments from their primary cost
Person | FromProfitCenter center (Person.UID_ProfitCenter).

QER | Structures | Inherite | Devices can inherit through primary assignment.


Hardware

QER | Structures | Inherite | Devices inherit assignments from their primary


Hardware | FromDepartment department (Hardware.UID_Department).

QER | Structures | Inherite | Devices inherit assignments from their primary


Hardware | FromLocality location (Hardware.UID_Locality).

QER | Structures | Inherite | Devices inherit assignments from their primary cost
Hardware | FromProfitCenter center(Hardware.UID_ProfitCenter).

QER | Structures | Inherite | Workdesks can inherit though primary assignment.


Workdesk

QER | Structures | Inherite | Workdesks inherit assignments from their primary

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 18
Basics for mapping company structures in One Identity Manager
Configuration parameter Effect when set

Workdesk | FromDepartment department (Workdesk.UID_Department).

QER | Structures | Inherite | Workdesks inherit assignments from their primary


Workdesk | FromLocality location (Workdesk.UID_Locality).

QER | Structures | Inherite | Workdesks inherit assignments from their primary


Workdesk | FromProfitCenter cost center (Workdesk.UID_ProfitCenter).

Assigning company resources through


dynamic roles
Assignment through dynamic roles is a special case of indirect assignment. Dynamic roles
are used to specify role memberships dynamically. Identities, devices, and workdesks are
not permanently assigned to a role, just when they fulfill certain conditions. A check is
performed regularly to assess which identities, devices, or workdesks fulfill these
conditions. This means the role memberships change dynamically. For example, company
resources can be assigned dynamically to all identities in a department in this way; if an
identity leaves the department they immediately lose the resources assigned to them.

Related topics
l Dynamic roles on page 35

Assigning company resources through


IT Shop requests
Assignment through the IT Shop is a special case of indirect assignment. Add identities to a
shop as customers so that company resources can be assigned through IT Shop requests.
All company resources assigned as product to this shop can be requested by the customers.
Requested company resources are assigned to the identities after approval is granted. Role
memberships can be requested through the IT Shop as well as company resources.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 19
Basics for mapping company structures in One Identity Manager
Figure 9: Schema of assignment by requests

Basics of calculating inheritance


Objects assigned through inheritance are calculated by the DBQueue Processor. Tasks are
added to the DBQueue when assignments relevant to inheritance are made. These tasks
are processed by the DBQueue Processor and result in follow-on tasks for the DBQueue or
in processes for process component HandleObjectComponent in the Job queue. Resulting
assignments of permissions to user accounts in the target system are inserted, modified, or
deleted during process handling.

Figure 10: Overview of inheritance calculation

Detailed information about this topic


l Calculating inheritance by hierarchical roles on page 21
l Calculation of assignments on page 22

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 20
Basics for mapping company structures in One Identity Manager
Calculating inheritance by hierarchical roles
Identities, devices, and workdesks can only be members in roles that are extensions of the
BaseTree table. These role are display in views, each of which represents a certain of the
BaseTree table. To map company structures, the One Identity Manager data model obtains
the following views:

Table 2: BaseTree table views

View Meaning

Department Graphical representation of departments

Locality Graphical representation of locations

PROFITCENTER Graphical representation of cost centers

ORG Graphical representation of business roles

AERole Application role mapping

NOTE: Because the views are subsets of the BaseTree table, all the inheritance
mechanisms described below also apply to the views.
Inheritance comes from the BaseTree table. The BaseTree table can map any number of
hierarchical role structures using the UID_Org - UID_ParentOrg relationship. These are
stored in the BaseTreeCollection table. All the roles inherited from the given role are listed
and, depending on their subset of the table BaseTree there is a corresponding, so-called
*Collection table containing a subset of the role hierarchy.
The following relations apply in the BaseTreeCollection table:
l UID_Org is the role that inherits.
l UID_ParentOrg is the role that passes down inheritance.

This principle also applies to bottom-up trees that pass inheritance from bottom to top,
even if the parent relationship from the BaseTree table appears to be reversed.
Each role inherits from itself.
Each role in a role hierarchy must be related to the OrgRoot table (Role classes). OrgRoot is
the anchor for role hierarchies. A role hierarchy is always mapped for one role class only.
Roles from different role classes may not be in one and the same role hierarchical or point
to each other through a parent-child relationship.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 21
Basics for mapping company structures in One Identity Manager
Figure 11: Hierarchical role structure based on an OrgCollection

A role inherits everything that is assigned to its parents in the role hierarchy including those
it assigned to itself. If the number of roles from which the role has inherited something
changes, the assigned objects are recalculated for all members of this role. If the number
of assigned objects of one class changes, the objects assigned in this class are recalculated
for all members of the role. If a software application is assigned to a parent role, the
members of the BaseTreeHasApp table are recalculated.
The members of a role inherit all their assignments through primary and secondary role
structures in accordance with the BaseTree table and also previous structures in accordance
with the BaseTreeCollection table .

Calculation of assignments
When inheritance is calculated, an entry is made for each assignment in the corresponding
assignment table. Each table, in which assignments are mapped, has an XOrigin column.
The origin of an assignment is stored in this column as a bit field. Each time an entry is
made in the assignment table, the bit position is changed according to the assignment
type. Each assignment type changes only its allocated bit position.
That means:
l Bit 0: direct assignment.
l Bit 1: indirect assignment but not through a dynamic role.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 22
Basics for mapping company structures in One Identity Manager
l Bit 2: assignment through a dynamic role.
l Bit 3: assignment through an assignment request.
l Bit 4: module specific bit. For more information, see the administration guide of the
module in which the bit is used.

Table 3: Possible values for column XOrigin

Bit Bit Bit Bit Value in Meaning


3 2 1 0 XOrigin

0 0 0 1 1 Only directly assigned.

0 0 1 0 2 Only indirectly assigned.

0 0 1 1 3 Directly and indirectly assigned.

0 1 0 0 4 Assigned through dynamic roles.

0 1 0 1 5 Assigned directly and through dynamic roles.

0 1 1 0 6 Assigned indirectly and through dynamic roles.

0 1 1 1 7 Assigned directly, indirectly, and through


dynamic roles.

1 0 0 0 8 Assignment request.

1 0 0 1 9 Assigned by assignment request and directly.

1 0 1 0 10 Assigned by assignment request and indirectly.

1 0 1 1 11 Assigned by assignment request, directly, and


indirectly.

1 1 0 0 12 Assigned by assignment request and through


dynamic roles.

1 1 0 1 13 Assigned by assignment request, directly, and


through dynamic roles.

1 1 1 0 14 Assigned by assignment request, indirectly, and


through dynamic roles.

1 1 1 1 15 Assignment request, direct, indirect, and


through dynamic roles.

Special features of inheriting assignments though a role hierarchy

NOTE: If an assignment is inherited through a role hierarchy, bit 1 is set on the inherited
assignment. Inherited assignments are consequently, always assigned indirectly even if
they were originally created directly though dynamic role or an assignment request.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 23
Basics for mapping company structures in One Identity Manager
Example:

An Active Directory group assignment was requested for the "Europe" location. The
"Madrid" sub-location inherits this assignment. In the LocalityHasADSGroup table,
XOrigin is set as follows:
l Location "Europe": XOrigin='8' (assignment resource)
l Location "Madrid": XOrigin='2' (indirect assignment)

Effectiveness of assignments

The XIsInEffect column shows whether an assignment is in effect. For example, if an


identity is deactivated, marked for deletion, or classified as a security risk, inheritance of
company resources can be prohibited for this identity. The assignment of company
resources is maintained but the assignment has no effect.
DBQueue Processor monitors changes to the XOrigin column. The XIsInEffect column is
recalculated when changes are made to the value in XOrigin.

Preparing hierarchical roles for


company resource assignments
One Identity Manager supplies a configuration, which support immediate usage of
hierarchical roles for departments, cost centers, locations, and application roles.
However, it may be necessary to make additional role assignments depending on the
company structure.
You should check the following settings and make adjustments as required:
l Specify whether identities, devices, and workdesks and company resources may be
assigned to roles.
Identity, device, workdesk, and company resource assignments are predefined for
departments, cost centers, location, and application roles. The configuration of
application role assignments cannot be changed.
l Define the direction of inheritance with the hierarchy.
Top down inheritance is defined for departments, cost centers, locations, and
application roles.
l Limit inheritance for specific roles if necessary.
You can specify whether inheritance of company resources can be limited for single
identities, devices, or workdesks.
l If required, define roles that are mutually exclusive.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 24
Basics for mapping company structures in One Identity Manager
By specifying conflicting roles, you can prevent identities, devices, or workdesks
being added to roles which contain mutually excluding company resources.

Detailed information about this topic


l Possible assignments of company resources through roles on page 25
l Permitting assignments of identities, devices, workdesks, and company resources to
roles on page 29
l Blocking inheritance using roles on page 30
l Preventing identities, devices, or workdesks from inheriting individual roles on
page 31
l Preventing inheritance to individual identities, devices, or workdesks on page 31
l Inheritance exclusion: Specifying conflicting roles on page 33

Possible assignments of company resources


through roles
Identities, devices, and workdesks can inherit company resources though indirect
assignment. To do this, identities, devices, and workdesks may be members of as many
roles as required. Identities, devices, and workdesks obtain the necessary company
resources through defined rules.
To assign company resources to roles, apply the appropriate tasks to the roles.
The following table shows the possible assignments of company resources to identities,
workdesks, and devices using roles.
NOTE: Company resources are defined in the One Identity Manager modules and are not
available until the modules are installed.

Table 4: Possible assignments of company resources through roles

Assignable Company Members in Roles


Resource
Identities Workdesks

Resources Possible -

Account definitions Possible


Groups of custom target Possible (assigns to all an identity's -
systems custom defined target systems user
accounts, for which group inheritance is
authorized)

System entitlements of Possible (assigns to all an identity's -


custom target systems custom defined target systems user

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 25
Basics for mapping company structures in One Identity Manager
Assignable Company Members in Roles
Resource
Identities Workdesks

accounts, for which system entitlement


inheritance is authorized)

Active Directory groups Possible (assigns to all an identity's -


Active Directory user accounts and
Active Directory contacts, for which
Active Directory group inheritance is
authorized)

SharePoint groups Possible (assigns to all an identity's -


SharePoint user accounts for which
SharePoint group inheritance is
authorized)

SharePoint roles Possible (assigns to all an identity's -


SharePoint user accounts for which
SharePoint role inheritance is
authorized)

LDAP groups Possible (assigns to all an identity's -


LDAP user accounts for which LDAP
group inheritance is authorized)

Notes groups Possible (assigns to all an identity's -


Notes user accounts for which Notes
group inheritance is authorized)

SAP groups Possible (assigns to all an identity's SAP -


user accounts, in the same SAP system
and for which SAP group inheritance is
authorized)

SAP profiles Possible (assigns to all an identity's SAP -


user accounts, in the same SAP system
and for which SAP profile inheritance is
authorized)

SAP roles Possible (assigns to all an identity's SAP -


user accounts, in the same SAP system
and for which SAP role inheritance is
authorized)

SAP parameters Possible (assigns to all an identity's SAP -


user accounts in the same SAP system)

Structural profiles Possible (assigns to all an identity's SAP -


user accounts, in the same SAP system
and for which structural profile

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 26
Basics for mapping company structures in One Identity Manager
Assignable Company Members in Roles
Resource
Identities Workdesks

inheritance is authorized)

BI analysis authorizations Possible (assigns to all an identity's BI -


user accounts, in the same system and
for which group inheritance is
authorized)

Azure Active Directory groups Possible (assigns to all an identity's -


Azure Active Directory user accounts for
which Azure Active Directory group
inheritance is authorized)

Azure Active Directory admin- Possible (assigns to all an identity's -


istrator roles Azure Active Directory user accounts for
which Azure Active Directory admin-
istrator role inheritance is authorized)

Azure Active Directory Possible (assigns to all an identity's -


subscriptions Azure Active Directory user accounts for
which Azure Active Directory subscrip-
tion inheritance is authorized)

Disabled Possible (assigns to all an identity's -


Azure Active Directory service Azure Active Directory user accounts for
plans which disabled Azure Active Directory
service plans inheritance is authorized)

Cloud groups Possible (assigns to all an identity's user -


accounts for which cloud group inher-
itance is authorized)

Cloud system entitlements Possible (assigns to all an identity's user -


accounts for which cloud system entitle-
ment inheritance is authorized)

Unix groups Possible (assigns to all an identity's Unix -


user accounts for which Unix group
inheritance is authorized)

E-Business Suite permissions Possible (assigns to all an identity's E- -


Business Suite user accounts, in the
same E-Business Suite system and for
which E-Business Suite group
inheritance is authorized)

PAM user groups Possible (assigns to all an identity's PAM -


user accounts for which PAM group inher-
itance is authorized)

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 27
Basics for mapping company structures in One Identity Manager
Assignable Company Members in Roles
Resource
Identities Workdesks

Google Workspace products Possible (assigns to all an identity's -


and SKUs Google Workspace user accounts, in the
same customer and for which
Google Workspace products and SKU
inheritance is authorized)

Google Workspace groups Possible (assigns to all an identity's -


Google Workspace user accounts, in the
same customer and for which
Google Workspace group inheritance is
authorized)

SharePoint Online groups Possible (assigns to all an identity's -


SharePoint Online user accounts for
which SharePoint Online group
inheritance is authorized)

SharePoint Online roles Possible (assigns to all an identity's -


SharePoint Online user accounts for
which SharePoint Online role inheritance
is authorized)

Office 365 groups Possible (assigns to all an identity's -


Azure Active Directory user accounts for
which Office 365 group inheritance is
authorized)

Exchange Online mail- Possible (assigns to all an identity's -


enabled distribution groups Exchange Online mailboxes,
Exchange Online mail users and
Exchange Online mail contacts for which
Exchange Online mail-enabled distri-
bution group inheritance is authorized)

OneLogin roles Possible (assigns to all an identity's


OneLogin user accounts for which
OneLogin role inheritance is authorized)

System roles Possible Possible

Subscribable reports Possible -

Software Possible Possible

Related topics
l Assigning company resources to departments, cost centers, and locations on page 83

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 28
Basics for mapping company structures in One Identity Manager
Permitting assignments of identities,
devices, workdesks, and company
resources to roles
The default method for assigning company resources is through secondary assignment. For
this, identities, devices, and workdesks as well as company resources are added to roles
through secondary assignment.
Use role classes to specify how and if identities, devices, workdesks, and company resource
are permitted as secondary assignments to roles. Role classes form the basis of mapping
hierarchical roles in One Identity Manager. Role classes are used to group similar roles
together. The following role classes are available by default in the One Identity Manager:
l Department
l Cost center
l Location
l Application role

Secondary assignment of objects to role in a role class is defined by the following options:
l Assignments allowed: This option specifies whether assignments of respective
object types to roles of this role class are allowed in general.
l Direct assignments allowed: Use this option to specify whether respective object
types can be assigned directly to roles of this role class. Set this option if, for
example, resources are assigned to departments, cost centers, or locations over the
assignment form in the Manager.
NOTE: If this option is not set, the assignment of each object type is only possible
through requests in the IT Shop, dynamic roles, or system roles.

Example:

To assign identities directly to a department in the Manager, enable the Assignment


allowed and the Direct assignment allowed options on the Identities entry in
the Department role class.
If identities can only obtain membership in a department through the IT Shop,
enable the Assignment allowed option but not the Direct assignment allowed
option on the Identities entry in the Department role class. A corresponding
assignment resource must be available in the IT Shop.

NOTE: Identity, device, workdesk ,and company resource assignments are predefined for
departments, cost centers, location, and application roles. The configuration of
application role assignments cannot be changed.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 29
Basics for mapping company structures in One Identity Manager
To configure assignments to roles of a role class

1. In the Manager, select role classes in the Organizations > Basic configuration
data > Role classes category.
2. Select the Configure role assignments task.
3. Use the Allow assignments column to specify whether assignment is
generally allowed.
NOTE: You can only reset the Assignment allowed option if there are no
assignments of the respective objects to roles of this role class and none can arise
through existing dynamic roles.
4. Use the Allow direct assignments column to specify whether a direct assignment
is allowed.
NOTE: You can only reset the Direct assignment allowed option if there are no
direct assignments of the respective objects to roles of this role class.
5. Save the changes.

Blocking inheritance using roles


There are particular cases where you may not want to have inheritance over several
hierarchical levels. That is why it is possible to discontinue inheritance within a hierarchy.
The effects of this depend on the chosen direction of inheritance.
l Roles marked with the Block inheritance option do not inherit any assignments
from parent levels in top-down inheritance. It can, however, pass on its own directly
assigned company resources to lower level structures.
l In bottom-up inheritance, the role labeled with the Block inheritance option
inherits all assignments from lower levels in the hierarchy. However, it does not pass
any assignments further up the hierarchy.

To discontinue inheritance for departments, cost centers, or locations

1. In the Manager, in the Organizations category, select a department, cost center


or location.
2. Select the Change main data task.
3. Set the Block inheritance option.
4. Save the changes.

NOTE: In the case of application roles, inheritance can only be discontinued for custom
application roles. For more information about application roles, see the
One Identity Manager Authorization and Authentication Guide.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 30
Basics for mapping company structures in One Identity Manager
Related topics
l Discontinuing inheritance on page 13
l Preventing identities, devices, or workdesks from inheriting individual roles on
page 31
l Preventing inheritance to individual identities, devices, or workdesks on page 31

Preventing identities, devices, or workdesks


from inheriting individual roles
Company resource inheritance for single roles can be temporarily prevented. You can use
this behavior, for example, to assign all required company resources to a role. Inheritance
of company resources does not take place, however, unless inheritance is permitted for the
role, for example, by running a defined approval process.

To prevent inheritance for departments, cost centers, or locations

1. In the Manager, in the Organizations category, select a department, cost center


or location.
2. Select the Change main data task.
3. Set one or more of the following options:
l To prevent identities from inheriting, set the Identities do not inherit
option.
l To prevent devices from inheriting, set the Devices do not inherit option.
l To prevent workdesks from inheriting, set the Workdesks do not
inherit option.
4. Save the changes.

NOTE: This option cannot be configured for application roles. For more information about
application roles, see the One Identity Manager Authorization and Authentication Guide.

Related topics
l Blocking inheritance using roles on page 30
l Preventing inheritance to individual identities, devices, or workdesks on page 31

Preventing inheritance to individual


identities, devices, or workdesks
Inheritance of company resources can be prevented for single identities, devices, or
workdesks. For example, you can use this behavior after importing to correct the imported

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 31
Basics for mapping company structures in One Identity Manager
data first and then apply inheritance afterward.

To prevent an identity from inheriting

1. In the Manager, select the identity in the Identities category.


2. Select the Change main data task.
3. Set the No inheritance option.
The identity does not inherit company resources through roles.
NOTE: This option does not have any effect on direct assignments. Company
resource direct assignments remain assigned.
4. Save the changes.

To prevent an device from inheriting

1. In the Manager, select the device in the Devices & Workdesks > Devices
category.
2. Select the Change main data task.
3. Set the No inheritance option.
The device does not inherit company resources through roles.
NOTE: This option does not have any effect on direct assignments. Company
resource direct assignments remain assigned.
4. Save the changes.

To prevent a workdesk from inheriting

1. In the Manager, select the workdesk in the Devices & Workdesks >
Workdesks category.
2. Select the Change main data task.
3. Set the No inheritance option.
The workdesk does not inherit company resources through roles.
NOTE: This option does not have any effect on direct assignments. Company
resource direct assignments remain assigned.
4. Save the changes.

Related topics
l Blocking inheritance using roles on page 30
l Preventing identities, devices, or workdesks from inheriting individual roles on
page 31

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 32
Basics for mapping company structures in One Identity Manager
Inheritance exclusion: Specifying
conflicting roles
You can define conflicting roles to prevent identities, devices, or workdesks from being
assigned to several roles at the same time and from obtaining mutually exclusive company
resources through these roles. At the same time, specify which departments, cost centers,
and locations are mutually exclusive. This means you may not assign these roles to one and
the same identity (device, workdesk).
NOTE: Only roles, which are defined directly as conflicting roles cannot be assigned to the
same identity (device, workdesk). Definitions made on parent or child roles do not affect
the assignment.

Example:

Cost center B is named as conflicting role to cost center A. Alex User1 and Jo Identity
are members of cost center A. Toni User2 is a member of cost center B. Jo Identity
cannot be assigned to cost center B. Apart from that, One Identity Manager prevents
Alex User1 and Toni User2 from being assigned to cost center A.

Figure 12: Members in conflicting roles

To configure inheritance exclusion


l In the Designer, set the QER | Structures | ExcludeStructures configuration
parameter and compile the database.
NOTE: If you disable the configuration parameter at a later date, model compon-
ents and scripts that are no longer required, are disabled. SQL procedures and

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 33
Basics for mapping company structures in One Identity Manager
triggers are still carried out. For more information about the behavior of prepro-
cessor relevant configuration parameters and conditional compiling, see the
One Identity Manager Configuration Guide.

Related topics
l Specifying inheritance exclusion for departments, cost centers, and locations on
page 88

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 34
Basics for mapping company structures in One Identity Manager
2

Dynamic roles

Dynamic roles are used to dynamically assign memberships to departments, cost centers,
location, business roles, application roles, and IT Shop nodes. Identities, devices, and
workdesks are not permanently assigned to these roles, just when they fulfill certain
conditions. A check is performed regularly to assess which identities (devices or
workdesks) fulfill these conditions. This means the role memberships change dynamically.
For example, company resources can be assigned dynamically to all identities in a
department in this way; if an identity leaves the department they immediately lose the
resources assigned to them.

Example: Dynamic role functionality

All external identities are added to a new dynamic role. These identities should be
assigned to a company resource ABC. The dynamic role is initially defined with the
following data:

Dynamic role External identities

Description All external identities

Object class Identity

Condition IsExternal = 1

Department A_1

The department A_1 is now assigned the resource ABC. All identities that fulfill the
condition at the time the dynamic role was defined are assigned to department A_
1 and therefore inherit the resource ABC. Identities that fulfill the condition at a
later date, are assigned to department A_1 from that moment. Conversely,
identities in department A_1 are removed the moment they are no longer known
as external identities by One Identity Manager. The resource ABC is no longer
available to those identities assuming they have not been assigned the resource
through other channels.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 35
Dynamic roles
Role memberships through dynamic roles are implemented as indirect, secondary
assignments. Therefore secondary assignment of identities, devices, and workdesks to role
classes must be permitted. If necessary, further configuration settings need to be made.
Identities can be excluded automatically from dynamic roles on the basis of a denied
attestation or a rule violation. An excluded list is maintained to do this. Excluded lists can
also be defined for individual identities. In addition, identities can also become members of
the role directly or by assignment request or delegation. These memberships are not
restricted by the exclusion list.
For more information on automatic exclusion in the event of a denied attestation, see the
One Identity Manager Attestation Administration Guide. For more information on automatic
exclusion in the event of a rule violation, see the One Identity Manager Web Designer
Web Portal User Guide.

Detailed information about this topic


l Creating and editing dynamic roles on page 36
l Tips about conditions for dynamic roles on page 37
l Testing dynamic role conditions on page 38
l Calculating role memberships for dynamic roles on page 39
l Excluding identities from dynamic roles on page 48
l Displaying the dynamic role overview on page 49
l Main data for dynamic roles on page 50

Related topics
l Basic principles for assigning company resources on page 15
l Permitting assignments of identities, devices, workdesks, and company resources to
roles on page 29

Creating and editing dynamic roles


You can create dynamic roles for departments, cost centers, locations, business
roles, application roles, and IT Shop nodes. This allows you to specify memberships
in these roles.

To create a dynamic role

1. In the Manager, select the role for which you want to create a dynamic role.
2. Select the Create dynamic role task.
3. Enter the required main data.
4. Save the changes.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 36
Dynamic roles
To edit a dynamic role

1. In the Manager, select the role for which the dynamic role was created.
2. Open the role's overview form.
3. Select the Dynamic roles form element and click on the dynamic role.
4. Select the Change main data task.
5. Edit the data and then save the changes.

Related topics
l Tips about conditions for dynamic roles on page 37
l Testing dynamic role conditions on page 38
l Main data for dynamic roles on page 50
l Creating dynamic roles for departments, cost centers, and locations on page 85

Tips about conditions for dynamic roles


IMPORTANT: If the condition includes a large number of objects to assign, calculating
memberships can place a heavy load on the DBQueue Processor and consequently on the
database server.
A dynamic role condition is defined as a valid Where clause for database queries and must
relate to the selected Identity, Hardware, or Workdesk object class.
In the Manager, you have different ways of creating conditions:
l You can enter it directly as an SQL query.
l You can use the Where clause wizard to create the conditions.
l Alternatively, you can enter conditions for identities with the filter designer.
NOTE: If you select the For the account with the target system type or For
the entitlement with target system type condition type in the filter designer,
only columns that are mapped in Unified Namespace and for which the Display in
the filter designer column property is enabled can be selected.

Using the @UID_Org variable, you can access the role or organization referenced by the
dynamic role.

Example:

The condition for the dynamic role for identities only takes effect if the identity's
location (Person.UID_Locality) matches the location of the assigned role or the

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 37
Dynamic roles
organization ([Link].UID_OrgLocality).
Where clause extension:
...
and uid_locality = (select b.UID_OrgLocality from BaseTree b where b.UID_Org
= @UID_Org)

Example:

The condition for the dynamic role for identities is only effective if the assigned role
or organization have a certain property.
Where clause extension:
...
and exists (select top 1 1
from BaseTree b
where b.UID_Org = @UID_Org
and b.CustomProperty01 = '123'
)

NOTE: If you add comments to the condition using the comment characters --, // or %,
the DBQueue Processor cannot correctly calculate the dynamic role. The calculation quits
with an error. Always use the comment characters /* ... */ to enclose comments.

Related topics
l Testing dynamic role conditions on page 38

Testing dynamic role conditions


NOTE: To perform the task, users require the Common_AllowRiskyWhereClauses
program function.
NOTE: This task is only visible when the dynamic role condition is displayed as an
SQL query.
You should test which objects fulfill the given condition before you save a dynamic role.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 38
Dynamic roles
To test the SQL condition for a dynamic role

1. In the Manager, select the role for which the dynamic role was created.
2. Open the role's overview form.
3. Select Dynamic roles and click on the dynamic role.
4. Select Change main data.
5. Click (Edit SQL) on the form.
This displays the condition as SQL query.
6. Select the Test condition task.
On the main data form, in the Test result field, all objects determined by the
condition are displayed.

Related topics
l Tips about conditions for dynamic roles on page 37

Calculating role memberships for


dynamic roles
To calculate the role memberships, One Identity Manager tests every dynamic role to
ensure that:
l There is at least one object that satisfies the condition but is not assigned to the role
l There is at least one object that does not satisfy the condition but is assigned
to the role
l The exclusion list was changed

If one of the conditions is fulfilled, a request to add or delete memberships is sent to the
DBQueue Processor.
NOTE: When the dynamic roles are tested, identities that are marked for deletion are:
l Not added to roles through dynamic roles even if the miscellaneous condition
is fulfilled.
l Removed from the role even if the miscellaneous condition should be fulfilled

The calculation of role memberships in dynamic roles can be triggered by different


methods.
l Cyclical checking using a schedule
l Recalculation when objects are changed
l Start recalculation manually

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 39
Dynamic roles
Related topics
l Schedules for calculating dynamic roles on page 40
l Calculating dynamic roles immediately if objects change on page 44
l Calculating role memberships for dynamic roles immediately on page 46
l Excluding dynamic roles from recalculation on page 47
l Excluding identities from dynamic roles on page 48

Schedules for calculating dynamic roles


NOTE: When a schedule is started, all dynamic roles that have this schedule assigned and
where the No recalculation of assignments option is not set are recalculated.
In the standard installation of One Identity Manager, the Dynamic roles check schedule
is already defined. This schedule is used when creating a new dynamic role. All dynamic
role memberships are checked using this schedule and recalculation tasks are sent to the
DBQueue Processor if necessary. Checks are made at predefined intervals. If necessary,
you can change the default schedule for dynamic roles or create new schedules.
For more information about schedules, see the One Identity Manager Operational Guide.

Related topics
l Creating and editing dynamic role schedules on page 40
l Starting dynamic role schedules immediately on page 43
l Assigning dynamic roles to schedules on page 43
l Calculating dynamic roles immediately if objects change on page 44
l Editing properties for immediate recalculation on page 46
l Calculating role memberships for dynamic roles immediately on page 46
l Main data for dynamic roles on page 50

Creating and editing dynamic role schedules


If necessary, you can change the default schedule for dynamic roles or create new
schedules.

To edit a schedule

1. In the Manager, select the Organizations > Basic configuration data >
Schedules category.
The result list shows all the schedules configured for dynamic roles.
2. Select a schedule in the result list and run the Change main data task.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 40
Dynamic roles
3. Edit the schedule’s main data.
4. Save the changes.

To create a schedule

1. In the Manager, select the Organizations > Basic configuration data >
Schedules category.
2. Click in the result list.
3. Edit the schedule’s main data.
4. Save the changes.

Edit the following schedule properties.

Table 5: Schedule properties

Property Meaning

Name Schedule ID.

Description Detailed description of the schedule.

Enabled Specifies whether the schedule is enabled.

Time zones Unique identifier for the time zone that is used for running the schedule.
Choose between Universal Time Code or one of the time zones in the
menu.

Start (date) The day on which the schedule should be run for the first time. If this day
conflicts with the defined interval type, the first run is on the next available
day based on the start date.

Validity Period within which the schedule is run.


period
l If the schedule will be run for an unlimited period, select the
Unlimited duration option.
l To set a validity period, select the Limited duration option and
enter the day the schedule will be run for the last time in End
(date).

Occurs Interval in which the task is run. Other settings may be required
depending on the settings.
l Hourly: The schedule is run at defined intervals of a multiple of
hours such as every two hours.
l Under Repeat every, specify after how many hours the
schedule is run again.
l The starting point is calculated from the rate of occurrence
and the interval type.
l Daily: The schedule is run at specified times in a defined interval of
days such as every second day at 6am and 6pm.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 41
Dynamic roles
Property Meaning
l Under Start time, specify the times to run the schedule.
l Under Repeat every, specify after how many days the
schedule is run again.
l Weekly: The schedule is run at a defined interval of weeks, on a
specific day, at a specified time such as every second week on
Monday at 6am and 6pm.
l Under Start time, specify the times to run the schedule.
l Under Repeat every, specify after how many weeks the
schedule is run again.
l Specify the set day of the week for running the schedule.
l Weekly: The schedule is run at a defined interval of months, on a
specific day, at a specified time such as every second month on the
1st and the 15th at 6am and 6pm.
l Under Start time, specify the times to run the schedule.
l Under Repeat every, specify after how many months the
schedule is run again.
l Specify the days of the month (1st - 31st of the month).
NOTE: If the Monthly interval type with the sub interval 29, 30 or
31 does not exist in this month, the last day of the month is used.
Example:
A schedule that is run on the 31st day of each month is run on
April 30th. In February, the schedule is run on the 28th (or 29th in
leap year).
l Yearly: The schedule is run at a defined interval of years, on a
specific day, at a specified time such as every year on the 1st, the
100th, and the 200th day at 6am and 6pm.
l Under Start time, specify the times to run the schedule.
l Under Repeat every, specify after how many years the
schedule is run again.
l Specify the days of the year (1st - 366th day of the year).
NOTE: If you select the 366th day of the year, the schedule
is only run in leap years.
l Monday, Tuesday, Wednesday, Thursday, Friday, Saturday,
Sunday: The schedule is run on a defined day of the week, in
specified months, at specified times such as every second Saturday
in January and June at 10am.
l Under Start time, specify the times to run the schedule.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 42
Dynamic roles
Property Meaning
l Under Repeat every, specify after how many days of the
month the schedule is run again. The values 1 to 4, -1 (last
day of the week), and -2 (last day but one of the week) are
permitted.
l Specify in which month to run the schedule. The values 1 to
12 are permitted. If the value is empty, the schedule is run
each month.

Start time Fixed start time Enter the time in local format for the chosen time zone. If
there is a list of start times, the schedule is started at each of the given
times.

Repeat Rate of occurrence for running the schedule within the selected time
every interval.

Related topics
l Assigning dynamic roles to schedules on page 43
l Starting dynamic role schedules immediately on page 43
l Main data for dynamic roles on page 50

Starting dynamic role schedules immediately


NOTE: When a schedule is started, all dynamic roles that have this schedule assigned and
where the No recalculation of assignments option is not set are recalculated.

To start a schedule immediately

1. In the Manager, select the Organizations > Basic configuration data >
Schedules category.
2. Select the schedule in the result list.
3. Select the Start immediately task.
A message appears confirming that the schedule was started.

Assigning dynamic roles to schedules


Use this task to assign dynamic roles to the selected schedule that will run them. The
assignment form displays all the dynamic roles that are assigned this selected schedule.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 43
Dynamic roles
To assign dynamic roles to a schedule

1. In the Manager, select the Organizations > Basic configuration data >
Schedules category.
2. Select the schedule in the result list.
3. Select the Assign dynamic roles task.
4. In the Add assignments pane, double-click the dynamic roles you want to assign.
5. Save the changes.

To change an assignment

1. In the Manager, select the Organizations > Basic configuration data >
Schedules category.
2. Select the schedule in the result list.
3. Select the Assign dynamic roles task.
4. Select the Show objects already assigned to other objects menu item in the
assignment form's context menu.
This shows dynamic roles that are already assigned to other schedules.
5. In the Add assignments pane, double-click on one of these dynamic roles.
This dynamic role is assigned to the currently selected schedule.
6. Save the changes.

NOTE: Assignments cannot be removed. Dynamic roles must be assigned a schedule. It


is compulsory.

Related topics
l Main data for dynamic roles on page 50

Calculating dynamic roles immediately if


objects change
Memberships can be checked immediately by the DBQueue Processor and changed as
necessary when object properties are changed. For each dynamic role, you can define
which properties trigger a recalculation of role memberships if they are changed.

Requirements for immediate recalculation


l The configuration parameters for immediate recalculation are set. Check the
following configuration parameters in the Designer and set them if necessary.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 44
Dynamic roles
l QER | Structures | DynamicGroupCheck: The configuration parameter
controls the generation of calculation tasks for dynamic roles.
If the configuration parameter is not set, the subparameters do not apply.
l QER | Structures | DynamicGroupCheck |
CalculateImmediatelyPerson: If the configuration parameter is set, a
calculation task is immediately queued for the DBQueue Processor when
changes are made to identities or identity-related objects.
l QER | Structures | DynamicGroupCheck |
CalculateImmediatelyHardware: If the configuration parameter is set, a
calculation task is immediately queued for the DBQueue Processor when
changes are made to devices or device-related objects.
l QER | Structures | DynamicGroupCheck |
CalculateImmediatelyWorkdesk: If the configuration parameter is set, a
calculation task is immediately queued for the DBQueue Processor when
changes are made to workstations or workstation-related objects.
l The Immediate recalculation of assignments option is enabled for the dynamic
roles. The properties that trigger recalculation are defined.
l The No recalculation of assignments option is not enabled for the dynamic roles.

To enable immediate recalculation of a dynamic role

1. In the Manager, select the role for which the dynamic role was created.
2. Open the role's overview form.
3. Select Dynamic roles and click on the dynamic role.
4. Select the Change main data task.
5. Enable the Immediate recalculation of assignments option.
6. On the Recalculation properties tab, add the properties that trigger recalculation
of the dynamic role.
a. Click Add.
b. Next to the Property field, click .
c. Under Property, select the table and column to trigger recalculation.
d. Click OK.
e. Repeat these steps for all properties.
7. Save the changes.

Related topics
l Editing properties for immediate recalculation on page 46
l Main data for dynamic roles on page 50
l Calculating role memberships for dynamic roles on page 39
l Calculating role memberships for dynamic roles immediately on page 46

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 45
Dynamic roles
Calculating role memberships for dynamic
roles immediately
You can make a single dynamic role calculation immediately

To calculate role membership immediately

1. In the Manager, select the role for which the dynamic role was created.
2. Open the role's overview form.
3. Select Dynamic roles and click on the dynamic role.
4. Select the Change main data task.
5. Select the Start recalculation immediately task and close the prompt with OK.
A processing task for the DBQueue Processor is set in the DBQueue.

Related topics
l Calculating role memberships for dynamic roles on page 39
l Calculating dynamic roles immediately if objects change on page 44
l Editing properties for immediate recalculation on page 46

Editing properties for immediate


recalculation
For individual dynamic roles, you can define which properties trigger a recalculation of role
memberships if they are changed.

To add a property

1. In the Manager, select the role for which the dynamic role was created.
2. Open the role's overview form.
3. Select Dynamic roles and click on the dynamic role.
4. Select the Change main data task.
5. On the Recalculation Properties tab, add the properties.
a. Click Add.
b. Next to the Property field, click .
c. Under Property, select the table and column to trigger recalculation.
d. Click OK.
6. Save the changes.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 46
Dynamic roles
To disable a property

1. In the Manager, select the role for which the dynamic role was created.
2. Open the role's overview form.
3. Select Dynamic roles and click on the dynamic role.
4. Select the Change main data task.
5. On the Recalculation properties tab, select the column in the list and check the
Disabled option.
6. Save the changes.

To remove a property

1. In the Manager, select the role for which the dynamic role was created.
2. Open the role's overview form.
3. Select Dynamic roles and click on the dynamic role.
4. Select the Change main data task.
5. On the Recalculation Properties tab, select the column in the list and click
Remove.
6. Save the changes.

Excluding dynamic roles from recalculation


You can exclude individual dynamic roles from recalculation. In this case, role memberships
are not automatically recalculated. Existing role memberships remain as they are.

To exclude a dynamic role from recalculation

1. In the Manager, select the role for which the dynamic role was created.
2. Open the role's overview form.
3. Select Dynamic roles and click on the dynamic role.
4. Select the Change main data task.
5. Enable the No recalculation of assignments option.
6. Save the changes.

Related topics
l Calculating role memberships for dynamic roles on page 39
l Main data for dynamic roles on page 50

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 47
Dynamic roles
Excluding identities from dynamic roles
Identities can be excluded automatically from dynamic roles on the basis of a denied
attestation or a rule violation. An excluded list is maintained to do this. Excluded lists can
also be defined for individual identities.

To add an identity to the excluded list

1. In the Manager, select the role for which the dynamic role was created.
2. Open the role's overview form.
3. Select Dynamic roles and click on the dynamic role.
4. Select the Exclude identities task.
5. Click Add and select the identity from the Identity menu.
6. (Optional) Enter a reason for the exclusion.
7. Save the changes.

Related topics
l Main data of exclude lists for dynamic roles on page 49
l Removing identities from the exclusion list on page 48
l Dynamic roles with incorrectly excluded identities on page 86

Removing identities from the exclusion list


Identities that are incorrectly listed in the exclusion list of a dynamic role can be removed
from the exclusion list.

To remove an identity from the exclusion list

1. In the Manager, select the role for which the dynamic role was created.
2. Open the role's overview form.
3. Select Dynamic roles and click on the dynamic role.
4. Select the Exclude identities task.
5. Select the identity and click Remove.
6. Save the changes.

Related topics
l Main data of exclude lists for dynamic roles on page 49
l Excluding identities from dynamic roles on page 48

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 48
Dynamic roles
l Dynamic roles with incorrectly excluded identities on page 86

Main data of exclude lists for dynamic roles


The following main data is displayed for an identity in the exclusion list of a dynamic role.

Table 6: Main data of exclude lists for dynamic roles

Property Description

Identity Unique identifier of the excluded identity.

Description Reason for excluding the identity. If the identity is excluded because attest-
ation was denied or due to a rule violation, a standard reason is entered
here.

Condition Specifies whether the dynamic role condition applies to the excluded
not applic- person. If the option is disabled, the condition applies.
able
TIP: If the option is enabled, the identity can be removed from the
exclusion list. For more information, see Removing identities from the
exclusion list on page 48.

Not assigned Specifies whether the excluded identity is still assigned to the role by
by dynamic another way.
role
Identities can, in addition, also become members of the role directly or by
assignment request or delegation. The exclusion list does not influence
these assignments.

Related topics
l Excluding identities from dynamic roles on page 48
l Removing identities from the exclusion list on page 48
l Dynamic roles with incorrectly excluded identities on page 86

Displaying the dynamic role overview


You can display the most important information about a dynamic role on the
overview form.

To obtain an overview of a dynamic role

1. In the Manager, select the role for which the dynamic role was created. The
department, for example.
2. Open the role's overview form.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 49
Dynamic roles
3. Select Dynamic roles and click on the dynamic role.
4. Select the Dynamic role overview task.
5. Select the report Show overview.
The report provides a summary of key information about a dynamic role, including
the schedule, excluded identities, and recalculation properties.

Main data for dynamic roles


Enter the following data for a dynamic role.

Table 7: Dynamic role main data

Property Description

Role/Organization Role (department, cost center, location, business role, IT Shop


node, application node) referenced by the dynamic role. This data is
preset with the selected role.

Object class Object class that the dynamic role applies to. Choose between
Identity, Device, and Workdesk.
NOTE: The combination of object class and role must be unique.
It is not possible that two dynamic roles from the same object
class to refer to one role.

Dynamic role Name of the dynamic role.

Calculation Schedule, which triggers cyclical recalculation of the role


schedule membership.
To create a schedule, click . Enter the schedule's main data.

Description Text field for additional explanation.

Condition Defines which objects of the object class become members of the
selected role. For more information, see Tips about conditions for
dynamic roles on page 37.
For more information, see Tips about conditions for dynamic roles
on page 37.

No recalculation of Specifies whether to recalculate memberships. If the option is


assignments enabled, role memberships will not be recalculated automatically.
Existing role memberships remain as they are.

Immediate recal- Specifies whether the dynamic role is recalculated if changes are
culation of assign- made to specified properties. If the option is enabled, specify the
ments properties for recalculation.

Recalculation Property whose change triggers an immediate recalculation of the

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 50
Dynamic roles
Property Description

property: Property dynamic role.

Recalculation Specifies whether immediate recalculation of the property is


property: Disabled disabled.

Related topics
l Creating and editing dynamic roles on page 36
l Testing dynamic role conditions on page 38
l Schedules for calculating dynamic roles on page 40
l Assigning dynamic roles to schedules on page 43
l Calculating role memberships for dynamic roles immediately on page 46
l Excluding dynamic roles from recalculation on page 47

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 51
Dynamic roles
3

Departments, cost centers, and


locations

Departments, cost centers, locations, and business roles are each mapped to their own
hierarchy under Organizations. This is due to their special significance for daily work
schedules in many companies. Various company resources can be assigned to
organizations, for example, permissions in different SAP systems or Azure Active Directory
tenants. You can add identities to single roles as members. Identities obtain their company
resources through these assignments when One Identity Manager is appropriately
configured.

Detailed information about this topic


l One Identity Manager users for managing departments, cost centers, and
locations on page 53
l Basic information for departments, cost centers, and locations on page 55
l Creating and editing departments on page 63
l Creating and editing cost centers on page 68
l Creating and editing locations on page 72
l Setting up IT operating data for departments, cost centers, and locations on page 77
l Preparing hierarchical roles for company resource assignments on page 24
l Assigning identities, devices, and workdesks to departments, cost centers, and
locations on page 82
l Assigning company resources to departments, cost centers, and locations on page 83
l Creating dynamic roles for departments, cost centers, and locations on page 85
l Assign organizations on page 87
l Specifying inheritance exclusion for departments, cost centers, and locations on
page 88
l Assigning extended properties to departments, cost centers, and locations on
page 90
l Reports about departments, cost centers, and locations on page 91

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 52
Departments, cost centers, and locations
l Configuration parameters for managing departments, cost centers, and
locations on page 213

One Identity Manager users for


managing departments, cost centers,
and locations
The following users are used for the administration of departments, cost centers,
and locations.

Table 8: Users

User Tasks

Administrators for Administrators must be assigned to the Identity Management


organizations | Organizations | Administrators application role.
Users with this application role:
l Set up and edit departments, cost centers, and locations.
l Assign company resources to departments, cost centers,
and locations.
l Attest the main data of departments, cost centers, and
locations.
l Administrate application roles for role approvers, role
approvers (IT), and attestors.
l Set up other application roles as required.

Additional managers The additional managers must be assigned to the Identity


Management | Organizations | Additional managers
application role or to a child application role.
Users with this application role:
l Have permission to manage departments, cost centers
and locations.

Approvers for Attestors must be assigned to the Identity Management |


organizations Organizations | Attestors application role or a child
application role.
Users with this application role:
l Attest correct assignment of company resources to
departments, cost centers, and locations for which they
are responsible.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 53
Departments, cost centers, and locations
User Tasks
l Can view main data for departments, cost centers, and
locations but cannot edit them.

NOTE: This application role is available if the module Attest-


ation Module is installed.

Approvers for Role approvers must be assigned to the Identity


organizations Management | Organizations | Role approvers
application role or a child application role.
Users with this application role:
l Are approvers for the IT Shop.
l Approve request from departments, cost centers, and
locations for which they are responsible.

Approvers (IT) for IT role approvers must be assigned to the Identity


organizations Management | Organizations | Role approvers (IT)
application role or a child application role.
Users with this application role:
l Are IT role approvers for the IT Shop.
l Approve request from departments, cost centers, and
locations for which they are responsible.

One Identity Manager One Identity Manager administrator and administrative system
administrators users Administrative system users are not added to application
roles.
One Identity Manager administrators:
l Create customized permissions groups for application
roles for role-based login to administration tools in the
Designer as required.
l Create system users and permissions groups for non role-
based login to administration tools in the Designer as
required.
l Enable or disable additional configuration parameters in
the Designer as required.
l Create custom processes in the Designer as required.
l Create and configure schedules as required.
l Create and configure password policies as required.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 54
Departments, cost centers, and locations
Basic information for departments, cost
centers, and locations
The following basic information is relevant for building up hierarchical roles in
One Identity Manager.
l Configuration parameters
Use configuration parameters to configure the behavior of the system's basic
settings. One Identity Manager provides default settings for various configuration
parameters. Check the configuration parameters and modify them as necessary to
suit your requirements.
Configuration parameters are defined in the One Identity Manager modules. Each
One Identity Manager module can also install configuration parameters. In the
Designer, you can find an overview of all configuration parameters in the Base data
> General > Configuration parameters category.
l Role classes
Role classes form the basis of mapping hierarchical roles in One Identity Manager.
Role classes are used to group similar roles together.
l Role types
Create role types in order to classify roles. Roles types can be used to map roles in
the user interface, for example.
l Functional areas
To analyze rule checks for different areas of your company in the context of identity
audit, you can set up functional areas. Functional areas can be assigned to roles. You
can enter criteria that provide information about risks from rule violations for
functional areas and roles. Moreover, functional areas can be used during peer group
analysis of requests or attestation cases.
l Attestors
In One Identity Manager you can assign departments, cost centers, and locations to
identities who can be brought in as attestors in attestation cases, provided that the
approval workflow is set up accordingly. To do this, assign the departments, cost
centers, and locations to application roles for attestors. For more information about
attestation, see the One Identity Manager Attestation Administration Guide.
A default application role for attestors is available in One Identity Manager. You may
create other application roles as required. For more information about application
roles, see the One Identity Manager Authorization and Authentication Guide.
l Role approvers and role approvers (IT)
In One Identity Manager you can assign departments, cost centers and locations to
identities who can be brought in as approvers in approval processes for IT Shop
requests, provided that the approval workflow is set up accordingly. To do this,
assign the departments, cost centers, and locations to application roles for role
approvers. For more information, see the One Identity Manager IT Shop

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 55
Departments, cost centers, and locations
Administration Guide.
Default application roles for approvers and approvers (IT) are available in
One Identity Manager. You may create other application roles as required. For more
information about implementing and editing application roles, see
theOne Identity Manager Authorization and Authentication Guide.

Detailed information about this topic


l Role classes for departments, cost centers, and locations on page 56
l Role types for departments, cost centers, and locations on page 57
l Functional areas for departments, cost centers, and locations on page 59
l Attestors for departments, cost centers, and locations on page 61
l Approvers and approvers (IT) for departments, cost centers, and locations on
page 62
l Configuration parameters for managing departments, cost centers, and
locations on page 213

Role classes for departments, cost centers,


and locations
Role classes form the basis of mapping hierarchical roles in One Identity Manager. Role
classes are used to group similar roles together. The direction of inheritance is specified by
the role class. In addition, assignments that are allowed to be made to individual roles of
this role class are specified in a role class.
The following role classes are provided by default for mapping organizations in
One Identity Manager:
l Department
l Cost center
l Location

Top down inheritance is defined for departments, cost centers, locations, and application
roles. Identities, devices, workdesks, and company resource assignments are predefined
for departments, cost centers, and locations. You can edit these role class assignments.

Related topics
l Inheritance directions within a hierarchy on page 11
l Permitting assignments of identities, devices, workdesks, and company resources to
roles on page 29

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 56
Departments, cost centers, and locations
Assigning role types to role classes for
departments, cost centers, and locations
For additional classification, you can define role types and assign them to role classes.
Note the restrictions given under Role types for departments, cost centers, and
locations on page 57.

To assign a role type to a role class

1. In the Manager, select the Organizations > Basic configuration data > Role
classes category.
2. In the result list, select the role class.
3. Select the Assign role types task.
4. In the Add assignments pane, assign role types.
TIP: In the Remove assignments pane, you can remove assigned role types.

To remove an assignment
l Select the role type and click .

Related topics
l Role types for departments, cost centers, and locations on page 57
l Creating role types for departments, cost centers, and locations on page 58
l Assigning role classes to role types for departments, cost centers, and
locations on page 59

Role types for departments, cost centers,


and locations
To achieve better classification, you can define role types and assign them to role classes
and roles. The following restrictions apply:
l You can assign a role type to several role classes.
l If you assign role types to a role class you can only select these role types for the
roles of this role class. Other role types are not available for selection.
l If you do not assign a role type to a role class, you can only use role types that are
not assigned to any other role class for roles in this role class.
l The Business role role type is predefined. This role type cannot be assigned to the
Department, Cost center, or Location role classes. Assign this role type to role
classes that map business roles.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 57
Departments, cost centers, and locations
Example:

The Business role role type is predefined. The Region, Country, Sales, and
Development role types are also created.
l The Business roles role type is assigned to the External projects role class.
The Business roles role type can also be given to roles of this role class.
l The Business roles, Region, and Country role types are assigned to the
Employee role class.
The Business roles, Region, and Country role types can also be given to
roles of this role class.
l The Region and Country role types are assigned to the Location role class.
The Region and Country role types can also be given locations.
l The Cost center and Department role classes are not assigned any
role types.
The Sales and Development role types can also be given to cost centers and
departments.

Creating role types for departments, cost centers,


and locations
For additional classification, you can create and edit role types. You cannot edit
default role types.

To create role types

1. In the Manager, select the Organizations > Basic configuration data > Role
types category.
2. Click in the result list.
3. Enter the following information:
l Role type: Role type name. Translate the given text using the button.
l Description: (Optional) Text field for additional explanation.
l No multiple assignment of identities: This option does not work for
departments, cost centers, and locations.
4. Save the changes.

To create role types

1. In the Manager, select the Organizations > Basic configuration data > Role
types category.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 58
Departments, cost centers, and locations
2. Select the role type in the result list.
3. Select the Change main data task.
4. Edit the main data.
5. Save the changes.

Assigning role classes to role types for


departments, cost centers, and locations
For additional classification, you can define role types and assign them to role classes.
Note the restrictions given under Role types for departments, cost centers, and
locations on page 57.

To assign role classes to a role type

1. In the Manager, select the Organizations > Basic configuration data > Role
types category.
2. Select the role type in the result list.
3. Select the Assign role classes task.
4. In the Add assignments pane, assign the organizations:
l On the Departments tab, assign departments.
l On the Locations tab, assign locations.
l On the Cost centers tab, assign cost centers.
TIP: In the Remove assignments pane, you can remove assigned organizations.

To remove an assignment
l Select the organization and double-click .
5. Save the changes.

Related topics
l Role types for departments, cost centers, and locations on page 57
l Assigning role types to role classes for departments, cost centers, and
locations on page 57

Functional areas for departments, cost


centers, and locations
To analyze rule checks for different areas of your company in the context of identity audit,
you can set up functional areas. Functional areas can be assigned to hierarchical roles and
service items. You can enter criteria that provide information about risks from rule

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 59
Departments, cost centers, and locations
violations for functional areas and hierarchical roles. To do this, you specify how many rule
violations are permitted in a functional area or a role. You can enter separate assessment
criteria for each role, such as a risk index or transparency index.
Moreover, functional areas can be replaced by peer group analysis during request
approvals or attestation cases.

Example: Use of functional areas

To assess the risk of rule violations for cost centers. Proceed as follows:

1. Set up functional areas.


2. Assign cost centers to the functional areas.
3. Define assessment criteria for the cost centers.
4. Specify the number of rule violations allowed for the functional area.
5. Assign compliance rules required for the analysis to the functional area.
6. Use the One Identity Manager report function to create a report that prepares
the result of rule checking for the functional area by any criteria.

To create or edit a functional area

1. In the Manager, select the Organizations > Basic configuration data >
Functional areas category.
2. In the result list, select a function area and run the Change main data task.
- OR -
Click in the result list.
3. Edit the function area main data.
4. Save the changes.

Enter the following data for a functional area.

Table 9: Functional area properties

Property Description

Functional area Description of the functional area

Parent Functional Parent functional area in a hierarchy.


area
Select a parent functional area from the list for organizing your
functional areas hierarchically.

Max. number of rule List of rule violation valid for this functional area. This value can be
violations evaluated during the rule check.
NOTE: This property is available if the Compliance Rules Module
is installed.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 60
Departments, cost centers, and locations
Property Description

Description Text field for additional explanation.

For more detailed information about rule checking, see the One Identity Manager
Compliance Rules Administration Guide. For more information about peer group analysis,
see the One Identity Manager IT Shop Administration Guide and the One Identity Manager
Attestation Administration Guide.

Attestors for departments, cost centers,


and locations
NOTE: This function is only available if the Attestation Module is installed.
In One Identity Manager you can assign departments, cost centers, and locations to
identities who can be brought in as attestors in attestation cases, provided that the
approval workflow is set up accordingly. To do this, assign the departments, cost centers,
and locations to application roles for attestors. For more information about attestation, see
the One Identity Manager Attestation Administration Guide.
A default application role for attestors is available in One Identity Manager. You may create
other application roles as required. For more information about application roles, see the
One Identity Manager Authorization and Authentication Guide.

Table 10: Default application roles for attestors

User Tasks

Attestors for Attestors must be assigned to the Identity Management |


organizations Organizations | Attestors application role or a child application role.
Users with this application role:
l Attest correct assignment of company resources to departments,
cost centers, and locations for which they are responsible.
l Can view main data for departments, cost centers, and locations
but cannot edit them.

NOTE: This application role is available if the module Attestation


Module is installed.

To add identities to default application roles for attestors

1. In the Manager, select the Organizations > Basic configuration data >
Attestors category.
2. Select the Assign identities task.
3. In the Add assignments pane, add identities.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 61
Departments, cost centers, and locations
TIP: In the Remove assignments pane, you can remove assigned identities.

To remove an assignment
l Select the identity and double-click .
4. Save the changes.

Approvers and approvers (IT) for


departments, cost centers, and locations
In One Identity Manager you can assign departments, cost centers and locations to
identities who can be brought in as approvers in approval processes for IT Shop requests,
provided that the approval workflow is set up accordingly. To do this, assign the
departments, cost centers, and locations to application roles for role approvers. For more
information, see the One Identity Manager IT Shop Administration Guide.
Default application roles for approvers and approvers (IT) are available in
One Identity Manager. You may create other application roles as required. For more
information about implementing and editing application roles, see theOne Identity Manager
Authorization and Authentication Guide.

Table 11: Default application roles for approvers

User Tasks

Approvers for Role approvers must be assigned to the Identity Management |


organizations Organizations | Role approvers application role or a child
application role.
Users with this application role:
l Are approvers for the IT Shop.
l Approve request from departments, cost centers, and locations
for which they are responsible.

Approvers (IT) IT role approvers must be assigned to the Identity Management |


for Organizations | Role approvers (IT) application role or a child
organizations application role.
Users with this application role:
l Are IT role approvers for the IT Shop.
l Approve request from departments, cost centers, and locations
for which they are responsible.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 62
Departments, cost centers, and locations
To specify a role approver or role approver (IT)

1. In the Manager, select the Organizations > Basic configuration data > Role
approvers category.
- OR -
In the Manager, select the Organizations > Basic configuration data > Role
approvers (IT) category.
2. Select the Assign identities task.
3. In the Add assignments pane, add identities.
TIP: In the Remove assignments pane, you can remove assigned identities.

To remove an assignment
l Select the identity and double-click .
4. Save the changes.

Creating and editing departments


Create new departments or edit the master data of existing departments.

To create a department

1. In the Manager, select the Organizations > Departments category.


2. Click in the result list.
3. On the main data form, edit the main data of the department.
4. Save the changes.

To edit the main data of a department

1. In the Manager, select the Organizations > Departments category.


2. In the result list, select a department and run the Change main data task.
3. Edit the department's main data.
4. Save the changes.

Detailed information about this topic


l General main data for departments on page 64
l Contact data for departments on page 66
l Functional area and risk assessment for departments on page 67
l Setting up IT operating data for departments, cost centers, and locations on page 77

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 63
Departments, cost centers, and locations
General main data for departments
Enter the following data for a department.

Table 12: General main data of a department

Property Description

Department Name of the department Translate the given text using the button.

Short name Short name of the department

Object ID Unique department object ID. The object ID is required, for example, in
SAP systems for assigning employees to departments.

Parent Parent of department in the hierarchy.


department
To organize departments hierarchically, select the parent department in
the menu. Leave this field empty if the department is at the top level of
the department hierarchy.

Full name Complete name of the department including parent departments.


Translate the given text using the button.

Role type Role types for more detailed classification.


Location Location to which the department is primary assigned.

Manager Manager responsible for the department.

2nd Manager Assistant manager of the department.

Additional Application role for a group of managers and deputies who manage this
manager department.
To create a new application role, click . Enter the application role
name and assign a parent application role.

Attestors Applications role whose members are authorized to approve attestation


cases for this department.
To create a new application role, click . Enter the application role
name and assign a parent application role.
NOTE: This property is available if the Attestation Module is installed.

Cost center Cost center to which the department is primary assigned.


Role approver Application role whose members approve IT Shop requests for
members of this department.
To create a new application role, click . Enter the application role
name and assign a parent application role.

Role approver Application role whose members approve IT Shop requests for
(IT) members of this department.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 64
Departments, cost centers, and locations
Property Description

To create a new application role, click . Enter the application role


name and assign a parent application role.

Description Text field for additional explanation.


Comment Text field for additional explanation.
Remarks Text field for additional explanation.
Certification Certification status of the department. You can select the following
status certification statuses:
l New: The department was newly added to the
One Identity Manager database.
l Certified: The department main data was granted approval by
the manager.
l Denied: The department data was denied approval by the
manager.

The certification status can be set depending on the result of regular


attestations.

Import data Target system or data source, from which the data set was imported.
source

Full name Full name of the department include parent departments.

Deactivated Specifies whether the department is actively used. Set this option if the
department is not used. This option does not have any effect on the
calculation of inheritance.

Block Specifies whether inheritance for this department can be discontinued.


inheritance Set this option to discontinue inheritance within the department
hierarchy.

X500 nodes Select this option to label a department for exporting to an X500
schema.

Identities do Specifies whether identity inheritance should be temporarily prevented


not inherit for this department.

Devices do not Specifies whether device inheritance should be temporarily prevented


inherit for this department.

Workdesks do Specifies whether workdesk inheritance should be temporarily


not inherit prevented for this department.

Dynamic roles Specifies whether a dynamic role can be created for the department.
not allowed

Spare field no. Additional company-specific information. Use the Designer to customize

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 65
Departments, cost centers, and locations
Property Description

01 ... Spare display names, formats, and templates for the input fields.
field no. 10

Spare date no. Additional company-specific information. Use the Designer to customize
01 ... Spare display names, formats, and templates for the input fields.
date no. 03

Related topics
l Role types for departments, cost centers, and locations on page 57
l Attestors for departments, cost centers, and locations on page 61
l Approvers and approvers (IT) for departments, cost centers, and locations on
page 62
l Blocking inheritance using roles on page 30
l Preventing identities, devices, or workdesks from inheriting individual roles on
page 31
l Creating dynamic roles for departments, cost centers, and locations on page 85
l Certifying departments, cost centers, and locations on page 90

Contact data for departments


Enter the following contact data for departments Select the button next to the input field
to activate it and add add data. Use the button to remove data from a list.

Table 13: Contact data for departments

Property Description

Email addresses Email addresses for the department.

Visitors address Department address for visitors.

Visiting hours Department hours for visitors.

Phone hours Department telephone hours.

Business hours Department business hours.

Zip code Department's zip code.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 66
Departments, cost centers, and locations
Functional area and risk assessment for
departments
Here, you can enter values to classify the department, which analyzes the risk of a
department with respect to identity audit.

Table 14: Main data of a department's functional area

Property Description

Country Country. You require this to determine the identity’s language and
working hours.

State State. You require this to determine the identity’s language and working
hours.

Functional area Department functional area This data is required for department's risk
assessment.

Risk index A risk index is calculated for the department risk assessment based on
(calculated) assigned company resources. This field is only visible if the QER |
CalculateRiskIndex configuration parameter is set. For more
information about risk assessment, see the One Identity Manager
Risk Assessment Administration Guide.

Transparency Specifies how well you can trace department assignments. Use the
index slider to enter a value between 0 and 1.
0: no transparency
1: full transparency

Max. number Number of rule violations allowed in this department. The value can be
of rule evaluated when compliance rules are checked. For more information,
violations see the One Identity Manager Compliance Rules Administration Guide.
NOTE: This property is only available if the Compliance Rules Module
is installed.

Turnover for Turnover for this department.


this unit

Earnings for Earnings for this department.


this unit

Related topics
l Determining the language for identities on page 131
l Determining identities working hours on page 132
l Functional areas for departments, cost centers, and locations on page 59

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 67
Departments, cost centers, and locations
Creating and editing cost centers
Create new cost centers or edit the main data of existing cost centers.

To create a cost center

1. In the Manager, select the Organizations > Cost centers category.


2. Click in the result list.
3. On the main data form, edit the main data of the cost center.
4. Save the changes.

To edit main data of a cost center

1. In the Manager, select the Organizations > Cost centers category.


2. In the result list, select a cost center and run the Change main data task.
3. Edit the cost center's main data.
4. Save the changes.

Detailed information about this topic


l General main data for cost centers on page 68
l Functional area and risk assessment for cost centers on page 71
l Setting up IT operating data for departments, cost centers, and locations on page 77

General main data for cost centers


Enter the following data for a cost center.

Table 15: General main data of a cost center

Property Description

Cost center Cost center name. Translate the given text using the button.

Short name Cost center short name.

Parent cost Parent of cost center in the hierarchy.


center
To organize cost centers hierarchically, select the parent cost center in
the menu. Leave this field empty if the cost center is at the top level of
the cost center hierarchy.

Full name Complete name of the cost center including parent cost centers.
Translate the given text using the button.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 68
Departments, cost centers, and locations
Property Description

Role type Role types for more detailed classification.


Manager Manager responsible for the cost center.

2nd Manager Deputy cost center manager.

Additional Application role for a group of managers and deputies who manage this
manager cost center.
To create a new application role, click . Enter the application role
name and assign a parent application role.

Attestors Applications role whose members are authorized to approve attestation


cases for this cost center.
To create a new application role, click . Enter the application role
name and assign a parent application role.
NOTE: This property is available if the Attestation Module is installed.

Department Department to which the cost center is primary assigned.

Location Location to which the cost center is primary assigned.

Role approver Application role whose members approve IT Shop requests for
members of this cost center.
To create a new application role, click . Enter the application role
name and assign a parent application role.

Role approver Application role whose members approve IT Shop requests for
(IT) members of this cost center.
To create a new application role, click . Enter the application role
name and assign a parent application role.

Description Text field for additional explanation.

Comment Text field for additional explanation.

Remarks Text field for additional explanation.

Certification Certification status of the cost center. You can select the following
status certification statuses:
l New: The cost center was newly added to the
One Identity Manager database.
l Certified: The cost center main data was granted approval by
the manager.
l Denied: The cost center main data was denied approval by the
manager.

The certification status can be set depending on the result of regular


attestations.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 69
Departments, cost centers, and locations
Property Description

Import data Target system or data source, from which the data set was imported.
source
Deactivated Specifies whether the cost center is actively used. Set this option if the
cost center is not used. This option does not have any effect on the
calculation of inheritance.

Block Specifies whether inheritance for this cost center can be discontinued.
inheritance Set this option to discontinue inheritance within the cost center
hierarchy.

X500 nodes Select this option to label a cost center for exporting to an X500
schema.

Identities do Specifies whether identity inheritance should be temporarily prevented


not inherit for this cost center.

Devices do not Specifies whether device inheritance should be temporarily prevented


inherit for this cost center.

Workdesks do Specifies whether workdesk inheritance should be temporarily


not inherit prevented for this cost center.

Dynamic roles Specifies whether a dynamic role can be created for the cost center.
not allowed
Spare field no. Additional company-specific information. Use the Designer to customize
01 ... Spare display names, formats, and templates for the input fields.
field no. 10

Spare date no. Additional company-specific information. Use the Designer to customize
01 ... Spare display names, formats, and templates for the input fields.
field no. 03

Related topics
l Role types for departments, cost centers, and locations on page 57
l Attestors for departments, cost centers, and locations on page 61
l Approvers and approvers (IT) for departments, cost centers, and locations on
page 62
l Blocking inheritance using roles on page 30
l Preventing identities, devices, or workdesks from inheriting individual roles on
page 31
l Creating dynamic roles for departments, cost centers, and locations on page 85
l Certifying departments, cost centers, and locations on page 90

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 70
Departments, cost centers, and locations
Functional area and risk assessment for
cost centers
Here, you can enter values to classify the cost center, which analyzes the risk of a cost
center with respect to identity audit.

Table 16: Main data of a cost center's functional area

Property Description

Country Country. You require this to determine the identity’s language and
working hours.

State State. You require this to determine the identity’s language and working
hours.

Functional area Cost center's function area. This data is required for cost center's risk
assessment.

Risk index A risk index is calculated for the cost center risk assessment based on
(calculated) assigned company resources. This field is only visible if the QER |
CalculateRiskIndex configuration parameter is set. For more
information about risk assessment, see the One Identity Manager
Risk Assessment Administration Guide.

Transparency Specifies how well you can trace cost center assignments. Use the slider
index to enter a value between 0 and 1.
0: no transparency
1: full transparency

Max. number Number of rule violations allowed in this cost center. The value can be
of rule evaluated when compliance rules are checked. For more information,
violations see the One Identity Manager Compliance Rules Administration Guide.
NOTE: This property is only available if the Compliance Rules Module
is installed.

Turnover for Turnover for the cost center.


this unit

Earnings for Earnings for the cost center.


this unit

Related topics
l Determining the language for identities on page 131
l Determining identities working hours on page 132
l Functional areas for departments, cost centers, and locations on page 59

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 71
Departments, cost centers, and locations
Creating and editing locations
Create new locations or edit the master data of existing locations.

To create a location

1. In the Manager, select the Organizations > Locations category.


2. Click in the result list.
3. On the main data form, edit the main data of the location.
4. Save the changes.

To edit the main data of a location

1. In the Manager, select the Organizations > Locations category.


2. In the result list, select a location and run the Change main data task.
3. Edit the location’s main data.
4. Save the changes.

Detailed information about this topic


l General main data for locations on page 72
l Location address information on page 75
l Configuring location networks on page 76
l Directions to location on page 76
l Functional area and risk assessment for locations on page 76
l Setting up IT operating data for departments, cost centers, and locations on page 77

General main data for locations


Enter the following data for a location.

Table 17: General main data of a location

Property Description

Location Name of the location. Translate the given text using the button.

Short name Short name of the location.

Name Additional name for the location.

Parent location Parent of location in the hierarchy.


To organize locations hierarchically, select the parent location in the

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 72
Departments, cost centers, and locations
Property Description

menu. Leave this field empty if the location is at the top level of the
location hierarchy.

Full name Complete name of the location including parent locations. Translate
the given text using the button.

Role type Role types for more detailed classification.


Manager Manager responsible for the location.

2nd Manager Assistant manager of the location.

Additional Application role for a group of managers and deputies who manage this
manager location.
To create a new application role, click . Enter the application role
name and assign a parent application role.

Attestors Applications role whose members are authorized to approve


attestation cases for this location.
To create a new application role, click . Enter the application role
name and assign a parent application role.
NOTE: This property is available if the Attestation Module is installed.

Department Department to which the location is primary assigned.

Cost center Cost center to which the location is primary assigned.

Additional Text field for additional explanation.


remarks

Role approver Application role whose members approve IT Shop requests for
members of this location.
To create a new application role, click . Enter the application role
name and assign a parent application role.

Role approver Application role whose members approve IT Shop requests for
(IT) members of this location.
To create a new application role, click . Enter the application role
name and assign a parent application role.

Description Text field for additional explanation.

Comment Text field for additional explanation.

Remarks Text field for additional explanation.

Certification Certification status of the location. You can select the following
status certification statuses:
l New: The location was newly added to the One Identity Manager

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 73
Departments, cost centers, and locations
Property Description

database.
l Certified: The location main data was granted approval by the
manager.
l Denied: The location data was denied approval by the manager.

The certification status can be set depending on the result of regular


attestations.

Import data Target system or data source, from which the data set was imported.
source
Deactivated Specifies whether the location is actively used. Set this option if the
location is not used. This option does not have any effect on the
calculation of inheritance.

Block Specifies whether inheritance for this location can be discontinued. Set
inheritance this option to discontinue inheritance within the location hierarchy.

X500 nodes Select this option to label a location for exporting to an X500 schema.

Identities do not Specifies whether identity inheritance should be temporarily prevented


inherit for this location.

Devices do not Specifies whether device inheritance should be temporarily prevented


inherit for this location.

Workdesks do Specifies whether workdesk inheritance should be temporarily


not inherit prevented for this location.

Dynamic roles Specifies whether a dynamic role can be created for the location.
not allowed
Spare field no. Additional company-specific information. Use the Designer to
01 ... Spare field customize display names, formats, and templates for the input fields.
no. 10

Spare date no. Additional company-specific information. Use the Designer to


01 ... Spare date customize display names, formats, and templates for the input fields.
no. 03

Related topics
l Role types for departments, cost centers, and locations on page 57
l Attestors for departments, cost centers, and locations on page 61
l Approvers and approvers (IT) for departments, cost centers, and locations on
page 62
l Blocking inheritance using roles on page 30
l Preventing identities, devices, or workdesks from inheriting individual roles on
page 31

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 74
Departments, cost centers, and locations
l Creating dynamic roles for departments, cost centers, and locations on page 85
l Certifying departments, cost centers, and locations on page 90

Location address information


Enter the following main data of contacting the location.

Table 18: Location's address data

Property Description

Address Postal address of the location.

Street Street or road.

Building Building

Zip code Zip code.

City City.

Country Country. You require this to determine the identity’s language and
working hours.

State State. You require this to determine the identity’s language and working
hours.

Phone Telephone number of the location.

Quick dial Telephone short entry (without code).

Fax Fax number of the location.

Room Room.

Comment Text field for additional explanation.


(room)

Related topics
l Determining the language for identities on page 131
l Determining identities working hours on page 132

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 75
Departments, cost centers, and locations
Configuring location networks
Enter the location's network configuration data.

Table 19: Location network data

Property Description

IP offset IP offset of the location.

Subnet mask Subnet mask of the location.

Directions to location
Enter another address and a description of the way to reach the location. Use the
button next to the input field to enable it and enter data. Use the button to remove data
from the list.

Table 20: Directions to location

Property Description

Visitors address Location address for visitors.

Travel directions Travel directions to the location.

Functional area and risk assessment for


locations
Here, you can enter values to classify a location for analyzing the risk of a location in the
context of identity audit.

Table 21: Main data of a location's functional area

Property Description

Functional area Location's function area. This data is required for location's risk
assessment.

Risk index A risk index is calculated for the location risk assessment based on
(calculated) assigned company resources. This field is only visible if the QER |
CalculateRiskIndex configuration parameter is set. For more
information about risk assessment, see the One Identity Manager
Risk Assessment Administration Guide.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 76
Departments, cost centers, and locations
Property Description

Transparency Specifies how well you can trace location assignments. Use the slider to
index enter a value between 0 and 1.
0: no transparency
1: full transparency

Max. number Number of rule violations allowed in this location. The value can be
of rule evaluated when compliance rules are checked. For more information,
violations see the One Identity Manager Compliance Rules Administration Guide.
NOTE: This property is only available if the Compliance Rules Module
is installed.

Turnover for Turnover for this location.


this unit

Earnings for Earnings for this location.


this unit

Related topics
l Functional areas for departments, cost centers, and locations on page 59

Setting up IT operating data for


departments, cost centers, and
locations
To create user accounts for an identity with the Full managed manage level, you need to
know which IT operating data is required. The operating data required for each specific
target system is defined with its departments, locations, or cost centers. An identity is
assigned a primary location, primary department, or primary cost center. The necessary IT
operating data is ascertained from these assignments and used in creating the user
accounts. Default values are used if valid IT operating data cannot be found over the
primary roles.
You can also specify IT operating data directly for a specific account definition.

Example:

Normally, each identity in department A obtains a default user account in the domain
A. In addition, certain identities in department A obtain administrative user accounts

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 77
Departments, cost centers, and locations
in the domain A.
Create an account definition A for the default user account of the domain A and an
account definition B for the administrative user account of domain A. In the IT
operating data mapping rule for the account definitions A and B, specify the
Department property in order to determine the valid IT operating data.
Specify the effective IT operating data of department A for the domain A. This IT
operating data is used for standard user accounts. In addition, for department A,
specify the effective IT operating data of account definition B. This IT operating data
is used for administrative user accounts.

For more information, see the One Identity Manager Target System Base Module
Administration Guide.

To define IT operating data

1. In the Manager, select the Organizations > <role class> category.


2. Select the role in the result list.
3. Select the Edit IT operating data task.
4. Click Add and enter the following data.
l Effects on: Specify an IT operating data application scope. The IT operating
data can be used for a target system or a defined account definition.

To specify an application scope


a. Click next to the field.
b. Under Table, select the table that maps the target system for select the
TSBAccountDef table or an account definition.
c. Select the specific target system or account definition under Effects on.
d. Click OK.
l Column: Select the user account property for which the value is set.
In the menu, you can select the columns that use the TSB_ITDataFromOrg script
in their template. For more information about this, see the
One Identity Manager Target System Base Module Administration Guide.
l Value: Enter a fixed value to assign to the user account's property.
5. Save the changes.

It operating data for target systems


The IT operating data necessary in the One Identity Manager default configuration for
automatically creating or changing identity user accounts and mailboxes in the target
system is itemized in the following table.
NOTE: IT operating data is dependent on the target system and is contained in
One Identity Manager modules. The data is not available until the modules are installed.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 78
Departments, cost centers, and locations
Table 22: Target system dependent IT operating data

Target system type IT operating data

Active Directory Container


Home server
Profile server
Terminal home server
Terminal profile server
Groups can be inherited
Identity type
Privileged user account

Microsoft Exchange Mailbox database

LDAP Container
Groups can be inherited
Identity type
Privileged user account

Domino Server
Certificate
Template for mail file
Identity type

SharePoint Authentication mode


Groups can be inherited
Roles can be inherited
Identity type
Privileged user account

SharePoint Online Groups can be inherited


Roles can be inherited
Privileged user account.
Authentication mode

Custom target systems Container (per target system)


Groups can be inherited
Identity type
Privileged user account

Azure Active Directory Groups can be inherited


Administrator roles can be inherited

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 79
Departments, cost centers, and locations
Target system type IT operating data

Subscriptions can be inherited


Disabled service plans can be inherited
Identity type
Privileged user account
Change password at next login

Cloud target system Container (per target system)


Groups can be inherited
Identity type
Privileged user account

Unix-based target system Login shell


Groups can be inherited
Identity type
Privileged user account

Oracle E-Business Suite Identity type


Groups can be inherited
Privileged user account.

SAP R/3 Identity type


Groups can be inherited
Roles can be inherited
Profiles can be inherited
Structural profiles can be inherited
Privileged user account.

Exchange Online Groups can be inherited

Privileged Account Management Authentication provider


Groups can be inherited
Identity type
Privileged user account

Google Workspace Organization


Groups can be inherited
Products and SKUs can be inherited
Admin roles assignments can be
inherited
Identity type

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 80
Departments, cost centers, and locations
Target system type IT operating data

Privileged user account.


Change password at next login

OneLogin Roles can be inherited


Identity type
Privileged user account.
Licensing state
OneLogin group

Modify IT operating data


If IT operating data changes, you must transfer the changes to the existing user
accounts. To do this, templates must be rerun on the affected columns. Before you
can run the templates, you can check what effect a change to the IT operating data
has on the existing user accounts. You can decide whether the change is transferred
to the One Identity Manager database in the case of each affected column in each
affected database.

Prerequisites
l The IT operating data of a department, a cost center, or a location have
been changed.
- OR -
l The default values in the IT operating data template were modified for an account
definition.

NOTE: If the assignment of an identity to a primary department, cost center, or to a


primary location changes, the templates are automatically run.

To run the template

1. In the Manager, select the <target system type> > Basic configuration data >
Account definitions > Account definitions category.
2. Select an account definition in the result list.
3. Select the Run templates task.
This displays a list of all user accounts that were created with the selected account
definition and whose properties were changed by modifying the IT operating data.
That means:
l Old value: Value of the object property before changing the IT operating data.
l New value: Value of the object property after changing the IT operating data.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 81
Departments, cost centers, and locations
l Selection: Specifies whether the new value is copied to the user account.
4. Mark all the object properties in the selection column that will be given the
new value.
5. Click Apply.
The templates are applied to all selected user accounts and properties.

Assigning identities, devices, and


workdesks to departments, cost
centers, and locations
Assign identities, devices, and workdesks to departments, cost centers, and locations.
Identities, devices, and workdesks can obtain their company resources through these
organizations.

To add identities, devices, and workdesks to a hierarchical role

1. In the Manager, select the Organizations > <role class> category.


2. Select the role in the result list.
3. Select the appropriate task.
l Assign identities
l Assign devices
l Assign workdesks
4. In the Add assignments pane, assign objects.
TIP: In the Remove assignments pane, you can remove object assignments.

To remove an assignment
l Select the object and double-click .
5. Save the changes.

TIP: Use dynamic roles to assign identities, devices, and workdesks to departments, cost
centers, and locations automatically.

Related topics
l Preparing hierarchical roles for company resource assignments on page 24
l Assigning company resources to departments, cost centers, and locations on page 83
l Creating dynamic roles for departments, cost centers, and locations on page 85
l Assigning identities to departments, cost centers, and locations on page 115

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 82
Departments, cost centers, and locations
l Assigning devices to departments, cost centers, and locations on page 171
l Assigning workdesks to departments, cost centers, and locations on page 179

Assigning company resources to


departments, cost centers, and
locations
The default method of assigning identities, devices, and workdesks is indirect assignment.
This allocates an identity, a device or a workdesk to departments, cost centers, or
locations. The total of assigned company resources for an identity, a device or workdesk is
calculated from their position within the hierarchy, the direction of inheritance and the
company resources assigned to these roles.
Indirect assignment is divided into:
l Secondary assignment
You make a secondary assignment by classifying an identity, a device, or a workdesk
within a role hierarchy. Secondary assignment is the default method for assigning
and inheriting company resources through roles.
IMPORTANT: You use role classes to specify whether a secondary assignment of
company resources is possible.
If an identity, device or a workdesk fulfills the requirements of a dynamic role, the
object is added dynamically to the corresponding company structure and can obtain
company resources through it.
l Primary assignment
You make a primary assignment using a department, cost center, or location foreign
key reference in identity, device and workdesk objects. Primary assignment
inheritance can be enable through configuration parameters.

You must assign company resources to departments, cost centers, or locations so that
identities, devices, and workdesks can inherit company resources. The following table
shows the possible company resources assignments.
NOTE: Company resources are defined in the One Identity Manager modules and are not
available until the modules are installed.

Table 23: Possible company resource assignments

Company resource Available in Module

Resources always

Account definitions Target System Base Module

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 83
Departments, cost centers, and locations
Company resource Available in Module

Groups of custom target systems Target System Base Module

System entitlements of custom target Target System Base Module


systems

Active Directory groups Active Directory Module

SharePoint groups SharePoint Module

SharePoint roles SharePoint Module

LDAP groups LDAP Module

Notes groups Domino Module

SAP groups SAP R/3 User Management Module

SAP profiles SAP R/3 User Management Module

SAP roles SAP R/3 User Management Module

SAP parameters SAP R/3 User Management Module

Structural profiles SAP R/3 Structural Profiles Add-on Module

BI analysis authorizations SAP R/3 Analysis Authorizations Add-on


Module

E-Business Suite permissions Oracle E-Business Suite Module

System roles System Roles Module

Subscribable reports Report Subscription Module

Software Software Management Module

Azure Active Directory groups Azure Active Directory Module

Azure Active Directory administrator roles Azure Active Directory Module

Azure Active Directory subscriptions Azure Active Directory Module

Disabled Azure Active Directory service Azure Active Directory Module


plans

Unix groups Unix Based Target Systems Module

Cloud groups Cloud Systems Management Module

Cloud system entitlements Cloud Systems Management Module

PAM user groups Privileged Account Governance Module

Google Workspace groups Google Workspace Module

Google Workspace products and SKUs Google Workspace Module

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 84
Departments, cost centers, and locations
Company resource Available in Module

SharePoint Online groups SharePoint Online Module

SharePoint Online roles SharePoint Online Module

OneLogin roles OneLogin Module

To add company resources to a hierarchical role

1. In the Manager, select the Organizations > <role class> category.


2. Select the role in the result list.
3. Select the task to assign the corresponding company resource.
4. In the Add assignments pane, assign company resources.
TIP: In the Remove assignments pane, you can remove company assignments.

To remove an assignment
l Select the company resource and double-click .
5. Save the changes.

Detailed information about this topic


l Basic principles for assigning company resources on page 15
l Preparing hierarchical roles for company resource assignments on page 24
l Permitting assignments of identities, devices, workdesks, and company resources to
roles on page 29

Related topics
l Possible assignments of company resources through roles on page 25
l Assigning identities, devices, and workdesks to departments, cost centers, and
locations on page 82
l Dynamic roles on page 35

Creating dynamic roles for


departments, cost centers, and
locations
Use this task to define dynamic roles for single departments, cost centers or location. This
allows you to specify memberships in these roles.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 85
Departments, cost centers, and locations
NOTE:Create dynamic role is only set for departments, cost centers, and locations,
which do not have Dynamic roles not allowed set.

To create a dynamic role

1. In the Manager, select the Organizations > <role class> category.


2. Select the role in the result list.
3. Select the Create dynamic role task.
4. Enter the required main data.
5. Save the changes.

To edit a dynamic role

1. In the Manager, select the Organizations > <Role class> > Dynamic
roles category.
2. Select the role in the result list.
3. Open the role's overview form.
4. Select Dynamic roles and click on the dynamic role.
5. Select the Change main data task.
6. Edit the dynamic role's main data.
7. Save the changes.

Related topics
l Dynamic roles on page 35
l Creating and editing dynamic roles on page 36
l General main data for departments on page 64
l General main data for cost centers on page 68
l General main data for locations on page 72

Dynamic roles with incorrectly


excluded identities
In the Manager, you can obtain an overview of all the dynamic roles with conflicting entries
in the exclude list. This means that for at least one item in the list the following applies:
l The dynamic role condition does not apply.
For example, this might occur if the dynamic role condition was changed after an
identity was entered in the exclude list.
- OR -

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 86
Departments, cost centers, and locations
l The excluded identity is also assigned to the role in another way
such as through inheritance or direct assignment.

Check these entries and correct the assignments.

To check conflicting entries of departments, locations, or cost centers in the


exclusion list

1. In the Manager, select the Organizations > Troubleshooting > Dynamic roles
with potentially incorrect excluded identities category.
2. Select the dynamic role in the result list.
3. Select the Exclude identities task.
In the exclusion list you can see which identities are affected by the given conditions.

Related topics
l Removing identities from the exclusion list on page 48
l Main data of exclude lists for dynamic roles on page 49
l Creating dynamic roles for departments, cost centers, and locations on page 85

Assign organizations
Use this task to map the relationships of a department, cost center of a location to other
roles. This task has the same effect as assigning a department, cost center, or location on
the role main data form. The assignment is entered in the respective foreign key column in
the base table.

To assign a cost center or location to departments

1. In the Manager, select the Organizations > Cost centers or the Organizations >
Locations category.
2. Select the role in the result list.
3. Select the Assign organizations task.
4. Select the Departments tab.
5. In the Add assignments pane, assign departments.
The selected role is primarily assigned to all departments as a cost center or location.
6. Save the changes.

To assign a department or a location to cost centers

1. In the Manager, select the Organizations > Departments or the Organizations


> Locations category.
2. Select the role in the result list.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 87
Departments, cost centers, and locations
3. Select the Assign organizations task.
4. Select the Cost centers tab.
5. In the Add assignments pane, assign cost centers.
The selected role is primarily assigned to all cost centers as a department or location.
6. Save the changes.

To assign a department or a cost center to locations

1. In the Manager, select the Organizations > Departments or the Organizations


> cost centers category.
2. Select the role in the result list.
3. Select the Assign organizations task.
4. Select the Locations tab.
5. In the Add assignments pane, assign locations.
The selected role is primarily assigned to all locations as a department or cost center.
6. Save the changes.

Specifying inheritance exclusion for


departments, cost centers, and
locations
You can define conflicting roles to prevent identities, devices, or workdesks from being
assigned to several roles at the same time and from obtaining mutually exclusive company
resources through these roles. At the same time, specify which departments, cost centers,
and locations are mutually exclusive. This means you may not assign these roles to one and
the same identity (device, workdesk).
NOTE: Only roles, which are defined directly as conflicting roles cannot be assigned to the
same identity (device, workdesk). Definitions made on parent or child roles do not affect
the assignment.

To configure inheritance exclusion


l In the Designer, set the QER | Structures | ExcludeStructures configuration
parameter and compile the database.
NOTE: If you disable the configuration parameter at a later date, model compon-
ents and scripts that are no longer required, are disabled. SQL procedures and
triggers are still carried out. For more information about the behavior of prepro-
cessor relevant configuration parameters and conditional compiling, see the
One Identity Manager Configuration Guide.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 88
Departments, cost centers, and locations
To define inheritance exclusion for a departments

1. In the Manager, select the Organizations > Departments category.


2. Select the department in the result list.
3. Select Edit conflicting departments.
4. In the Add assignments pane, assign departments that are mutually exclusive to
the selected department.
- OR -
In the Remove assignments pane, remove the departments that are no longer
mutually exclusive.
5. Save the changes.

To define inheritance exclusion for a cost center

1. In the Manager, select the Organizations > Cost centers category.


2. Select the cost center in the result list.
3. Select Edit conflicting cost centers.
4. In the Add assignments pane, assign cost centers that are mutually exclusive to
the selected cost center.
- OR -
In the Remove assignments pane, remove the cost centers that are no longer
mutually exclusive.
5. Save the changes.

To define inheritance exclusion for a cost center

1. In the Manager, select the Organizations > Locations category.


2. Select the location in the result list.
3. Select Edit conflicting locations.
4. In the Add assignments pane, assign locations that are mutually exclusive to the
selected location.
- OR -
In the Remove assignments pane, remove the locations that are no longer
mutually exclusive.
5. Save the changes.

Detailed information about this topic


l Inheritance exclusion: Specifying conflicting roles on page 33

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 89
Departments, cost centers, and locations
Assigning extended properties to
departments, cost centers, and
locations
You can assign extended properties to departments, cost centers, and locations. Extended
properties are meta objects, such as operating codes, cost codes, or cost accounting areas
that cannot be mapped directly in One Identity Manager.

To set extended properties

1. In the Manager, select the Organizations > <role class> category.


2. Select the role in the result list.
3. Select Assign extended properties.
4. In the Add assignments pane, assign extended properties.
TIP: In the Remove assignments pane, you can remove assigned extended
properties.

To remove an assignment
l Select the extended property and double-click .
5. Save the changes.

Related topics
l Setting up extended properties on page 206

Certifying departments, cost centers,


and locations
NOTE: This function is only available if the Attestation Module is installed.
The certification status of departments, cost centers, and locations can be set manually or
by regular attestation. To set certification status by attesting, configure the attestation
policies accordingly.

To manually change the certification status of a department, cost center,


or location

1. In the Manager, edit the main data of the department, cost center, and location.
2. In the Certification status field, enter the required value.
3. Save the changes.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 90
Departments, cost centers, and locations
To change the certification status of departments, cost centers, or locations by
attestation

1. In the Manager, select the Attestation > Attestation policies category.


2. In the result list, select the attestation policy whose attestation runs will adjust the
certification status.
3. If the certification status is to change to Certified when attestation is approved,
enable the Set certification status to "Certified".
4. If the certification status is to be changed to Denied when attestation is denied,
enable Set certification status to "Denied".
5. Save the changes.

One Identity Manager provides default procedures for managers to quickly attest and
certify the main data of newly added departments, cost centers, and locations in the
One Identity Manager database. Attestation is performed only for organizations with the
New certification status. If the attestation is approved, the certificate status of the attested
organization is set to Certified and otherwise, to Denied. If attestation was granted
approval, it disables the Identities do not inherit option.
NOTE: If the attestation was denied, only the certification status changes. Other behavi-
oral changes, for example in the inheritance calculation, are not associated with this and
can be implemented on a custom basis.
This function is only available if the Target System Base Module is installed. For more
information about certifying new roles and organizations, see the One Identity Manager
Attestation Administration Guide.

Detailed information about this topic


l Creating and editing departments on page 63
l Creating and editing cost centers on page 68
l Creating and editing locations on page 72

Reports about departments, cost


centers, and locations
One Identity Manager makes various reports available containing information about the
selected base object and its relations to other One Identity Manager database objects. The
following reports are available for departments, cost centers, and locations.
NOTE: Other sections may be available depending on the which modules are installed.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 91
Departments, cost centers, and locations
Table 24: Reports about departments, cost centers, and locations

Report Description

Overview of all This report finds all the roles in which identities from the selected
assignments department, cost center, or location are also members.

Data quality of This report evaluates the data quality of identity data. It takes all
department identities in the department or cost center into account.
members (cost
center members)

Show historical This report lists all members of the selected department, cost center,
memberships or location and the duration of their membership.

Identities per This report contains the number of identity per department. The
department primary and secondary assignments to organizations are taken into
account. You can find this report in the Manager in the My
One Identity Manager category.

Identities per This report contains the number of identity per cost center. The
cost center primary and secondary assignments to organizations are taken into
account. You can find this report in the Manager in the My
One Identity Manager category.

Identities per This report contains the number of identity per location. The primary
location and secondary assignments to organizations are taken into account.
You can find this report in the Manager in the My
One Identity Manager category.

Related topics
l Analyzing role memberships and identity assignments on page 123

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 92
Departments, cost centers, and locations
4

Identity administration

The main component of One Identity Manager maps identities with their main data and all
available company resources. Identities usually represent real people but they can also be
used for machines and services in One Identity Manager. IT resources, such as devices,
software, and access permissions in various target systems, qualify as company
resources. Resources such as mobile phones, company cars, or keys can be mapped to
identities, as well.
Identities obtain company resources according to their function and their position with the
company structure. In One Identity Manager, departments, cost centers, and locations or
even business roles as well memberships of the identities are mapped in these company
structures. Once company resources are assigned to the company structures, they are
inherited by all the members of the company structures. This way, identities automatically
be supplied with all the necessary company resources.
If you manage access permissions on all One Identity Manager tools using the application
role, you obtain all of the information about current access permissions and identity
responsibilities with One Identity Manager. For more information about application roles,
see the One Identity Manager Authorization and Authentication Guide.
One Identity Manager components for managing identities are available when the QER |
Person configuration parameter is set.
l In the Designer, check if the configuration parameter is set. If not, set the
configuration parameter.

Detailed information about this topic


l Basics for managing identities on page 95
l Main identities and subidentities on page 97
l Identity's central user account on page 98
l Identity's default email address on page 98
l Identity's central password on page 99
l Password policies for identities on page 142
l Creating and editing identities on page 100
l Deactivating and deleting identities on page 124

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 93
Identity administration
l Deleting all personal data on page 127
l Limited access to One Identity Manager on page 128
l Assigning company resources to identities on page 110
l Displaying the origin of identities' roles and entitlements on page 120
l Analyzing role memberships and identity assignments on page 123
l Reports about identities on page 134
l Configuration parameters for managing identities on page 215

One Identity Manager users for


managing identities
Following users are used for identity administration.

Table 25: Users

User Tasks

Identity administrators Identity administrators must be assigned to the Identity


Management | Identities | Administrators application role.
Users with this application role:
l Can edit any identity's main data
l Assign managers to identities.
l Can assign company resources to identities.
l Check and authorize identity main data.
l Create and edit risk index functions.
l Edit password policies of identities' passwords.
l Delete identity's security keys (WebAuthn)
l Can see everyone's requests, attestations, and
delegations and edit delegations in the Web Portal.

Responsibilities of The Base roles | Identity managers application role is


identities automatically assigned to a user if the user is a manager or
supervisor of identities, departments, locations, cost centers,
business roles, or IT Shops.
Users with this application role:
l Can edit main data for the objects they are responsible for
and assign company resources to them.
l Can add new identities to the Web Portal and edit the

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 94
Identity administration
User Tasks

main data of their identities.


l Can add their identities to the IT Shop.
l Can view their identities' compliance rule violations in the
Web Portal.
l Can create delegations for their identities the Web Portal.
l Can see and edit their identities' delegations in the
Web Portal.

Members of this application role are determined through a


dynamic role.

One Identity Manager One Identity Manager administrator and administrative system
administrators users Administrative system users are not added to application
roles.
One Identity Manager administrators:
l Create customized permissions groups for application
roles for role-based login to administration tools in the
Designer as required.
l Create system users and permissions groups for non role-
based login to administration tools in the Designer as
required.
l Enable or disable additional configuration parameters in
the Designer as required.
l Create custom processes in the Designer as required.
l Create and configure schedules as required.
l Create and configure password policies as required.

Basics for managing identities


The following terminology is used in connection with managing identities in
One Identity Manager.

Table 26: Terms for managing identities

Term Explanation

Identity An identity usually represents a real person. In addition, identities


that do not represent real people, such as machine identities or
service identities, can be mapped in One Identity Manager.

Main Describes how an identity is associated to another identity. Here,

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 95
Identity administration
Term Explanation

identity/subidentity the main identity is the parent identity and the subidentity is the
child identity. A main identity is a primary identity and always
represents a real person. A subidentity is a virtual identity that is
set up for a specific purpose.

Primary identity A primary identity represents a real person. The identity can have
user accounts and permissions assigned to it. Primary identities
can be used as main identities.

Organizational A virtual identity for mapping different organizational role of an


identity employee in the company, such as subcontracts with other
functional areas. The identity can have user accounts and
permissions assigned to it. An organizational identity must be
assigned a main identity.

Personalized A virtual identity for mapping administrative roles of an employee


administrator in the company. This identity requires allocation of administrative
identity user accounts and permissions. A main identity must be assigned
to a personal administrator identity.

Sponsored identity Virtual identity that represents an additional, functionally related


identity. This identity requires allocation of user accounts and
permissions that are tied to an additional function, such as
permissions in a training or test environment. An additional
identity must be assigned a manager.

Shared identity Virtual identity for mapping function-related, cross-organizational


roles in a company, such as the IT support group or the IT
representatives of an company. A group identity can be used as a
subidentity of mulitple main identities. An group identity must be
assigned a manager.

Service identity Virtual identity that maps to a system administrative role in an


organization. Service identities are assigned to service accounts
and permissions. A service identity must be assigned a manager.

Machine identity Virtual identity that represents a machine or a non-human entity.


A machine identity can have user accounts and permissions
assigned to it. An machine identity must be assigned a manager.

Detailed information about this topic


l Main identities and subidentities on page 97
l Identity's central user account on page 98
l Identity's default email address on page 98
l Identity's central password on page 99

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 96
Identity administration
Main identities and subidentities
Sometimes, in large companies, employees may to have different identities for their work
such as ones that result from different contracts for different branches. These identities can
differ in their affiliation to departments, or cost centers, or in their access permissions for
example. External employees at different locations can also be used and represented with
different identities in the system.
To map individual identities and group them at a central location, you can define main
identities and subidentities in One Identity Manager. For example, if an identity has several
user accounts in one target system that must be assigned to different groups, create a
separate subidentity for each user account with a link to the main identity.
It is possible to test the identity’s permitted permissions per subidentity or for the main
identity within the bounds of an identity audit by including all subidentities. For more
information, see the One Identity Manager Compliance Rules Administration Guide.
Main identities and subidentities can be used to log in to One Identity Manager via various
authentication modules. For more information, see the One Identity Manager Authorization
and Authentication Guide.

Main identity
l A main identity can be assigned to one or more machine roles.
l A main identity is a primary identity and always represents a real person.
l A main identity is the central location where identities are brought together for
different purposes.
l Main identities can be assigned user accounts and permissions and can initiate
requests in the IT Shop.

Subidentity
l A subidentity is always connected to a main identity.
l A subidentity is a virtual identity that is set up for a specific purpose, such as for an
administrative user account or to map different roles in the company.
l Enter a main identity for the subidentity using Main identity on the identity’s
main data form.
l A subidentity can be assigned user accounts and permissions and can initiate
requests in the IT Shop.
l In order to improve the assignment of authorizations to the target systems, the
subidentities can be divided into different identity types.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 97
Identity administration
Identity's central user account
The identity’s central user account is used to form the user account login name in the
active system. The central user account is still used for logging into the
One Identity Manager tools.
In the One Identity Manager default installation, the central user account is made up of the
first and the last name of the identity. If only one of these is known, then it is used for the
central user account. There is always a check to see if a central user account with that value
already exists. If this is the case, an incremental number is added to the end of the value.

Table 27: Example of forming of central user accounts

First name Last name Central user account

Alex ALEX

Miller MILLER

Alex Miller ALEXM

Alex Meyer ALEXM1

Use the QER | Person | CentralAccountGlobalUnique configuration parameter to


define how to map the central user account.
l If this configuration parameter is set, the central user account for an identity is
formed uniquely in relation to the central user accounts of all identities and the user
account names of all permitted target systems.
l If the configuration parameter is not set, it is only formed uniquely related to the
central user accounts of all identities. This is the default.

Identity's default email address


The identity’s default email address is displayed on the mailboxes in the activated target
system. In the One Identity Manager default installation, the default email address is
formed from the identity’s central user account and the default mail domain of the active
target system.
The default mail domain is determined using the QER | Person | DefaultMailDomain
configuration parameter.
l In the Designer, set the configuration parameter and enter the default mail domain
name as a value.

Related topics
l Identity's central user account on page 98

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 98
Identity administration
Identity's central password
An identity's central password can be used for logging into the target systems and for
logging in to One Identity Manager. Depending on the configuration, an identity's central
password is replicated to their user accounts and their system user password.
l To publish the change in an identity's central user password to all existing user
accounts of the identity, check in the Designer if the QER | Person |
UseCentralPassword configuration parameter is set. If not, set the
configuration parameter.
l To copy an identity's central password to their system user password for logging in,
in the Designer, check if the QER | Person | UseCentralPassword |
SyncToSystemPassword configuration parameter is set. If not, set the
configuration parameter.
l If an identity’s system user account has to be unlocked when the central password is
provided, use the Designer to check if the QER | Person | UseCentralPassword |
SyncToSystemPassword | UnlockByCentralPassword configuration parameter
is set. If not, set the configuration parameter.

NOTE:
l The Password policy for central password of identities password policy is
applied to an identity's central password. Ensure that the password policy does not
violate the target system's specific password policies.
l Use the QER | Person | UseCentralPassword | CheckAllPolicies
configuration parameter to specify whether the identity’s central password is tested
against all the target system’s password policies in which the identity has user
accounts. This test is only carried out in the Password Reset Portal.
l An identity's central password is published to a user account only if the user
account's target system is synchronized by the One Identity Manager.
l If a target system is read-only, an identity's central password is not propagated to
user accounts in that target system.
l An identity's central password is not replicated to privileged user accounts of
the identity.
l If a password cannot be changed due to an error, the identity receives a
corresponding email notification.
l To replicate an identity's central password to a password column of a customer-
specific user account table, in the Designer, define a ViewAddOn for the
QERVPersonCentralPwdColumn view. The database view returns the password
column of the user account tables. The user account table must have a reference to
the identity (UID_Person) and a XMarkedForDeletion column. For more information
about customizing the One Identity Manager schema, see the
One Identity Manager Configuration Guide.
l If you want to map additional user-specific features, overwrite the QER_Publish_
CentralPassword script. For more information about working with scripts, see the

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 99
Identity administration
One Identity Manager Configuration Guide.
l The central password, the system user password, and the user account passwords
can be changed by using the Password Reset Portal. For more information, see the
One Identity Manager Web Designer Web Portal User Guide and the
One Identity Manager Web Application Configuration Guide.

Related topics
l Miscellaneous main data of identities on page 107
l Password policies for identities on page 142
l Displaying locked identities and system users on page 154

Creating and editing identities


In the Manager, you can enter the main data of identities in the Identities category. The
identities are filtered according to different criteria.
l Identities: All activated and temporarily deactivated identities.
l Inactive identities: All permanently deactivated identities.
l Locked identities: All identities that are locked due to incorrect password input.
l Security incidents: All identities that are classified as security threats.
l Certification: All identities by certification status.
l Data source: All identities by import data source.
l Identity: All identities according to their identity type.

NOTE: Identity properties loaded from a target system can only be edited to a limited
degree in One Identity Manager. Certain properties are locked because this target system
is the primary system. The source from which the main data is imported determines
which properties are locked.
Ensure you fill out all compulsory fields when you edit the main data. Certain main data is
inherited by the identity user account through templates.

To create an identity

1. In the Manager, select the Identities > Identities category.


2. Click in the result list.
3. On the main data form, edit the main data of the identity.
4. Save the changes.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 100
Identity administration
To edit main data of an identity

1. In the Manager, select the Identities > Identities category.


2. Select an identity in the result list and run the Change main data task.
3. Edit the identity's main data.
4. Save the changes.

Detailed information about this topic


l General main data of identities on page 101
l Organizational main data of identities on page 104
l Address data for identities on page 106
l Miscellaneous main data of identities on page 107

General main data of identities


Enter the following general main data of an identity. This data applies to personal and job-
related identity data.

Table 28: General main data

Property Description

First name Identity's first name.

Last name Identity's last name.

Middle name Second middle name.

Form of Identity's form of address. This is automatically set depending on


address gender.

Title Identity's title.

Surname Identity's surname prefix, for example du, or von.


prefix

Preferred Identity's preferred name.


name

Initials Identity's initials. These are automatically taken from first and last
names.

Gender Identity's gender.

Date of birth Identity's date of birth.

Name at birth Identity's name at date.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 101
Identity administration
Property Description

Job Description of employee's job within your company.


description

Generational Affix, for example Senior or Junior.


affix

Language Language used for sending email notifications to the identity. This
setting is also used for Web Portal's display.

Language for Language used to display values, for example, date, time, or number
value format- formats. The setting is taken into account when email notifications are
ting sent to the identity. This setting is also used for Web Portal's display.

Sub- Note about sub-organizations to which the Identity belongs.


organization

Permanently Specifies whether identity is actively used. If an identity is permanently


disabled inactive, all its entitlements as a One Identity Manager user are revoked.
NOTE: Identities that are permanently deactivated can no longer log in
to One Identity Manager.

Certification Specifies whether the identity's main data was approved by the identity's
status manager. Certification status is set through certification procedures. The
following certification status are permitted:
l New: The identity was newly added to the One Identity Manager
database.
l Certified: The identity's main data was granted approval by the
manager.
l Denied: The identity's main data was denied approval by the
manager. The identity is permanently disabled.

VIP Labels the identity as important.

Security risk Specifies whether the identity is considered a risk for the company.
Resource inheritance can be prevented for identities that are classified as
security risks. Configure the behavior in the resource properties.
Permissions inheritance can be prevented for identities that are classified
as security risks. The user accounts of the identity can be locked.
Configure this in the account definition properties. For more information
about account definitions, see the One Identity Manager
Target System Base Module Administration Guide.
NOTE: Identities that are classified as a security risk are no longer be
able to log in to One Identity Manager. To allow login, set the QER |
Person | AllowLoginWithSecurityIncident configuration
parameter.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 102
Identity administration
Property Description

No inheritance Specifies whether the identity inherits company resources through roles.
If the option is set, inheritance is prevented. Company resources the
identity receives through IT Shop requests are not assigned either.
Direct assignments remain intact.
If the configuration parameter QER | Attestation | UserApproval is
set, this option is set depending on the option Disabled permanently.
If the identity is permanently disabled, the option No inheritance is set
through a formatting rule.

External Specifies whether the identity is company internal or external. If this


option is set, the identity is an external employee, for example. External
identities are excluded from automatic account definition assignment in
the default version of One Identity Manager.

Employee More accurate classification of the identity taking their contractual


type relationship with the company into account. Permitted values are
Employee, Trainee, Contractor, Consultant, Partner, Customer,
Other.

Contact email Email address to which the registration link is sent when a new user
address account is created using the Self-Registration Web Portal.

Company Enter a company. Use the next to the field to add a new company.

Workdesk Identity's workdesk.

Risk index A risk index is calculated to evaluate the risk of an identity based on their
(calculated) permissions. An identity's risk index is determined from the risk indexes
of their user accounts. This input field is only visible if the QER |
CalculateRiskIndex configuration parameter is set. For more
information about risk assessment, see the One Identity Manager
Risk Assessment Administration Guide.

Description Text field for additional explanation.

Comment Text field for additional explanation.

Spare field no. Additional company-specific information. Use the Designer to customize
01 ... Spare display names, formats, and templates for the input fields.
field no. 10

Related topics
l Changing the certification status of identities on page 128
l Permanently deactivating identities on page 125
l Blocking inheritance using roles on page 30
l Calculation of assignments on page 22
l Creating and editing business partners for external identities on page 137

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 103
Identity administration
l Creating and editing workdesks on page 174
l Main data for resources on page 195

Organizational main data of identities


Enter the following general main data of an organization.

Table 29: Organizational main data

Property Description

Personnel Identity's personnel number.


number

Primary Department to which the identity is primary assigned. The identity can
department obtain company resources through this assignment if
One Identity Manager is configured respectively.
Furthermore, IT operating data for user accounts and mailboxes can be
determined though the department.

Primary cost Cost center to which the identity is primarily assigned. The identity can
center obtain company resources through this assignment if
One Identity Manager is configured respectively.
Furthermore, IT operating data for user accounts and mailboxes can be
determined though the cost center.

Primary Business role to which the identity is assigned. The identity can obtain
business roles company resources through this assignment if One Identity Manager is
configured respectively.
Furthermore, IT operating data for user accounts and mailboxes can be
determined though the business role.
NOTE: This property is available if the Business Roles Module is
installed.

Security Security code for the identity for, for example, access permission.
identification

User account Date on which to create the user account in the target system. This date
creation date should be earlier than the entry date. Use custom processes to
automatically create user accounts in One Identity Manager on this date.

Entry date Date the identity started at the company. This is filled with the current
date when the identity is added.

End date Date the identity started at the company. Enter an end date for the
identity to lock their user account at a specific point in time. The end date
is checked regularly by the schedule Lock accounts of identities that
have left the company. When the end date arrives, the identity is

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 104
Identity administration
Property Description

locked.

Company Additional information about the identity’s affiliation.


member

Temporarily Specifies whether the identity is temporarily absent from the company If
inactive this option is set, enter the time period for the temporary absence.
NOTE: Identities that are temporarily deactivated can no longer log in
to One Identity Manager.

Reason for Reason for temporarily deactivating the identity.


absence

Temporarily Date from which the employee and associated user accounts are
inactive from disabled.

Temporarily Date until which the employee and associated user accounts are
inactive until disabled. A Enable temporarily disabled accounts schedule is
implemented that monitors the end date of the temporary deactivation.
When this date is reached the identity and their user accounts are re-
enabled.

Last working Enter the date of the last working day if, for example, an identity leaves
day the company on a specific day but has access to their data until this date.
NOTE: The date of the last working day is copied to the identity’s user
accounts as the expiration date. This overwrites the existing account
expiration date.

Manager The manager of an identity can realize several tasks in


One Identity Manager such as:
l Edit main data of the identities for which they are responsible
l Certify the main data of the identities for which they are
responsible
l Attest company resources assigned to the identities for which they
are responsible
l Granting or denying approval to requests of identities in the
IT Shop for which they are responsible

Identity cannot be assigned as their own manager.

Sponsor When a new identity is added through the Web Portal, you can make
additional notes like the manager or sponsor.

Related topics
l Preparing hierarchical roles for company resource assignments on page 24
l Permanently deactivating identities on page 125
l Temporarily deactivating identities on page 124

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 105
Identity administration
Address data for identities
Enter the following data for an identity, which describes the identity's location in
the company.

Table 30: Address data

Property Description

Primary Location to which the identity is primarily assigned. The identity can obtain
location company resources through this assignment if One Identity Manager is
configured respectively.
Furthermore, IT operating data for user accounts and mailboxes can be
determined though the location.

Phone Identity's telephone number.

Mobile Identity's mobile number.


phone

Fax Identity's fax number.

Display in Specifies whether the identity are shown in the telephone book.
phone book

Street Street or road.

Building Building

Office Office mailbox.


mailbox

Zip code Zip code.

City City.

Country Country. You require this to determine the identity's language and working
hours. This data is usually stored with the identity's location or department
data. You can also enter it directly by the identity. This setting is also used
for Web Portal's display.

State State. You require this to determine the identity's language and working
hours. This data is usually stored with the identity's location or department
data. You can also enter it directly by the identity.

Floor Floor.

Room Room.

Image You can import a picture of the identity into the database. To do this, use
the button next to the picture box to browse the image to be displayed.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 106
Identity administration
Related topics
l Preparing hierarchical roles for company resource assignments on page 24
l Determining the language for identities on page 131
l Determining identities working hours on page 132

Miscellaneous main data of identities


Enter the following miscellaneous main data of an identity. This data applies to the target
system login, identity types, One Identity Manager login data, and identity import data.

Table 31: Miscellaneous main data

Property Description

Central user The identity’s central user account is used to form the user account
account login name in the active system. The central user account is still used
for logging into the One Identity Manager tools.
In One Identity Manager default installation, the central user account is
made up of the first and the last name of the identity.

Central SAP Name used to form the user account name in the SAP R/3 target
user account system. In the One Identity Manager default installation, the central
user account is made up of the first and the last name of the identity.
NOTE: This property is only available if the
SAP R/3 User Management Module is installed.

E- Name used to form the user account name in the Oracle E-


Business Suite Business Suite target system. In the One Identity Manager default
user account installation, the E-Business Suite user account is formed from the
identity's central user account.
NOTE: This property is only available if the Oracle E-Business Suite
Module is installed.

E- Unique ID for the HR person, the AP customer, the AP supplier or the


Business Suite AR parties in the Oracle E-Business Suite.
ID
NOTE: This property is only available if the Oracle E-Business Suite
Module is installed.

E- Personnel number of the HR person in the Oracle E-Business Suite.


Business Suite
NOTE: This property is only available if the Oracle E-Business Suite
personnel
Module is installed.
number

Central An identity's central password can be used for logging into the target
password and systems and for logging in to One Identity Manager. Depending on the
password configuration, an identity's central password is replicated to their user

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 107
Identity administration
Property Description

confirmation accounts and their system user password.


Use the Password Reset Portal to change the central password. For
more information, see the One Identity Manager Web Designer
Web Portal User Guide.

Decentralized Identifier of the decentralized identity to identify the identity. This


identity and identifier can be used to log in to One Identity Manager.
confirmation

Default email Default email address for setting up the identity's mailboxes in the
address individual target systems. This data is absolutely necessary for
automatically creating mailboxes. In the One Identity Manager default
installation, the default email address is composed of the identity’s
central user account and the default mail domain of the active target
system.

Identity type Type of the identity. To map the different purposes, you can
differentiate identities by identity type.
Permitted values are Primary identity, Organizational identity,
Personalized administrator identity, Sponsored identity,
Shared identity, Service identity, and Machine identity.
If the identity type is Organizational identity or Personalized
administrator identity, assign a main identity.
If the identity type is Sponsored identity Shared identity, Service
identity, or Machine identity, enable the Virtual identity option
and assign a Manager. Only the manager can initiate requests in the
IT Shop for these identities.

Main identity Reference to the main identity.


If the identity type is Organizational identity or Personalized
administrator identity, assign a main identity.

Virtual identity Specifies whether the identity represents a real identity or a virtual
identity. A virtual identity does not represent a real person.
If the identity type is Sponsored identity Shared identity, Service
identity, or Machine identity, enable this option.

Real identity If the identity is marked as virtual, You can assign an identity here that
is not labeled as a virtual identity. For example, this can be an identity
that represents a real person.

Virtual X500 Specifies whether the identity is managed as an virtual X500 identity in
identity One Identity Manager. If an identity has several X500 entries with
different properties, you can also use virtual identities here. Label the
identity with the option Virtual X500 identity for the user case and
configure a link to the real X500 identity.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 108
Identity administration
Property Description

X500 identity A virtual X500 identity have a real X500 identity assigned to it.

Logins Logins with which the identity can log in to the One Identity Manager.
Enter the login in the form: Domain\User.
This information is required if the authentication modules User
account and User account (role-based) are used for logging in to
One Identity Manager tools. For more information about
One Identity Manager authentication modules, see the
One Identity Manager Authorization and Authentication Guide.

System users System user with which the identity can log in to the
One Identity Manager administration tools. The login data is analyzed
by the authentication module in use. For more information about
One Identity Manager authentication modules, see the
One Identity Manager Authorization and Authentication Guide.

System user Identity's system user password. Password with which the identity logs
password and in to the One Identity Manager tools.
password
Use the Password Reset Portal to change the system user password.
confirmation
For more information, see the One Identity Manager Web Portal
User Guide.

User account If an identity is permitted access to the mainframe with their user
name account, enter the login name here.
(mainframe)

Notebook user Specifies whether the identity uses a notebook.

Company car Specifies whether the identity uses a company car.

Login permitted Specifies whether this identity is permitted to log in on the terminal
on terminal server with their user account.
server

Remote access Specifies whether the identity can dial in to the network with their user
permitted account.

Resetting the Specifies whether the password can be reset with the help the help
password desk. If this option is enabled, the password of the identity can be reset
through the in the Operations Support Web Portal. For more information, see the
help desk is One Identity Manager Operations Support Web Portal User Guide.
permitted.

Help desk staff Specifies whether the identity can handle help desk tickets. For more
member information about the help desk, see One Identity Manager Help Desk
Module User Guide.
NOTE: This option is only available if the Helpdesk Module is
installed.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 109
Identity administration
Property Description

Import data Target system or data source respectively, from which the identity's
source data was imported. This property is also set by scripts for automatically
assigning identities to user accounts.

Distinguished Distinguished name of the imported identity. This property should be


name set by the import.

Canonical name Fully qualified name of the imported identity. This property should be
set by the import.

Related topics
l Identity's central user account on page 98
l Identity's central password on page 99
l Identity's default email address on page 98
l Main identities and subidentities on page 97

Assigning company resources to


identities
One Identity Manager uses different assignment types to assign company resources.
l Indirect assignment
In the case of indirect assignment of company resources, identities, devices, and
workdesks are arranged in departments, cost centers, locations, business roles, or
application roles. The total of assigned company resources for an identity, device, or
workdesk is calculated from the position within the hierarchies, the direction of
inheritance (top-down or bottom-up) and the company resources assigned to these
roles. In the Indirect assignment methods a difference between primary and
secondary assignment is taken into account.
l Direct assignment
Direct assignment of company resources results from the assignment of a company
resource to an identity, device, or workdesk, for example. Direct assignment of
company resources makes it easier to react to special requirements.
l Assignment by dynamic roles
Assignment through dynamic roles is a special case of indirect assignment. Dynamic
roles are used to specify role memberships dynamically. Identities, devices, and
workdesks are not permanently assigned to a role, just when they fulfill certain
conditions. A check is performed regularly to assess which identities, devices, or
workdesks fulfill these conditions. This means the role memberships change
dynamically. For example, company resources can be assigned dynamically to all

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 110
Identity administration
identities in a department in this way; if an identity leaves the department they
immediately lose the resources assigned to them.
l Assigning through IT Shop requests
Assignment through the IT Shop is a special case of indirect assignment. Add
identities to a shop as customers so that company resources can be assigned through
IT Shop requests. All company resources assigned as product to this shop can be
requested by the customers. Requested company resources are assigned to the
identities after approval is granted. Role memberships can be requested through the
IT Shop as well as company resources.

The following table shows the possible company resources assignments to identities.
NOTE: Company resources are defined in the One Identity Manager modules and are not
available until the modules are installed.

Table 32: Possible assignments of company resources to identities

Company Resource Direct assign- Indirect Comment


ment assignment
permitted permitted

Resources + +
System roles + +
Subscribable reports + +
Software + +

Account definitions + +
Groups of custom - + All the identity's user
target systems accounts of the custom target
systems, which permit group
inheritance, are assigned to
the groups.

System entitlements of - + All the identity's custom


custom target systems target system user accounts,
which permit system
entitlement inheritance, are
assigned to the custom target
system entitlements.

Active Directory groups - + All the identity's


Active Directory user
accounts and Active Directory
contacts of the identity, which
permit group inheritance, are
assigned to the
Active Directory groups.

SharePoint groups - + All the identity's SharePoint

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 111
Identity administration
Company Resource Direct assign- Indirect Comment
ment assignment
permitted permitted

user accounts, which permit


group inheritance, are
assigned to the SharePoint
groups.

SharePoint roles - + All the identity's SharePoint


user accounts, which permit
group inheritance, are
assigned to the SharePoint
roles.

LDAP groups - + All the identity's LDAP user


accounts, which permit group
inheritance, are assigned to
the LDAP groups.

Notes groups - + All the identity's Notes user


accounts, which permit group
inheritance, are assigned to
the Notes groups.

SAP groups + + All the identity's SAP user


accounts, which are in the
same SAP client and for which
group inheritance is
permitted, are assigned to the
SAP groups.

SAP profiles + + All the identity's SAP user


accounts, which are in the
same SAP client and for which
group inheritance is
permitted, are assigned to the
SAP profiles.

SAP roles + + All the identity's SAP user


accounts, which are in the
same SAP client and for which
group inheritance is
permitted, are assigned to the
SAP roles.

Structural profiles - + All the identity's SAP user


accounts, which are in the
same SAP client and for which
group inheritance is
permitted, are assigned to the

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 112
Identity administration
Company Resource Direct assign- Indirect Comment
ment assignment
permitted permitted

structural profiles.

BI analysis - + All the identity's BI user


authorizations accounts, which permit group
inheritance, are assigned to
the BI analysis
authorizations.

E-Business Suite - + All the identity's E-


permissions Business Suite user accounts,
which are in the same E-
Business Suite system and for
which group inheritance is
permitted, are assigned to the
E-Business Suite groups.

Azure Active Directory - + All the identity's


groups Azure Active Directory user
accounts, which permit group
inheritance, are assigned to
the Azure Active Directory
groups.

Azure Active Directory - + All the identity's


administrator roles Azure Active Directory user
accounts, which permit group
inheritance, are assigned to
the Azure Active Directory
administrator roles.

Azure Active Directory - + All the identity's


subscriptions Azure Active Directory user
accounts, which permit group
inheritance, are assigned to
the Azure Active Directory
subscriptions.

Disabled - + All the identity's


Azure Active Directory Azure Active Directory user
service plans accounts, which permit group
inheritance, are assigned to
the disabled
Azure Active Directory service
plans.

Unix groups - + All the identity's Unix user

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 113
Identity administration
Company Resource Direct assign- Indirect Comment
ment assignment
permitted permitted

accounts, which permit group


inheritance, are assigned to
the Unix groups.

PAM user groups - + All the identity's PAM user


accounts, which permit group
inheritance, are assigned to
the PAM user groups.

SharePoint Online - + All the identity's


groups SharePoint Online user
accounts, which permit group
inheritance, are assigned to
the SharePoint Online groups.

SharePoint Online roles - + All the identity's


SharePoint Online user
accounts, which permit group
inheritance, are assigned to
the SharePoint Online roles.

Google Workspace - + All the identity's


products and SKUs Google Workspace user
accounts, which permit group
inheritance, are assigned to
the Google Workspace
products and SKUs.

Google Workspace - + All the identity's


groups Google Workspace user
accounts, which permit group
inheritance, are assigned to
the Google Workspace
groups.

Cloud groups - + All the identity's cloud user


accounts, which permit group
inheritance, are assigned to
the cloud groups.

Cloud system - + All the identity's cloud user


entitlements accounts, which permit
system entitlement
inheritance, are assigned to
the cloud system
entitlements.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 114
Identity administration
Company Resource Direct assign- Indirect Comment
ment assignment
permitted permitted

OneLogin roles - + All the identity's OneLogin


user accounts that permit
group inheritance, are
assigned to OneLogin roles.

Detailed information about this topic


l Basic principles for assigning company resources on page 15
l Permitting assignments of identities, devices, workdesks, and company resources to
roles on page 29

Related topics
l Possible assignments of company resources through roles on page 25
l Assigning identities to departments, cost centers, and locations on page 115
l Assigning identities to business roles on page 116
l Assigning identities, devices, and workdesks to departments, cost centers, and
locations on page 82
l Assigning company resources to departments, cost centers, and locations on page 83
l Dynamic roles on page 35

Assigning identities to departments, cost


centers, and locations
Assign the identity to departments, cost centers, and locations so identities obtain their
company resources through these organizations. To assign company resources to
departments, cost centers, and locations, use the appropriate organization tasks.

To assign an identity to departments, cost centers, and locations (secondary


assignment; default method)

1. In the Manager, select the Identities > Identities category.


2. Select the identity in the result list.
3. Select the Assign organizations task.
4. In the Add assignments pane, assign the organizations:
l On the Departments tab, assign departments.
l On the Locations tab, assign locations.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 115
Identity administration
l On the Cost centers tab, assign cost centers.
TIP: In the Remove assignments pane, you can remove assigned organizations.

To remove an assignment
l Select the organization and double-click .
5. Save the changes.

To assign an identity to departments, cost centers, and locations (primary


assignment)

1. In the Manager, select the Identities > Identities category.


2. Select the identity in the result list.
3. Select the Change main data task.
4. Adjust the following main data on the Organizational tab.
l Primary department
l Primary cost center
l Primary location
5. Save the changes.

Related topics
l Assigning company resources to identities on page 110
l Assigning company resources to departments, cost centers, and locations on page 83
l Dynamic roles on page 35
l Adding identities to IT Shop custom nodes on page 117
l Assigning identities to business roles on page 116
l Assigning identities, devices, and workdesks to departments, cost centers, and
locations on page 82

Assigning identities to business roles


NOTE: This function is only available if the Business Roles Module is installed.
Assign identities to business roles so that identities obtain their company resources through
these business roles. To assign company resources to business roles use the corresponding
business role tasks. For more information about working with business roles, see the
One Identity Manager Business Roles Administration Guide.

To assign an identity to business roles (secondary assignment; default method)

1. In the Manager, select the Identities > Identities category.


2. Select the identity in the result list.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 116
Identity administration
3. Select the Assign business roles task.
4. In the Add assignments pane, select the role class and assign business roles.
TIP: In the Remove assignments pane, you can remove assigned business roles.

To remove an assignment
l Select the business role and double-click .
5. Save the changes.

To assign an identity to business roles (primary assignment)

1. In the Manager, select the Identities > Identities category.


2. Select the identity in the result list.
3. Select the Change main data task.
4. On the Organizational tab, enter the primary business role.
5. Save the changes.

Related topics
l Assigning company resources to identities on page 110

Adding identities to IT Shop custom nodes


When identities are added to a custom node they are entitled to make IT Shop requests.
Access permissions to the IT Shop and the assignments allocated to them through product
requests in the IT Shop are displayed on the identity’s overview. For more information, see
the One Identity Manager IT Shop Administration Guide.

To add an identity to the IT Shop

1. In the Manager, select the Identities > Identities category.


2. Select the identity in the result list.
3. Select the Assign IT Shop memberships task.
4. In the Add assignments pane, assign custom nodes.
- OR -
In the Remove assignments pane, remove the custom nodes.
5. Save the changes.

Assigning application roles to identities


For more information about implementing and editing application roles, see the
One Identity Manager Authorization and Authentication Guide.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 117
Identity administration
Assigned identities obtain all the permissions of the permission group to which the
application role (or a parent application role) is assigned. In addition, identities obtain the
company resources assigned to the application role.
If there are no identities directly assigned to an application role, the identities of the parent
application role inherit the permissions.
NOTE: The application roles for Base roles | Everyone (Change), Base roles |
Everyone (Lookup), Base roles | Identity Managers, and Base roles | Birthright
Assignments are automatically assigned to identities. Do not make any manually assign-
ments to these application roles.

To assign application to an identity

1. In the Manager, select the Identities > Identities category.


2. Select the identity in the result list.
3. Select the Assign One Identity Manager application roles task.
4. In the Add assignments pane, assign the application roles.
TIP: In the Remove assignments pane, you can remove application role
assignments.

To remove an assignment
l Select the application role and double-click .
5. Save the changes.

Assigning resources directly to identities


Resources can be assigned directly or indirectly to identities. Indirect assignment is carried
out by allocating identities and resources in company structures, like departments, cost
centers, locations, or business roles.
To react quickly to special requests, you can assign resources directly to an identity.

To assign resources directly to an identity

1. In the Manager, select the Identities > Identities category.


2. Select the identity to whom the resources will be assigned, from the result list.
3. Select the Assign resources task.
4. In the Add assignments pane, assign resources.
TIP: In Remove assignments, you can remove assigned resources.

To remove an assignment
l Select the resource and double-click .
5. Save the changes.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 118
Identity administration
Related topics
l Assigning resources directly to identities on page 198
l Managing resources on page 191

Assigning system roles directly to identities


NOTE: This function is only available if the System Roles Module is installed.
System roles can be assigned directly or indirectly to identities. Indirect assignment is
carried out by allocating the identities and system roles in company structures, such as
departments, cost centers, locations, or business roles. For more information about
working with system roles, see the One Identity Manager System Roles
Administration Guide.
To react quickly to special requests, you can assign system roles directly to an identity.

To assign system roles directly to an identity

1. In the Manager, select the Identities > Identities category.


2. Select the identity in the result list.
3. Select the Assign system roles task.
4. In the Add assignments pane, assign system roles.
TIP: In the Remove assignments pane, you can remove assigned system roles.

To remove an assignment
l Select the system role and double-click .
5. Save the changes.

Assigning subscribable reports directly to


identities
NOTE: This function is only available if the Report Subscription Module is installed.
You can assign subscribable reports directly or indirectly to identities. Indirect assignment
is carried out by assigning the identity and subscribable report to company structures, like
departments, cost centers, locations, or business roles. For more information about
subscribable reports, see the One Identity Manager Report Subscriptions
Administration Guide.
In order to react quickly to special requests, you can also assign subscribable reports
directly to identities.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 119
Identity administration
To assign user accounts to an identity

1. In the Manager, select the Identities > Identities category.


2. Select the identity in the result list.
3. Select the Assign subscribable reports task.
4. In the Add assignments pane, assign reports.
TIP: In the Remove assignments pane, you can remove report assignments.

To remove an assignment
l Select the report and double-click .
5. Save the changes.

Assigning software directly to identities


NOTE: This function is only available if the Software Management Module is installed.
You can assign software directly or indirectly to identities. Indirect assignment is carried
out by allocating identities and software in company structures, like departments, cost
centers, locations, or business roles. For more information about working with software,
see the One Identity Manager Software Management Administration Guide.
To react quickly to special requests, you can assign software directly to an identity.

To assign software directly to an identity

1. In the Manager, select the Identities > Identities category.


2. Select the identity to whom the software will be assigned, from the result list.
3. Select the Assign software task.
4. In the Add assignments pane, assign software.
TIP: In the Remove assignments pane, you can remove assigned software.

To remove an assignment
l Select the software and double-click .
5. Save the changes.

Displaying the origin of identities' roles


and entitlements
The Show entitlements origin report allows you to determine which entitlements an
identity owns and where they come from. You can establish whether the identity obtained
an entitlements directly or indirectly. For example, in the case of an indirect assignment,

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 120
Identity administration
you can determine whether the entitlement resulted from a department memberships or a
request,
You can also use the report to discover which departments, cost centers, locations, and
business roles are assigned to an identity and how the membership evolved.

To use the origin report


l In the Designer, set the SysConfig | Display | SourceDetective configuration
parameter and compile the database.
NOTE: If you disable the configuration parameter at a later date, model compon-
ents and scripts that are no longer required, are disabled. SQL procedures and
triggers are still carried out. For more information about the behavior of prepro-
cessor relevant configuration parameters and conditional compiling, see the
One Identity Manager Configuration Guide.

To display the origin of an identity's entitlements

1. In the Manager, select the Identities > Identities category.


2. Select an identity in the result list and run the Show entitlements origin report.
3. Under Assigned objects, you will see the identity's entitlements, departments, cost
centers, locations, and business roles. Select an entry by double-clicking on it to view
more details.
4. The Origin area displays the details for the selected entry in a hierarchical structure.
You can display whether the assignment was a direct assignment, dynamic
assignment, or a request.
l You can use the Details button to switch to the dynamic role or to the request.
l Double-click on some of the entries in the detail view to go to the object.
l Choose the Inspect button for further information about the assignment of
authorizations.

Example: Report on an entitlement's origin

The Show entitlements origin report establishes that Jo User1 is assigned to the
Active Directory "Finance" group.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 121
Identity administration
The report answers several questions.

Question Why does Jo User1 have the Active Directory group?


Answer Jo User1 owns an Active Directory user account and this user account
is assigned to the "Finance" group.

Question Why is the user account assigned to the "Finance" group?


Answer Jo User1 is assigned to the "Finance" department.

The "Finance" department inherits from the "Global Finance"


department. The "Global Finance" department is directly assigned to
the "Finance" group.

Question Why is Jo User1 in the "Finance" department?


Answer There is a department membership request for Jo User1.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 122
Identity administration
Analyzing role memberships and
identity assignments
The Overview of all assignments report is displayed for some objects, such as
authorizations, compliance rules, or roles. The report finds all the roles, for example,
departments, cost centers, locations, business roles, and IT Shop structures in which there
are identities who own the selected base object. In this case, direct as well as indirect base
object assignments are included.

Example:
l If the report is created for a resource, all roles are determined in which there
are identities with this resource.
l If the report is created for a group or another system entitlement, all roles are
determined in which there are identities with this group or system entitlement.
l If the report is created for a compliance rule, all roles are determined in which
there are identities who violate this compliance rule.
l If the report is created for a department, all roles are determined in which
identities of the selected department are also members.
l If the report is created for a business role, all roles are determined in which
identities of the selected business role are also members.

To display detailed information about assignments


l To display the report, select the base object from the navigation or the result list and
select the Overview of all assignments report.
l Click the Used by button in the report toolbar to select the role class for which
you want to determine whether roles exist that contain identities with the selected
base object.
All the roles of the selected role class are shown. The color coding of elements
identifies the role in which there are identities with the selected base object. The
meaning of the report control elements is explained in a separate legend. To access
the legend, click the icon in the report's toolbar.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 123
Identity administration
l Double-click a control to show all child roles belonging to the selected role.
l By clicking the button in a role's control, you display all identities in the role with
the base object.
l Use the small arrow next to to start a wizard that allows you to bookmark this
list of identities for tracking. This creates a new business role to which the identities
are assigned.

Figure 13: Toolbar of the Overview of all assignments report.

Table 33: Meaning of icons in the report toolbar

Icon Meaning

Show the legend with the meaning of the report control elements

Saves the current report view as a graphic.

Selects the role class used to generate the report.

Displays all roles or only the affected roles.

Deactivating and deleting identities


How identities are handled, particularly in the case of permanent or partial withdrawal of an
identity, varies between individual companies. There are companies that never delete
identities, and only deactivate them when they leave the company.

Detailed information about this topic


l Temporarily deactivating identities on page 124
l Permanently deactivating identities on page 125
l Reactivate permanently deactivated identities on page 126
l Deferred deletion of identities on page 127

Temporarily deactivating identities


NOTE: Identities that are temporarily deactivated can no longer log in to
One Identity Manager.
The identity has temporarily left the company and is expected to return at a predefined
date. The desired course of action could be to disable the user account and remove all

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 124
Identity administration
group memberships. Or the user accounts could be deleted and restored on reentry even if
it is with a new system identification number (SID).
Temporary deactivation of an identity is triggered by:
l The Temporarily inactive option
l The start and end date for deactivation (Temporarily inactive from and
Temporarily inactive until)

NOTE:
l Configure the Lock accounts of identities that have left the company
schedule in the Designer. This schedule checks the start date for deactivating and
sets the Temporarily inactive option when it is reached.
l In the Designer, configure the Enable temporarily disabled accounts schedule.
This schedule monitors the end date of the inactive period and activates the
identity with their user accounts when the period expires. Identity's user accounts
that were disabled before the period of temporary absence are also re-enabled
once the period has expired.

Related topics
l Permanently deactivating identities on page 125
l Deferred deletion of identities on page 127

Permanently deactivating identities


NOTE: Identities that are permanently deactivated can no longer log in to
One Identity Manager.
Identities can be deactivated permanently when, for example, they leave the company. It
might be necessary, to remove access to this identity's entitlements in connected target
systems and their company resources.
Effects of permanent deactivating an identity are:
l The identity cannot be assigned to identities as a manager.
l The identity cannot be assigned to roles as a supervisor.
l The identity cannot be assigned to attestation policies as an owner.
l There is no inheritance of company resources through roles, if the additional No
inheritance option is set for an identity.
l The identity's user accounts are locked or deleted and then removed from group
memberships.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 125
Identity administration
Permanent deactivation of an identity is triggered by:
l The Deactivate identity permanently task
This task ensures that the Permanently deactivates option is enabled and the
leaving date and last working day are set to the current date.
l The leaving date is reached
NOTE:
l In the Designer, check the Lock accounts of identities that have left the
company schedule. This schedule regularly checks the leaving date and sets
the Permanently deactivated option on reaching the date.
l The Re-enable identity task ensures that the identity is re-enabled.
l The Denied certification status
If an identity's certification status is set to Denied manually or as a result of
attestation, the identity is immediately deactivated permanently. If the identity's
certification status is changed to Certified, the identity is activated again.
NOTE: This function is only available if the Attestation Module is installed.

Related topics
l Temporarily deactivating identities on page 124
l Deferred deletion of identities on page 127
l Reactivate permanently deactivated identities on page 126
l Changing the certification status of identities on page 128

Reactivate permanently deactivated


identities
Identities that are permanently deactivated can be re-enabled if they were not disabled by
certification.

To reactivate an identity

1. In the Manager, select the Identities > Inactive identities category.


2. Select the identity in the result list.
3. Select the Reactivate identity task.
4. Confirm the security prompt with Yes if the identity should be enabled.
On the main data form for the identity, the Permanently deactivated option is not
set. The end date and last working day are deleted assuming the dates are past.
5. Save the changes.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 126
Identity administration
Related topics
l Permanently deactivating identities on page 125

Deferred deletion of identities


When an identity is deleted, it is tested to see if user accounts and company resources are
still assigned, or if there are still any requests pending in the IT Shop. The identity is
marked for deletion and therefore locked out of further processing.
By default, identities are finally deleted from the database after 30 days. During this
period it is possible to re-activate the identity. A restore is not possible once deferred
deletion has expired.
In the Designer, you can set an alternative delay on the Person table. For more information
on configuring the deferred deletion, refer to the One Identity Manager
Configuration Guide.
Before an identity can finally be deleted from the One Identity Manager database, you need
to delete all company resource assignments and close all requests. You can do this
manually or implement custom processes to do it.
All the user accounts linked to an identity could be deleted by default by
One Identity Manager once this identity has been deleted. If no more company resources
are assigned, the identity is deleted permanently. For more information, see the
One Identity Manager Target System Base Module Administration Guide.

Related topics
l Temporarily deactivating identities on page 124
l Permanently deactivating identities on page 125

Deleting all personal data


A procedure called QER_PPersonDelete_GDPR is provided to support the special process for
deleting personal data, which implements the General Data Protection Regulation (GDPR)
of the European Union. You can use this procedure to delete all data relating to a
person from the One Identity Manager database. For certain dependencies, processes that
are handled by the One Identity Manager Service are created by the procedure.
NOTE: While this procedure is running, the database does not allow any triggers.
Therefore, it is recommended to only run the procedure in maintenance periods.
You can run the procedure in any program suitable for running SQL queries.
Calling syntax:
exec QER_PPersonDelete_GDPR ' <identity UID from Person table, UID_Person column>'

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 127
Identity administration
NOTE: Personal data may be subject to further regulations such as legal retention
periods. Personal data from the One Identity Manager History Database is not automat-
ically deleted by default because of this. It is recommended to operate
One Identity Manager History Databases that correspond to the report periods. After a
specified reporting period has expired, you can set up a new One Identity Manager
History Database. You set up custom processes for deleting personal data.

Limited access to One Identity Manager


NOTE: This function is only available if the Attestation Module is installed.
Users who only have temporary or limited access to the One Identity Manager can log in
through the Web Portal. This functionality can be used, for example, if external employees,
such as contract workers, should be provided with temporary access to the
One Identity Manager. These identity can log in to the Web Portal as new workers. New
identities are added for them in the One Identity Manager database.
If you make use of this functionality, take note of the following:
l In One Identity Manager, an identity with the following properties is created:
l Certification status: New
l Permanently deactivated: Set
l No inheritance: Set
l If the QER | Attestation | UserApproval configuration parameter is set, the new
identity is attested automatically.
l To assign company resources to the identity or to ensure permissions in
One Identity Manager, implement custom processes.

For more information about attestation, see the One Identity Manager Attestation
Administration Guide.

Related topics
l Changing the certification status of identities on page 128

Changing the certification status of


identities
NOTE: This function is only available if the Attestation Module is installed.
Identity's certification status is set by default through certification and recertification
procedures. For more information, see the One Identity Manager Attestation
Administration Guide.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 128
Identity administration
You can manually change an identity's certification status if it is necessary to do so outside
the regular recertification schedule.

Prerequisite
l The QER | Attestation | UserApproval configuration parameter is set.

To change an identity's certification status manually

1. To change the certification status of an active identity, in the Manager, select the
Identities > Identities. category.
- OR -
To change the certification status of a permanently deactivated identity, in the
Manager, select the Identities > Inactive identities category.
2. Select the identity in the result list.
3. Select the Change certification status task.
4. Select the certification status you want from the Certification status menu.
5. Click OK to accept the changes.
The new certification status for the identity is displayed on the form.
NOTE: The Permanently deactivated option is updated depending on the
certification status. If an identity's certification status is set to Denied manually
or as a result of attestation, the identity is immediately deactivated permanently.
If the identity's certification status is changed to Certified, the identity is
activated again.

Related topics
l Limited access to One Identity Manager on page 128
l Permanently deactivating identities on page 125

Displaying the identities overview


Use this task to obtain an overview of the most important information about an identity.

To obtain an overview of an identity

1. In the Manager, select the Identities > Identities category.


2. Select the identity in the result list.
3. Select the Identity overview task.
The most important information about an identity is shown on this form, including the
identity's contact data, user accounts, and affiliation to company structures. The

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 129
Identity administration
assigned company resources and access to IT Shop structures and IT Shop requests
are displayed.
The identity's responsibilities within the One Identity Manager are displayed on the
form. This includes the application roles that an identity has been assigned within the
One Identity Manager and the functions as department manager, cost center
manager, or approver within the IT Shop.
4. Select the Identity entitlements overview task.
This form shows the system entitlements and all the target system groups allocated
to an identity.

Displaying and deleting identities'


Webauthn security keys
One Identity offers users the option to log in, simply and securely, to One Identity Manager
web applications with help of (physical) security keys. These security keys support the W3C
standard WebAuthn.
For more information about using security keys in the Web Portal, see the
One Identity Manager Web Portal User Guide. For more about configuring this method, see
the One Identity Manager Web Application Configuration Guide.
As identity administrator, you can view identities' security keys and delete them if
necessary.

To display an identity's security key

1. In the Manager, select the Identities > Identities category.


2. Select the identity in the result list.
3. Select the Show webauthn security keys task.
This shows all the identity's security keys.
4. Select one of the security keys in the list to show its details.

To delete an identity's security key

1. In the Manager, select the Identities > Identities category.


2. Select the identity in the result list.
3. Select the Show webauthn security keys task.
4. Select the security in the list and click Remove.
5. Save the changes.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 130
Identity administration
Determining the language for identities
In order for email notifications within the request process in the IT Shop or during
attestation to be sent in the recipients language, the identity's language has to be
determined.
l States and countries and their languages already exist in the One Identity Manager
default installation. Verify and edit this information in the Designer. For more
information, see the One Identity Manager Configuration Guide.
l Add the country and state of the primary location to the primary department, the
primary cost center, the primary business role, or directly to the identity. To map
special cases, you can also add the language directly to the location, department,
cost center, or identity.

An identity’s language is determined in the following order:

1. Language that is directly assigned to the identity.


2. Language of the identity's state.
3. Language of the identity's country.
4. Language directly assigned to the identity's location.
5. Language of the primary location's state.
6. Language of the primary location's country.
7. Language directly assigned to the identity's primary department.
8. Language of the primary department's state.
9. Language of the primary department's country.
10. Language of the primary department's country.
11. Language of the primary cost center's state.
12. Language of the primary cost center's country.
13. Language directly assigned to an identity's primary business role
14. Language of the primary business role's state.
15. Language of the primary business role's country.
16. Fallback, in case the language could not be determined with this sequence:
a. Language from the Common | MailNotification | DefaultCulture
configuration parameter.
b. Language en-US.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 131
Identity administration
Determining identities working hours
An identity's working hours need to be made public in order to determine the reaction times
of approvers or attestors to request processes in the IT Shop or during attestation.
l States and countries and their time zones, public holidays, and standard working
hours already exist in One Identity Manager. Verify and edit this information in the
Designer. For more information, see the One Identity Manager Configuration Guide.
l The identity's location (state or country) must be determined so that the working
hours can be calculated correctly. Add the country and state to the primary location,
the primary department, the primary cost center, the primary business role, or
directly to the identity.
l The correct working hours are subsequently calculated. The standard working hours
in the country, rule for weekends and holidays, as well as different time zones and
daylight-saving rules, are taken into account when the hours are calculated.

The identity's location and therefore valid working hours, are determined in the
following order:

1. State that is directly assigned to the identity.


2. Country that is directly assigned to the identity.
3. State of primary location.
4. Country of primary location.
5. State of primary department.
6. Country of primary department.
7. State of primary cost center.
8. Country of primary cost center.
9. State of primary business role.
10. Country of primary business role.
11. Fallback, in case the location could not be determined with this sequence:
a. State or country using the secondary location, department, or cost center.
b. First country from all enabled countries in the database sorted by
telephone number
c. Country entered as default in the database ( DialogDatabase table, UID_
DialogCountryDefault column).
For more information, see the One Identity Manager Configuration Guide.
d. Country USA.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 132
Identity administration
Manually assigning user accounts to
identities
An identity's overview form shows all the user accounts the identity has in each target
system. You should use account definitions as the default method for creating user
accounts. For more information about account definitions, see the One Identity Manager
Target System Base Module Administration Guide.
To react quickly to special requests, you can use the relevant tasks for assigning user
accounts to manually assign a user account for an identity.
NOTE: The tasks for manually assigning user accounts to persons are defined in the
One Identity Manager modules and are only available when the modules have been
installed. For more information, see the target system guides.

Related topics
l Displaying the identities overview on page 129

Entering tickets for identities


NOTE: This function is only available if the Helpdesk Module is installed.
Enter the tickets for identities through the Helpdesk Module. For more information about
the help desk, see One Identity Manager Help Desk Module User Guide.

To enter help desk data for an identity

1. In the Manager, select the Identities > Identities category.


2. Select the identity in the result list.
3. Select the Show tickets task to display tickets entered for an identity task.
4. Select the New ticket task, to enter a new ticket.
5. Save the changes.

Assigning extended properties to


identities
Extended properties are meta objects, such as operating codes, cost codes, or cost
accounting areas that cannot be mapped directly in One Identity Manager.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 133
Identity administration
To specify extended properties for a group

1. In the Manager, select the Identities > Identities category.


2. Select the identity in the result list.
3. Select the Assign extended properties task.
4. In the Add assignments pane, assign extended properties.
TIP: In the Remove assignments pane, you can remove assigned extended
properties.

To remove an assignment
l Select the extended property and double-click .
5. Save the changes.

Related topics
l Creating and editing extended properties on page 208

Reports about identities


One Identity Manager makes various reports available containing information about the
selected base object and its relations to other One Identity Manager database [Link]
following reports are available for identities.
NOTE: Other sections may be available depending on the which modules are installed.

Table 34: Reports about identities

Report Description

Entitlement The report shows an identity's entitlements and roles and the possible
Origins assignment methods.

Request The report provides you with an overview of each IT Shop request made
history by an identity. The report is divided into approved, canceled, denied, and
pending requests. You can trace when and why each product was
requested, renewed, or unsubscribed.
View completed requests by clicking on Show. In the approval history
you can see the approval workflow, the results of each approval step and
the approver. The Show button shows you the current approval status of
pending requests.

Data quality This report evaluates the data quality of identity data. All identities under
of direct supervision are taken into account.
reports

Identities per This report contains the number of identity per department. The primary

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 134
Identity administration
Report Description

department and secondary assignments to organizations are taken into account. You
can find this report in My One Identity Manager.

Identities per This report contains the number of identity per cost center. The primary
cost center and secondary assignments to organizations are taken into account. You
can find this report in My One Identity Manager.

Identities per This report contains the number of identity per location. The primary and
location secondary assignments to organizations are taken into account. You can
find this report in My One Identity Manager.

Data quality The report contains different analyzes of data quality for all identities.
summary for You can find this report in My One Identity Manager.
identity data

Access This report contains detailed information about personal and


overview at organizational data as well as an overview of the company resources that
specific point- the identity owned at a specific point-in-time. This includes all assigned
in-time user accounts, system entitlements, roles, account definitions,
resources, and software.

Attestation The report shows closed and pending attestation cases for which the
cases identity was identified as the attestor. If the identity is logged in to the
Manager, they can use the report to grant or deny attestation case
approval. Use Approve or Deny to grant or deny approval. Enter the
reason in Approval reason and click on the Carry out approval
button. If a report has been defined for the attestation instance, you can
view it using the Show report button in the column.
Use the Show attestation history task to display each step in the
attestation case. This allows you to track the chronological sequence and
approvals in the attestation case. The attestation history is displayed for
pending and closed attestations.
NOTE: This report is available if the Attestation Module exists.

Overview with The report contains detailed information about personal and
roles and user organizational data as well as user accounts, roles, and entitlements
accounts currently assigned to the identity.
You can decide whether to include dependent identities in the report.

Overview with The report contains detailed information about personal and
roles and user organizational data as well as user accounts, roles, and entitlements
accounts currently assigned to the identity including historical data.
(including
Select the end date for displaying the history (Min. date). Older changes
history)
and assignments that were removed before this date, are not shown in
the report.
You can decide whether to include dependent identities in the report.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 135
Identity administration
Report Description

NOTE: This report is available if the Target System Base Module exists.

Direct reports The report shows all identities that report directly. This displays detailed
overview information about personal and organizational data as well as current
user accounts, roles, and entitlements.
NOTE: This report is available if the Target System Base Module exists.

Direct reports All identities that report directly including the history. This shows detailed
overview information about personal and organizational data as well as current
(including user accounts, roles, and entitlements including the historical data.
history)
Select the end date for displaying the history (Min. date). Older changes
and assignments that were removed before this date, are not shown in
the report.

Show user This report returns all the user accounts with their permissions including
accounts a history.
overview
Select the end date for displaying the history (Min. date). Older changes
(including
and assignments that were removed before this date, are not shown in
history)
the report.
NOTE: This report is available if the Target System Base Module exists.

User accounts This report returns all the user accounts with their permissions including
of direct a history.
reports
Select the end date for displaying the history (Min. date). Older changes
(including
and assignments that were removed before this date, are not shown in
history)
the report.
NOTE: This report is available if the Target System Base Module exists.

Show owned This report shows the system entitlements with the assigned user
system accounts including a history.
entitlements
Select the end date for displaying the history (Min. date). Older changes
(incl. history)
and assignments that were removed before this date, are not shown in
the report.
NOTE: This report is available if the Target System Base Module exists.

Overview of The report contains detailed information about personal and


identity's organizational data as well as the identity's current privileged access.
privileged
NOTE: This report is available if the Privileged Account Governance
access.
Module exists.

Related topics
l Displaying the origin of identities' roles and entitlements on page 120
l Analyzing role memberships and identity assignments on page 123

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 136
Identity administration
Basic configuration data for identities
The following basic configuration data is required for managing identities.
l Configuration parameter
Use configuration parameters to configure the behavior of the system's basic
settings. One Identity Manager provides default settings for various configuration
parameters. Check the configuration parameters and modify them as necessary to
suit your requirements.
Configuration parameters are defined in the One Identity Manager modules. Each
One Identity Manager module can also install configuration parameters. In the
Designer, you can find an overview of all configuration parameters in the Base data
> General > Configuration parameters category.
l Business partners
When external identities are entered into the system, a company must be named.
l Mail templates
The login data for new user accounts in a target system can be sent to a specified
identity by email. In this case, two messages are sent with the user name and the
initial password. Mail templates are used to generate the messages.
l Password policy
An identity's central password is formed from the target system specific user
accounts by respective configuration. The Password policy for central password
of identities password policy defines the settings for the central password.

Detailed information about this topic


l Creating and editing business partners for external identities on page 137
l Mail templates for notifications about identities on page 139
l Password policies for identities on page 142
l Configuration parameters for managing identities on page 215

Creating and editing business partners for


external identities
To manage external identities you require information about the business partner. Enter
data for the external company.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 137
Identity administration
To create a business partner

1. In the Manager, select the Identities > Basic configuration data > Business
partners category.
2. Click in the result list.
3. On the main data form, edit the main data of the company.
4. Save the changes.

To edit the main data of a business partner

1. In the Manager, select the Identities > Basic configuration data > Business
partners category.
2. In the result list, select a company and run the Change main data task.
3. Edit the business partner's main data.
4. Save the changes.

Enter the following data for a company.

Table 35: General main data of a company

Property Description

Company Short description of the company for the views in


One Identity Manager tools.

Name Full company name.

Surname prefix Additional company name.

Short name Company's short name.

Contact Contact person for the company.

Partner Specifies whether this is a partner company.

Customer Customer number at the partner company.


number

Supplier Specifies whether this is a supplier.

Customer Customers number at supplier.


number

Leasing partner Specifies whether this is a leasing provider or rental firm.

Manufacturer Specifies whether this is a manufacturer.

Remarks Text field for additional explanation.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 138
Identity administration
Table 36: Company address

Property Description

Street Street or road.

Building Building

Zip code Zip code.

City City.

State State.

Country Country.

Phone Company's telephone number.

Fax Company's fax number.

Email Company's email address.


address

Website Company's website. Click the button to display the web page in the
default web browser.

Mail templates for notifications about


identities
One Identity Manager supplies mail templates by default. These mail templates are
available in English and German. If you require the mail body in other languages, you can
add mail definitions for these languages to the default mail template.

To edit a default mail template


l In the Manager, select the Identities > Basic configuration data > Mail
templates > Predefined category.

Related topics
l Creating and editing mail definitions for identities on page 139
l Base objects for mail templates about identities on page 140
l Editing mail templates for identities on page 141

Creating and editing mail definitions for identities


For more information about creating and editing mail template, see the
One Identity Manager Operational Guide.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 139
Identity administration
Mail texts can be defined in these different languages in a mail template. This ensures that
the language of the recipient is taken into account when the email is generated.

To create a new mail definition

1. In the Manager, select the Identities > Basic configuration data > Mail
templates category.

2. Select a mail template in the result list and run the Change main data task.
3. In the result list, select the language for the mail definition in the Language menu.
All active languages are shown. To use another language, in the Designer, enable the
corresponding countries. For more information, see the One Identity Manager
Configuration Guide.
4. Enter the subject in Subject.
5. Edit the mail text in the Mail definition view with the help of the Mail Text Editor.
6. Save the changes.

To edit an existing mail definition

1. In the Manager, select the Identities > Basic configuration data > Mail
templates category.

1. Select a mail template in the result list and run the Change main data task.
2. In the Mail definition menu, select the language for the mail definition.
NOTE: If the Common | MailNotification | DefaultCulture configuration
parameter is set, the mail definition is loaded in the default language for email
notifications when the template is opened.
3. Edit the mail subject line and the body text.
4. Save the changes.

Related topics
l Base objects for mail templates about identities on page 140

Base objects for mail templates about identities


Entering a base object in a mail template is only required if properties of the base object
are referenced in the mail definition.
In the subject line and body text of a mail definition, you can use all properties of the object
entered under Base object. You can also use the object properties that are referenced by
foreign key relation.
To access properties use dollar notation. For more information, see the
One Identity Manager Configuration Guide.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 140
Identity administration
Related topics
l Creating and editing mail definitions for identities on page 139
l Editing mail templates for identities on page 141

Editing mail templates for identities


For more information about creating and editing mail template, see the
One Identity Manager Operational Guide.
A mail template consists of general main data such as target format, importance, or mail
notification confidentiality, and one or more mail definitions. Mail text is defined in several
languages in the mail template. This ensures that the language of the recipient is taken into
account when the email is generated.

To create and edit mail templates

1. In the Manager, select the Identities > Basic configuration data > Mail
templates category.

2. Select a mail template in the result list and run the Change main data task.
- OR -
Click in the result list.
This opens the mail template editor.
3. Edit the mail template.
4. Save the changes.

To copy a mail template

1. In the Manager, select the Identities > Basic configuration data > Mail
templates category.

2. Select the mail template that you want to copy in the result list and run the Change
main data task.
3. Select the Copy mail template task.
4. Enter the name of the new mail template in the Name of copy field.
5. Click OK.

To display a mail template preview

1. In the Manager, select the Identities > Basic configuration data > Mail
templates category.

2. Select a mail template in the result list and run the Change main data task.
3. Select the Preview task.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 141
Identity administration
4. Select the base object.
5. Click OK.

To delete a mail template

1. In the Manager, select the Identities > Basic configuration data > Mail
templates category.

2. Select the template in the result list.


3. Click in the result list.
4. Confirm the security prompt with Yes.

Related topics
l Creating and editing mail definitions for identities on page 139

Password policies for identities


One Identity Manager provides you with support for creating complex password policies,
for example, for system user passwords, the identities' central password as well as
passwords for individual target systems. Password polices apply not only when the user
enters a password but also when random passwords are generated.
Predefined password policies are supplied with the default installation that you can use or
customize if required. You can also define your own password policies.

Detailed information about this topic


l Predefined password policies on page 142
l Applying identity password policies on page 143
l Creating password policies for identities on page 146
l Custom scripts for password requirements on page 150
l Defining the excluded list for passwords on page 153
l Checking identity passwords on page 153
l Generating passwords for testing identities on page 153
l Informing identities about expiring passwords on page 154

Predefined password policies


You can customize predefined password policies to meet your own requirements if
necessary.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 142
Identity administration
Password for logging in to One Identity Manager

The One Identity Manager password policy is applied for logging in to


One Identity Manager. This password policy defines the settings for the system user
passwords ([Link] and [Link]) as well as the passcode
for a one time log in on the Web Portal ([Link]).
NOTE: The One Identity Manager password policy is marked as the default policy.
This password policy is applied if no other password policy can be found for identities,
user accounts, or system users.

Password policy for forming identities' central passwords

An identity's central password is formed from the target system specific user accounts by
respective configuration. The Identity central password policy defines the settings for
the ([Link]) central password. Members of the Identity Management |
Identities | Administrators application role can adjust this password policy.
IMPORTANT: Ensure that the Identity central password policy does not violate the
target system-specific requirements for passwords.

Password policies for user accounts

Predefined password policies are provided, which you can apply to the user account
password columns of the user accounts. You can define password policies for user
accounts for various base objects, for example, for account definitions, manage levels, or
target systems.
For more information about password policies for user accounts, see the administration
guides of the target systems.

Related topics
l Identity's central password on page 99

Applying identity password policies


The One Identity Manager password policy and Identity central password policy
are predefined password policies for identities' central passwords.
You can assign custom password policies to identities' password columns. You can also
assign the password policies to departments, cost centers, locations, or business roles, and
therefore apply password policies depending on the identities' organizational classification.
Which password policy is applied to an identity is determined in the following order:

1. Password policy of the identity's primary business role


2. Password policy of the identity's primary department
3. Password policy of the identity's primary location

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 143
Identity administration
4. Password policy of the identity's primary cost center
5. General password policy for identities' passwords
6. The One Identity Manager password policy (default policy)

Related topics
l Predefined password policies on page 142
l Changing the password policy for password columns on page 144
l Assigning password policies to departments, cost centers, locations, and business
roles on page 144

Changing the password policy for password


columns
If you do not want to apply the predefined password policy to the password column of
identities, change the password policy assignment to the base object in the Manager.

To change a password policy's assignment

1. In the Manager, select the Identities > Basic configuration data > Password
policies category.
2. Select the password policy in the result list.
3. Select the Assign objects task.
4. In the Assignments pane, select the assignment you want to change.
5. From the Password Policies menu, select the new password policy you want
to apply.
6. Save the changes.

Assigning password policies to departments, cost


centers, locations, and business roles
You can assign the password policies for forming an identity's system user password, the
passcode, and an identity's central password to departments, cost centers, locations, and
business roles.
NOTE: If you want to use the assignment of a password policy through company struc-
tures, you need to decide whether to use either departments, cost centers, locations, or
business roles. Otherwise, performance problems may occur when determining the valid
password policy. A large number of hierarchy levels could also lead to performance
problems when determining the password policy to apply.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 144
Identity administration
To reassign a password policy

1. In the Manager, select the Identities > Basic configuration data > Password
policies category.
2. Select the password policy in the result list.
3. Select the Assign objects task.
4. Click Add in Assignments and enter the following data.
l Apply to: Application scope of the password policy.

To specify an application scope


1. Click next to the field.
2. Under Table, select the table that contains the basic objects. You have
the following options:
l Department: Departments.
l Org: Business roles.
NOTE: This table is only available if the Business Roles Module
is installed.
l Locality: Locations.
l Profitcenter: Cost centers.
3. Under Apply to, select the specific department, cost center, location, or
business role.
4. Click OK.
l Password column: Name of the password column. You have the
following options:
l Person - CentralPassword: Central password of the identity.
l Person - DialogUserPassword: System user password of the identity.
l Person - Passcode: Passcode of the identity.
l Password policy: Name of the password policy to use.
5. Save the changes.

Editing password policies for identities


Predefined password policies are supplied with the default installation that you can use or
customize if required.

To edit a password policy

1. In the Manager, select the Identities > Basic configuration data > Password
policies category.
2. In the result list, select the password policy.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 145
Identity administration
3. Select the Change main data task.
4. Edit the password policy's main data.
5. Save the changes.

Detailed information about this topic


l General main data for password policies on page 146
l Password policy settings on page 147
l Character classes for passwords on page 148
l Custom scripts for password requirements on page 150

Creating password policies for identities


Predefined password policies are supplied with the default installation that you can use or
customize if required. You can also define your own password policies.

To create a password policy

1. In the Manager, select the Identities > Basic configuration data > Password
policies category.
2. On the main data form, enter the main data of the password policy.
3. Save the changes.

Detailed information about this topic


l General main data for password policies on page 146
l Password policy settings on page 147
l Character classes for passwords on page 148
l Custom scripts for password requirements on page 150

General main data for password policies


Enter the following main data of a password policy.

Table 37: main data for a password policy

Property Meaning

Display name Password policy name. Translate the given text using the
button.

Description Text field for additional explanation. Translate the given text

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 146
Identity administration
Property Meaning

using the button.

Error Message Custom error message generated if the policy is not fulfilled.
Translate the given text using the button.

Owner (Application Role) Application roles whose members can configure the password
policies.

Default policy Mark as default policy for passwords. This option cannot be
changed.
NOTE: The One Identity Manager password policy is
marked as the default policy. This password policy is
applied if no other password policy can be found for identit-
ies, user accounts, or system users.

Password policy settings


Define the following settings for a password policy on the Password tab.

Table 38: Policy settings

Property Meaning

Initial password Initial password for newly created user accounts. The initial
password is used if a password is not entered when you
create a user account or if a random password is not
generated.
NOTE: The initial password is not used as an identity's
system user password. You can implement this behavior by
customizing if required.

Password confirmation Reconfirm password.

Minimum Length Minimum length of the password. Specify the number of


characters a password must have. If the value is 0, no
password is required.

Max. length Maximum length of the password. Specify the number of


characters a password can have. The maximum permitted
value is 256.

Max. errors Maximum number of errors. Set the number of invalid


passwords attempts. The number of failed logins is only taken
into account when logging in to One Identity Manager. If the
value is 0, the number of failed logins is not taken into
account.
This data is only taken into account if the

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 147
Identity administration
Property Meaning

One Identity Manager login was through a system user or


identity based authentication module. If a user has exceeded
the maximum number of failed logins, the identity or system
user will not be able to log in to One Identity Manager.
You can use the Password Reset Portal to reset the passwords
of identities and system users who have been locked. For
more information, see the One Identity Manager
Web Designer Web Portal User Guide.

Validity period Maximum age of the password. Enter the length of time a
password can be used before it expires. If the value is 0, then
the password does not expire.

Password history Enter the number of passwords to be saved. If, for example, a
value of 5 is entered, the user's last five passwords are
stored. If the value is 0, then no passwords are stored in the
password history.

Minimum password Specifies how secure the password must be. The higher the
strength password strength, the more secure it is. The value 0 means
that the password strength is not tested. The values 1, 2, 3
and 4 specify the required complexity of the password. The
value 1 represents the lowest requirements in terms of
password strength. The value 4 requires the highest level of
complexity.

Name properties denied Specifies whether name properties are permitted in the
password. If this option is set, name properties are not
permitted in passwords. The values of these columns are
taken into account if the Contains name properties for
password check option is set. In the Designer, adjust this
option in the column definition. For more information, see the
One Identity Manager Configuration Guide.

Character classes for passwords


Use the Character classes tab to specify which characters are permitted for a password.

Table 39: Character classes for passwords

Property Meaning

Required Number of rules for character classes that must be fulfilled so that a
number of password adheres to the password policy. The following rules are taken
character into account for Min. number letters, Min. number lowercase, Min.
classes number uppercase, Min. number digits, and Min. number special
characters.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 148
Identity administration
Property Meaning

That means:
l Value 0: All character class rules must be fulfilled.
l Value >0: Minimum number of character class rules that must be
fulfilled. At most, the value can be the number of rules with a value
>0.

NOTE: Generated passwords are not tested for this.

Min. number Specifies the minimum number of alphabetical characters the password
letters must contain.

Min. number Specifies the minimum number of lowercase letters the password must
lowercase contain.

Min. number Specifies the minimum number of uppercase letters the password must
uppercase contain.

Min. number Specifies the minimum number of digits the password must contain.
digits

Min. number Specifies the minimum number of special characters the password must
special contain.
characters

Permitted List of permitted special characters.


special
characters

Max. Specifies the maximum number of identical characters that can be present
identical in the password in total.
characters
in total

Max. Specifies the maximum number of identical character that can be repeated
identical after each other.
characters
in
succession

Denied List of special characters that are not permitted.


special
characters

Do not Specifies whether a generated password can contain lowercase letters.


generate This setting only applies when passwords are generated.
lowercase
letters

Do not Specifies whether a generated password can contain uppercase letters.


generate This setting only applies when passwords are generated.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 149
Identity administration
Property Meaning

uppercase
letters

Do not Specifies whether a generated password can contain digits. This setting
generate only applies when passwords are generated.
digits

Do not Specifies whether a generated password can contain special characters. If


generate this option is set, only letters, numbers, and spaces are allowed in
special passwords. This setting only applies when passwords are generated.
characters

Custom scripts for password requirements


You can implement custom scripts for testing and generating passwords if the password
requirements cannot be mapped with the existing settings options. Scripts are applied in
addition to the other settings.

Detailed information about this topic


l Checking passwords with a script on page 150
l Generating passwords with a script on page 152

Checking passwords with a script


You can implement a script if additional policies need to be used for checking a password
that cannot be mapped with the available settings.

Syntax of check scripts


Public Sub CCC_CustomPwdValidate( policy As [Link], spwd
As [Link])
With parameters:
policy = password policy object
spwd = password to check
TIP: To use a base object, take the Entity property of the PasswordPolicy class.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 150
Identity administration
Example: Script that checks a password

A password cannot start with ? or ! . The password cannot start with three identical
characters. The script checks a given password for validity.
Public Sub CCC_PwdValidate( policy As [Link], spwd
As [Link])
Dim pwd = [Link]()
If [Link]>0
If pwd(0)="?" Or pwd(0)="!"
Throw New Exception(#LD("Password can't start with '?' or
'!'")#)
End If
End If
If [Link]>2
If pwd(0) = pwd(1) AndAlso pwd(1) = pwd(2)
Throw New Exception(#LD("Invalid character sequence in
password")#)
End If
End If
End Sub

To use a custom script for checking a password

1. In the Designer, create your script in the Script Library category.


2. Edit the password policy.
a. In the Manager, select the Identities > Basic configuration data >
Password policies category.
b. In the result list, select the password policy.
c. Select the Change main data task.
d. On the Scripts tab, enter the name of the script to be used to check a
password in the Check script field.
e. Save the changes.

Related topics
l Generating passwords with a script on page 152

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 151
Identity administration
Generating passwords with a script
You can implement a generating script if additional policies need to be used for generating
a random password, which cannot be mapped with the available settings.

Syntax for generating script


Public Sub CCC_PwdGenerate( policy As [Link], spwd As
[Link])
With parameters:
policy = password policy object
spwd = generated password
TIP: To use a base object, take the Entity property of the PasswordPolicy class.

Example: Script that generates a password

In random passwords, this script replaces the invalid characters ? and ! at the
beginning of a password with _.
Public Sub CCC_PwdGenerate( policy As [Link], spwd
As [Link])
Dim pwd = [Link]()
' replace invalid characters at first position
If [Link]>0
If pwd(0)="?" Or pwd(0)="!"
[Link](0, CChar("_"))
End If
End If
End Sub

To use a custom script for generating a password

1. In the Designer, create your script in the Script Library category.


2. Edit the password policy.
a. In the Manager, select the Identities > Basic configuration data >
Password policies category.
b. In the result list, select the password policy.
c. Select the Change main data task.
d. On the Scripts tab, enter the name of the script to be used to generate a

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 152
Identity administration
password in the Generating script field.
e. Save the changes.

Related topics
l Checking passwords with a script on page 150

Defining the excluded list for passwords


You can add words to a list of restricted terms to prohibit them from being used in
passwords.
NOTE: The restricted list applies globally to all password policies.

To add a term to the restricted list

1. In the Designer, select the Base data > Security settings > Password
policies category.
2. Create a new entry with the Object > New menu item and enter the term you want
to exclude from the list.
3. Save the changes.

Checking identity passwords


When you verify a password, all the password policy settings, custom scripts, and the
restricted passwords are taken into account.

To verify if a password conforms to the password policy

1. In the Manager, select the Identities > Basic configuration data > Password
policies category.
2. In the result list, select the password policy.
3. Select the Change main data task.
4. Select the Test tab.
5. Select the table and object to be tested in Base object for test.
6. Enter a password in Enter password to test.
A display next to the password shows whether it is valid or not.

Generating passwords for testing identities


When you generate a password, all the password policy settings, custom scripts and the
restricted passwords are taken into account.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 153
Identity administration
To generate a password that conforms to the password policy

1. In the Manager, select the Identities > Basic configuration data > Password
policies category.
2. In the result list, select the password policy.
3. Select the Change main data task.
4. Select the Test tab.
5. Click Generate.
This generates and displays a password.

Informing identities about expiring passwords


There are different ways to inform users that their password is going to expire:
l Users are alerted about their password expiring when they log in to
One Identity Manager and can change their password if necessary.
l For identity-based authentication modules, the system sends reminder notifications
in relation to expiring passwords as of seven days in advance of the password
expiry date.
l You can adjust the time in days in the Common | Authentication |
DialogUserPasswordReminder configuration parameter. Edit the
configuration parameter in the Designer.
l The notifications are triggered in accordance with the Reminder system user
password expires schedule and use the Identity - system user password
expires mail template. You can adjust the schedule and mail template in the
Designer if required.

For more information about One Identity Manager authentication modules and about
editing system users, see the One Identity Manager Authorization and
Authentication Guide.

Displaying locked identities and system users


If a user has exceeded the maximum number of failed logins, the identity or system user
will not be able to log in to One Identity Manager.
l Locked identities are displayed in the Manager in the Identities > Locked
identities category. An additional message referring to the locked login is also
displayed on the overview form for an identity.
l Locked system users are displayed in the Designer in the Permissions > System
users > Locked system users category. An additional message referring to the
locked login is also displayed on the overview form for a system user.

You can use the Password Reset Portal to reset the passwords of employees and system
users who have been locked. This unlocks the identities and system users again. For more

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 154
Identity administration
information, see the One Identity Manager Web Portal User Guide and the
One Identity Manager Web Application Configuration Guide.

Related topics
l Identity's central password on page 99

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 155
Identity administration
5

Managing devices and workdesks

One Identity Manager offers extended device administration functionality for networks.
One Identity Manager differentiates between device types, device models, and the
device itself.
l Device types, such as PCs, printers, or monitors, provide the initial classification of
the devices.
l Device models provide additional fine-tuning of the device types in order to obtain a
more exact classification of devices.
l The actual devices as they are defined in the network are listed under devices.

Workdesks are required for assigning different devices to a workstation. The assignment of
company resources can be mainly automated by assigning workdesks to business roles,
departments, cost centers, locations, or dynamic roles.

To manage devices and workdesks in One Identity Manager


l In the Designer, set the Hardware configuration parameter and compile the
database.
NOTE: If you disable the configuration parameter at a later date, model compon-
ents and scripts that are no longer required, are disabled. SQL procedures and
triggers are still carried out. For more information about the behavior of prepro-
cessor relevant configuration parameters and conditional compiling, see the
One Identity Manager Configuration Guide.

Detailed information about this topic


l Basic data for device admin on page 157
l Creating and editing devices on page 164
l Assigning company resources to devices on page 169
l Creating and editing workdesks on page 174
l Assigning company resources to workdesks on page 177
l Asset data for devices on page 184

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 156
Managing devices and workdesks
Basic data for device admin
The following basic data is required for managing devices:
l Configuration parameter
Use configuration parameters to configure the behavior of the system's basic
settings. One Identity Manager provides default settings for various configuration
parameters. Check the configuration parameters and modify them as necessary to
suit your requirements.
Configuration parameters are defined in the One Identity Manager modules. Each
One Identity Manager module can also install configuration parameters. In the
Designer, you can find an overview of all configuration parameters in the Base data
> General > Configuration parameters category.
l Device models
Device models are required to classify devices, for example, PC, server, monitor,
printer types. One Identity Manager contains predefined device models.
l Information about manufacturers and suppliers
You can store manufacturers and suppliers to help with entering device models
and devices, .
l Device status
Enter the possible device status for asset data about devices.
l Workdesk status
You can add a status to workdesks.
l Workdesk types
Provide workdesk types for further classification of workdesks,

Detailed information about this topic


l Creating and editing device models on page 157
l Creating and editing business partners on page 160
l Creating and editing device statuses on page 162
l Creating and editing workdesk statuses on page 163
l Creating and editing workdesk types on page 163
l Configuration parameters for managing devices and workdesks on page 218

Creating and editing device models


The prerequisite for adding devices is the definition of device models. Device models are
required to classify devices, for example, PC, server, monitor, printer types.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 157
Managing devices and workdesks
One Identity Manager contains predefined device models. You can define more device
models.

To create a device model

1. In the Manager, select the Devices & Workdesks > Basic configuration data >
Device models category.
2. Click in the result list.
3. On the main data form, edit the main data of the device model.
4. Save the changes.

To edit the main data of a device model

1. In the Manager, select the Devices & Workdesks > Basic configuration data >
Device models category.
2. In the result list, select a device model and run the Change main data task.
3. Edit the device model's main data.
4. Save the changes.

Detailed information about this topic


l General main data for device models on page 158
l Inventory data for device models on page 159

General main data for device models


Enter the following general main data of a device model.

Table 40: Device model main data

Property Description

Device model Name of the device model.

Device type Type of the device. During the setup of new device, the device model's
device type filters the forms that are available for handling main data.
Permitted values are Printer, Hub, Mobile phone, Modem, Monitor,
Personal computer, Router, Scanner, Server, Miscellaneous
devices.
For additional device types, enter the permitted values for the
HardwareType.Ident_HardwareBasicType column in the Designer. For more
information about creating permitted values for column definition, see the
One Identity Manager Configuration Guide.
If you use custom device types, you can use the Hardware | Display |
CustomHardwareType and its subparameters to specify whether the

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 158
Managing devices and workdesks
Property Description

customized main data form is shown when a new device is setup with the
relevant device model and device type.

Company Name of manufacturer. Use the next to the field to add a new company.
For more information, see Creating and editing business partners on page
160.
NOTE: Only the companies that are marked as manufacturers can be
selected. When a new device is added, the company named as manufac-
turer in the device model is used for the device.

Service item If you assigned a service item to the device model, the usage of the
device model can be booked internally. Use the next to the field to add
a new service item.

Website Manufacturers Website. Click the button to display the manufacturer's


website in the default web browser.

Description Text field for additional explanation.

Additional Text field for additional explanation.


data

PC Specifies whether, in principle, the device can be used as a PC in the


sense of workstation.

Server Specifies whether the device is used as a server.

Local Specifies whether this device type is a local peripheral to attach to a PC.
peripheral

Deactivated Specifies whether the device model is in use or not.


NOTE: Only device models which are enabled can be assigned in
One Identity Manager. If a device model is deactivated, assignment of
the device model is not permitted. However, existing assignments
remain intact.

Inventory data for device models


You can enter the following inventory and asset data for a device model.
NOTE: Prices are given to 2 decimal places by default. The number of decimal places to
enter can be modified in the Designer. For more information, see the
One Identity Manager Configuration Guide.

Table 41: Inventory data for a device model

Property Description

Default supplier Name of supplier. For more information, see Creating and editing

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 159
Managing devices and workdesks
Property Description

business partners on page 160.

Identity Identity responsible for the purchase.

Alternative device Alternative device model.


model

Warranty [months] Standard manufacturer warranty in months.

Additional guarantee Additional manufacturer guarantee in months.


[months]

Usage [months] Estimated period of use.

Minimum stock Minimum level of stock in storage.

Maximum stock Maximum level of stock in storage.

Item number Article number at suppliers.

Request units Measurement units for requests.

Minimum request Minimum quantity for requests.


quantity

Last quote date Last quote date.

Price of last offer Price of last offer.

Last delivery date Last delivery date.

Price of last delivery Price of last delivery.

Creating and editing business partners


Enter data for external companies that might be used as manufacturers, suppliers, or
leasing partners.

To create a business partner

1. In the Manager, select the Devices & Workdesks > Basic configuration data >
Business partners category.
2. Click in the result list.
3. On the main data form, edit the main data of the company.
4. Save the changes.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 160
Managing devices and workdesks
To edit the main data of a business partner

1. In the Manager, select the Devices & Workdesks > Basic configuration data >
Business partners category.
2. In the result list, select a company and run the Change main data task.
3. Edit the business partner's main data.
4. Save the changes.

Enter the following data for a company.

Table 42: General main data of a company

Property Description

Company Short description of the company for the views in


One Identity Manager tools.

Name Full company name.

Surname prefix Additional company name.

Short name Company's short name.

Contact Contact person for the company.

Partner Specifies whether this is a partner company.

Customer Customer number at the partner company.


number

Supplier Specifies whether this is a supplier.

Customer Customers number at supplier.


number

Leasing partner Specifies whether this is a leasing provider or rental firm.

Manufacturer Specifies whether this is a manufacturer.

Remarks Text field for additional explanation.

Table 43: Company address

Property Description

Street Street or road.

Building Building

Zip code Zip code.

City City.

State State.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 161
Managing devices and workdesks
Property Description

Country Country.

Phone Company's telephone number.

Fax Company's fax number.

Email Company's email address.


address

Website Company's website. Click the button to display the web page in the
default web browser.

Creating and editing device statuses


You can define the status that devices take on, for example: activated, deactivated, stored.

To create or edit a device status

1. In the Manager, select the Devices & Workdesks > Basic configuration data >
Device status category.
2. Click in the result list.
3. On the main data form, edit the main data of the device status.
4. Save the changes.

To edit the main data of a device status

1. In the Manager, select the Devices & Workdesks > Basic configuration data >
Device status category.
2. In the result list, select a device status and run the Change main data task.
3. Edit the device's main data.
4. Save the changes.

Enter the following data for a device status.

Table 44: Device status general data

Property Description

Device status Name of the device status.

Short description Text field for additional explanation.

Description Text field for additional explanation.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 162
Managing devices and workdesks
Creating and editing workdesk statuses
Enter the statuses that workdesks are able to have, for example, activated,
deactivated, stored.

To create a workdesk status

1. In the Manager, select the Devices & Workdesks > Basic configuration data >
Workdesk status category.
2. Click in the result list.
3. On the main data form, edit the main data of the workdesk status.
4. Save the changes.

To edit the main data of a workdesk status

1. In the Manager, select the Devices & Workdesks > Basic configuration data >
Workdesk status category.
2. In the result list, select a workdesk status and run the Change main data task.
3. Edit the workdesk status's main data.
4. Save the changes.

Enter the following data for a workdesk status.

Table 45: Main data for a workdesk

Property Description

Status Workdesk status name.

Short description Text field for additional explanation.

Description Text field for additional explanation.

Creating and editing workdesk types


Provide workdesk types for further classification of workdesks. Enter additional device
prerequisites for a workdesk.

To create a workdesk type

1. In the Manager, select the Devices & Workdesks > Basic configuration data >
Workdesk type category.
2. Click in the result list.
3. On the main data form, edit the main data of the workdesk type.
4. Save the changes.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 163
Managing devices and workdesks
To edit the main data of a workdesk type

1. In the Manager, select the Devices & Workdesks > Basic configuration data >
Workdesk type category.
2. In the result list, select the workdesk type and run the Change main data task.
3. Edit the workdesk type's main data.
4. Save the changes.

Enter the following data for a workdesk type.

Table 46: Main data for a workdesk type

Property Description

Workdesk type Name of the workdesk type.

Display name Name for displaying in the One Identity Manager tools.

Short description Text field for additional explanation.

Description Text field for additional explanation.

Leasing fee Leasing fee.

Floppy disk drive Specifies whether this workdesk type requires a floppy disk
required drive.

CD-ROM drive required Specifies whether this workdesk type requires a CD-ROM
drive.

Creating and editing devices


In the Manager, enter the main data of devices in the Devices & workstations category.
The devices are filtered according to different criteria. When a new device is added, the
filter selected defines the device model and device type and the corresponding form for
editing the main data.
l Personal Computer: Devices are created with the Default computer device
model and labeled with the PC option.
l Server: Devices are created with the Default server device model and labeled with
the Server option.
l Monitors: Devices are created with the Default monitor device model and labeled
with the Local peripheral option.
l Printers: Devices are created with the Default printer device model and labeled
with the Local peripheral option.
l Mobile phones: Devices are created with the Default mobile phone device
model.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 164
Managing devices and workdesks
l Tablets: Devices are created with the Default tablet device model.
l Miscellaneous: Devices are created with the Miscellaneous devices device model
and labeled with the Local peripheral option.

To create a device

1. In the Manager, select the Device & Workdesks > Basic configuration data >
<filter> category.
2. Click in the result list.
3. On the main data form, edit the main data of the device.
4. Save the changes.

To edit the main data of a device

1. In the Manager, select the Device & Workdesks > Basic configuration data >
<filter> category.
2. In the result list, select a device and run the Change main data task.
3. Edit the device's main data.
4. Save the changes.

Detailed information about this topic


l General main data for devices on page 165
l Device networking data on page 168
l Asset data for devices on page 184
l Assigning company resources to devices on page 169
l Creating and editing device models on page 157

General main data for devices


Enter the following general main data of a device. The main data available depends on the
selected device model.

Table 47: General main data of a device

Property Description

Asset number Number of the asset in the bookkeeping.

Device ID Unique device ID.

PC Specifies whether the device is a computer.

Server Specifies whether the device is a server.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 165
Managing devices and workdesks
Property Description

Local Specifies whether this is a local periphery such as a monitor, printer, or


periphery other periphery device.

Manufacturer Name of manufacturer.

Device model Name of the device model. The main data available depends on the
selected device model.

Device status Device's status.


Workdesk The device's workdesk. This workdesk is used to assign various devices
to a workstation or a server.
If the Hardware | Workdesk | WorkdeskAuto configuration
parameter is set, a workdesk bearing the same name is automatically
created when a workstation or a server is set up.

Parent device A parent device which is linked to this device.

VM Client Specifies whether this device is a virtual machine.


(option)

VM Host Device on which a virtual machine is installed. The selection is shared if


the VM client is set.

VM Host Specifies whether this device is a virtual machine host.


(option)

Phone Telephone number.

Used by Identity that uses this device.


Primary Department to which the device is primary assigned. Company
department resources can be inherited by a device through these primary
assignments if One Identity Manager is appropriately configured.

Primary Location to which the device is primary assigned. Company resources


location can be inherited by a device through these primary assignments if
One Identity Manager is appropriately configured.

Primary cost Cost center to which the device is primary assigned. Company resources
center can be inherited by a device through these primary assignments if
One Identity Manager is appropriately configured.

Primary Business role to which the device is assigned. Company resources can
business roles be inherited by a device through these primary assignments if
One Identity Manager is appropriately configured.
NOTE: This property is available if the Business Roles Module is
installed.

Investment Investments or investment plans for the device.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 166
Managing devices and workdesks
Property Description

Location Text field for additional explanation.


description

Description Text field for additional explanation.

Remarks Text field for additional explanation.

No inheritance Specifies whether the device inherits company resources through roles.
If the option is set, inheritance is prevented. Direct assignments remain
intact.

Operating Operating system identifier.


system

Operating Version number of the operating system.


system version

Service pack Service pack identifier.


operating
system

Hotfix Hotfix identifier.


operating
system

Carrier Carrier contract for the device.

Serial number Manufacturer's serial number.

MAC address The device's MAC address.

IMEI The device's IMEI number.

ICCID The device's ICCID number.

BIOS version Version of the BIOS.


Number of Number of processors in the device.
processors

RAM [MB] RAM in megabytes.

1. capacity Capacity of the first disk in megabytes


[MB]

2. capacity Capacity of the second disk in megabytes


[MB]

Max. vertical Maximum vertical image resolution.


resolution

Max. Maximum horizontal image resolution.


horizontal
resolution

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 167
Managing devices and workdesks
Property Description

Import data Target system or data source, from which the data set was imported.
source
Spare field no. Additional company-specific information. Use the Designer to customize
01 ... Spare display names, formats, and templates for the input fields.
field no. 10

Related topics
l Creating and editing device models on page 157
l Creating and editing business partners on page 160
l Creating and editing device statuses on page 162
l Asset data for devices on page 184
l Entering investments and investment plans for devices on page 186
l Creating and editing workdesks on page 174
l Basic principles for assigning company resources on page 15
l Preventing inheritance to individual identities, devices, or workdesks on page 31

Device networking data


Enter the following information for the network configuration. The main data available
depends on the selected device model.

Table 48: Network data

Property Description

IP address IP address in IPv4 format.


(IPv4)

IP address IP address in IPv6 format.


(IPv6)

Use DHCP Specifies whether the IP address is taken from a DHCP server. If this option
is not set, enter a fixed IP address and enter the subnet mask and standard
gateway.

Subnet Subnet mask.


mask

Default Default gateway.


gateway

Use WINS Specifies whether WINS name resolution is used. If this option is set, enter

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 168
Managing devices and workdesks
Property Description

the IP addresses of the preferred and the alternative WINS server.

WINS IP address of the preferred WINS server.


primary

WINS IP address of the alternative WINS server.


secondary

Range ID To communicate worth one another, all computers require a TCP/IP


network with the same area ID. The area ID is used for identification when
the given DNS sever cannot be found. Normally, this input should be left
empty.

Use DNS Specifies whether WINS name resolution is used. If this option is set, enter
the IP address of the preferred and the alternative DNS server.

DNS server IP address of the preferred DNS server.

2. DNS IP address of the alternative DNS server.


server

3. DNS IP address of the alternative DNS server.


server

DNS name Suffix of DNS domain the device belongs to.

DNS host DNS name of the computer.


name
Remote Specifies whether this device uses remote booting. The property is
boot available if the Hardware | Display | MachineWithRPL configuration
parameter is set.

Remote Data for the remote boot type. The property is available if the Hardware |
boot type Display | MachineWithRPL configuration parameter is set.

Assigning company resources to


devices
One Identity Manager uses different assignment types to assign company resources.
l Indirect assignment
In the case of indirect assignment of company resources, identities, devices, and
workdesks are arranged in departments, cost centers, locations, business roles, or
application roles. The total of assigned company resources for an identity, device, or
workdesk is calculated from the position within the hierarchies, the direction of
inheritance (top-down or bottom-up) and the company resources assigned to these

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 169
Managing devices and workdesks
roles. In the Indirect assignment methods a difference between primary and
secondary assignment is taken into account.
l Direct assignment
Direct assignment of company resources results from the assignment of a company
resource to an identity, device, or workdesk, for example. Direct assignment of
company resources makes it easier to react to special requirements.
l Assignment by dynamic roles
Assignment through dynamic roles is a special case of indirect assignment. Dynamic
roles are used to specify role memberships dynamically. Identities, devices, and
workdesks are not permanently assigned to a role, just when they fulfill certain
conditions. A check is performed regularly to assess which identities, devices, or
workdesks fulfill these conditions. This means the role memberships change
dynamically. For example, company resources can be assigned dynamically to all
identities in a department in this way; if an identity leaves the department they
immediately lose the resources assigned to them.

NOTE: Devices also obtain company resources from their workdesks.


The following table shows the possible company resources assignments to devices.
NOTE: Company resources are defined in One Identity Manager modules and are not
available until the modules are installed.

Table 49: Possible assignments of company resources to devices

Company Direct assign- Indirect Comment


resources ment assignment
permitted permitted

Active Directory - + All Active Directory computers that


groups reference this device are added to
Active Directory groups.

LDAP groups - + All LDAP computers that reference


this device are added to LDAP
groups.

Detailed information about this topic


l Basic principles for assigning company resources on page 15
l Permitting assignments of identities, devices, workdesks, and company resources to
roles on page 29

Related topics
l Possible assignments of company resources through roles on page 25
l Assigning devices to departments, cost centers, and locations on page 171
l Assigning devices to business roles on page 172

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 170
Managing devices and workdesks
l Assigning identities, devices, and workdesks to departments, cost centers, and
locations on page 82
l Assigning company resources to departments, cost centers, and locations on page 83
l Assigning company resources to workdesks on page 177
l Dynamic roles on page 35

Assigning devices to departments, cost


centers, and locations
Assign devices to departments, cost centers, and locations so that they obtain company
resources through these organizations. To assign company resources to departments, cost
centers, and locations, use the appropriate organization tasks.

To assign a device to departments, cost centers, and locations (secondary


assignment; default method)

1. In the Manager, select the Device & Workdesks > Basic configuration data >
<filter> category.
2. Select the device in the result list.
3. Select the Assign organizations task.
4. In the Add assignments pane, assign the organizations:
l On the Departments tab, assign departments.
l On the Locations tab, assign locations.
l On the Cost centers tab, assign cost centers.
TIP: In the Remove assignments pane, you can remove assigned organizations.

To remove an assignment
l Select the organization and double-click .
5. Save the changes.

To assign a device to departments, cost centers, and locations (primary


assignment)

1. In the Manager, select the Device & Workdesks > Basic configuration data >
<filter> category.
2. Select the device in the result list.
3. Select the Change main data task.
4. Adjust the following main data:
l Primary department: Department to which the device is assigned.
l Primary cost center: Cost center to which the device is assigned.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 171
Managing devices and workdesks
l Primary location: Location to which the device is assigned.
5. Save the changes.

Related topics
l Assigning company resources to devices on page 169
l Assigning company resources to departments, cost centers, and locations on page 83
l Dynamic roles on page 35
l Assigning identities to business roles on page 116
l Assigning identities, devices, and workdesks to departments, cost centers, and
locations on page 82

Assigning devices to business roles


NOTE: This function is only available if the Business Roles Module is installed.
Assign devices to business roles such that the devices obtain company resources through
these business roles. To assign company resources to business roles use the corresponding
business role tasks. For more information about working with business roles, see the
One Identity Manager Business Roles Administration Guide.

To assign a device to business roles (secondary assignment; default method)

1. In the Manager, select the Device & Workdesks > <filter> category.
2. Select the device in the result list.
3. Select the Assign business roles task.
4. In the Add assignments pane, select the role class and assign business roles.
TIP: In the Remove assignments pane, you can remove assigned business roles.

To remove an assignment
l Select the business role and double-click .
5. Save the changes.

To assign a device to business roles (primary assignment)

1. In the Manager, select the Device & Workdesks > <filter> category.
2. Select the device in the result list.
3. Select the Change main data task.
4. In the Primary business role menu, select the business role to assign to
the device.
5. Save the changes.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 172
Managing devices and workdesks
Related topics
l Assigning company resources to devices on page 169

Entering service agreements and tickets


for devices
NOTE: This function is only available if the Helpdesk Module is installed.
Use the Helpdesk Module to enter service agreements and tickets for a device. For more
information about the help desk, see One Identity Manager Help Desk Module User Guide.

To enter help desk data for a device

1. In the Manager, select the Device & Workdesks > Basic configuration data >
<filter> category.
2. Select the device in the result list.
3. Select the Assign service agreements task to assign the valid service agreements
to the device.
The service agreements are taken into account when calculating solution and
reaction times in the case of a help desk ticket for this device.
4. Select the Show tickets task to display tickets entered for a device.
5. Select the New ticket task, to enter a new ticket.
6. Save the changes.

Displaying the device overview


Use this task to obtain an overview of the most important information about a device.

To obtain an overview of a device

1. In the Manager, select the Device & Workdesks > Basic configuration data >
<filter> category.
2. Select the device in the result list.
3. Select the Device overview task.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 173
Managing devices and workdesks
Creating and editing workdesks
Workdesks are used to assign various devices to a workstation or a server. The assignment
of company resources can be mainly automated by assigning workdesks to business roles,
departments, cost centers, locations, or dynamic roles.
TIP: To create a workdesk automatically when you create a device for a workstation or a
server, set the Hardware | Workdesk | WorkdeskAuto configuration parameter in
the Designer.

To create a workdesk

1. In the Manager, select the Devices & Workdesks > Workdesks > Names
category.
2. Click in the result list.
3. On the main data form, edit the main data of the workdesk.
4. Save the changes.

To edit the main data of a workdesk

1. In the Manager, select the Devices & Workdesks > Workdesks > Names
category.
2. In the result list, select a workdesk and run the Change main data task.
3. Edit the workdesk's main data.
4. Save the changes.

Detailed information about this topic


l General main data of workdesks on page 174
l Location information for workdesks on page 176
l Additional information for workdesks on page 176
l Assigning company resources to workdesks on page 177
l Configuration parameters for managing devices and workdesks on page 218

General main data of workdesks


Enter the following general main data of a workdesk.

Table 50: General main data of a workdesk

Property Description

Workdesk Workdesk name.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 174
Managing devices and workdesks
Property Description

If the Hardware | Workdesk | WorkdeskAuto configuration


parameter is set, a workdesk bearing the same name is automatically
created when a workstation or a server is set up.

Workdesk type Type of the workdesk.

Status Status of the workdesk.

Display name The display name is used to display the workdesk in the
One Identity Manager tools user interface.

Description Text field for additional explanation.

Primary cost Cost center to which the workdesk is primary assigned. A workdesk can
center obtain company resources through these primary assignments if
configured accordingly.

Primary Business role to which the workdesk is primarily assigned. A workdesk


business roles can obtain company resources through these primary assignments if
configured accordingly.
NOTE: This property is available if the Business Roles Module is
installed.

Installation date Date of going into operation.

Workdesk Identity responsible for this workdesk.


supervisor

Checked by Identity that checked this workdesk.

Date checked Last time the workdesk was checked.

Check remarks Text field for additional explanation.

Service type Information about the service done on this workdesk, for example,
internal, or external service provider.

Corresponding Specifies whether the workdesk is set up according to the service


service agreements.
agreements set
NOTE: This property is available if the Helpdesk Module is installed.
up

No inheritance Specifies whether the workdesk inherits company resources through


roles. If the option is set, inheritance is prevented. Direct assignments
remain intact.

Spare field no. Additional company-specific information. Use the Designer to


01 ... Spare customize display names, formats, and templates for the input fields.
field no. 10

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 175
Managing devices and workdesks
Related topics
l Creating and editing workdesk types on page 163
l Creating and editing workdesk statuses on page 163
l Basic principles for assigning company resources on page 15
l Preventing inheritance to individual identities, devices, or workdesks on page 31

Location information for workdesks


Enter the following information about a workdesk's location.

Table 51: Workdesk location information

Property Description

Primary Department to which the workdesk is primary assigned. A workdesk can


department obtain company resources through these primary assignments if
configured accordingly.

Primary Location to which the workdesk is primary assigned. A workdesk can


location obtain company resources through these primary assignments if
configured accordingly.

Fax Fax number.

Remarks Text field for additional explanation.


(fax)

Building Building

Room Room.

Phone Telephone number.

Floor Floor.

Remarks Text field for additional explanation.


(room)

Related topics
l Basic principles for assigning company resources on page 15

Additional information for workdesks


Enter additional device prerequisites are diskettes or CD drives necessary, for example.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 176
Managing devices and workdesks
Table 52: Miscellaneous workdesk data

Property Description

Setup date Date of going into operation.

Withdrawal date Date on which the workdesk is written off.

Leasing fee Leasing fee.

Floppy disk drive required Specifies whether this workdesk requires a floppy disk drive.

CD-ROM drive required Specifies whether this workdesk requires a CD-ROM drive.

Comment Text field for additional explanation.

Assigning company resources to


workdesks
One Identity Manager uses different assignment types to assign company resources.
l Indirect assignment
In the case of indirect assignment of company resources, identities, devices, and
workdesks are arranged in departments, cost centers, locations, business roles, or
application roles. The total of assigned company resources for an identity, device, or
workdesk is calculated from the position within the hierarchies, the direction of
inheritance (top-down or bottom-up) and the company resources assigned to these
roles. In the Indirect assignment methods a difference between primary and
secondary assignment is taken into account.
l Direct assignment
Direct assignment of company resources results from the assignment of a company
resource to an identity, device, or workdesk, for example. Direct assignment of
company resources makes it easier to react to special requirements.
l Assignment by dynamic roles
Assignment through dynamic roles is a special case of indirect assignment. Dynamic
roles are used to specify role memberships dynamically. Identities, devices, and
workdesks are not permanently assigned to a role, just when they fulfill certain
conditions. A check is performed regularly to assess which identities, devices, or
workdesks fulfill these conditions. This means the role memberships change
dynamically. For example, company resources can be assigned dynamically to all
identities in a department in this way; if an identity leaves the department they
immediately lose the resources assigned to them.
l Assignment by request
Assignment through the IT Shop is a special case of indirect assignment. Add
identities to a shop as customers so that company resources can be assigned through
IT Shop requests. All company resources assigned as product to this shop can be

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 177
Managing devices and workdesks
requested by the customers. Requested company resources are assigned to the
identities after approval is granted. Role memberships can be requested through the
IT Shop as well as company resources.
For more information about requests for workdesks, see the One Identity Manager
IT Shop Administration Guide and the One Identity Manager Web Portal User Guide.

The following table shows the possible company resources assignments to workdesks.
NOTE: Company resources are defined in One Identity Manager modules and are not
available until the modules are installed.

Table 53: Possible assignments of company resources to workdesks

Company Direct assign- Indirect Remarks


Resource ment assignment
permitted permitted

System roles + +
Software + +
Active Directory - + All Active Directory computers that
groups reference the workdesk device are
added to Active Directory groups.

LDAP groups - + All LDAP computers that reference


the workdesk device are added to
LDAP groups.

Detailed information about this topic


l Basic principles for assigning company resources on page 15
l Permitting assignments of identities, devices, workdesks, and company resources to
roles on page 29

Related topics
l Possible assignments of company resources through roles on page 25
l Assigning workdesks to departments, cost centers, and locations on page 179
l Assigning workdesks to business roles on page 180
l Assigning identities, devices, and workdesks to departments, cost centers, and
locations on page 82
l Assigning company resources to departments, cost centers, and locations on page 83
l Dynamic roles on page 35

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 178
Managing devices and workdesks
Assigning workdesks to departments, cost
centers, and locations
Assign workdesks to departments, cost centers, and locations so that they obtain company
resources through these organizations. To assign company resources to departments, cost
centers, or locations, use the appropriate organization tasks.

To assign a workdesk to departments, cost centers, and locations (secondary


assignment; default method)

1. In the Manager, select the Devices & Workdesks > Workdesks > Names
category.
2. Select the workdesk in the result list.
3. Select the Assign organizations task.
4. In the Add assignments pane, assign the organizations:
l On the Departments tab, assign departments.
l On the Locations tab, assign locations.
l On the Cost centers tab, assign cost centers.
TIP: In the Remove assignments pane, you can remove assigned organizations.

To remove an assignment
l Select the organization and double-click .
5. Save the changes.

To assign a workdesk to departments, cost centers, and locations (primary


assignment)

1. In the Manager, select the Devices & Workdesks > Workdesks > Names
category.
2. Select the workdesk in the result list.
3. Select the Change main data task.
4. Adjust the following main data:
l Primary department: Department to which the workdesk is assigned.
l Primary cost center: Cost center to which the workdesk is assigned.
l Primary location: Location to which the workdesk is assigned.
5. Save the changes.

Related topics
l Assigning company resources to workdesks on page 177
l Assigning company resources to departments, cost centers, and locations on page 83

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 179
Managing devices and workdesks
l Dynamic roles on page 35
l Assigning devices to business roles on page 172
l Assigning identities, devices, and workdesks to departments, cost centers, and
locations on page 82

Assigning workdesks to business roles


NOTE: This function is only available if the Business Roles Module is installed.
Assign the workdesk to business roles so that the workdesk obtains its company resources
through these business roles. To assign company resources to business roles use the
corresponding business role tasks. For more information about working with business roles,
see the One Identity Manager Business Roles Administration Guide.

To assign a workdesk to business roles (secondary assignment; default method)

1. In the Manager, select the Devices & Workdesks > Workdesks > Names
category.
2. Select the workdesk in the result list.
3. Select the Assign business roles task.
4. In the Add assignments pane, select the role class and assign business roles.
TIP: In the Remove assignments pane, you can remove assigned business roles.

To remove an assignment
l Select the business role and double-click .
5. Save the changes.

To assign a workdesk to business roles (primary assignment)

1. In the Manager, select the Devices & Workdesks > Workdesks > Names
category.
2. Select the workdesk in the result list.
3. Select the Change main data task.
4. In the Primary business role menu, select the business role to assign to
the workdesk.
5. Save the changes.

Related topics
l Assigning company resources to workdesks on page 177

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 180
Managing devices and workdesks
Assigning system roles directly to
workdesks
NOTE: This function is only available if the System Roles Module is installed.
System roles can be assigned directly or indirectly to a contact. Indirect assignment is
carried out by assigning workdesks and system roles to company structures, such as
departments, cost centers, locations, or business roles. For more information about
working with system roles, see the One Identity Manager System Roles
Administration Guide.
To react quickly to special requests, you can assign system roles directly to a workdesk.

To assign system roles to a workdesk

1. In the Manager, select the Devices & Workdesks > Workdesks > Names
category.
2. Select the workdesk in the result list.
3. Select the Assign system roles task to assign system roles directly to the
workdesk.
4. In the Add assignments pane, assign system roles.
TIP: In the Remove assignments pane, you can remove assigned system roles.

To remove an assignment
l Select the system role and double-click .
5. Save the changes.

Related topics
l Assigning workdesks to departments, cost centers, and locations on page 179
l Assigning workdesks to business roles on page 180

Assigning software directly to workdesks


NOTE: This function is only available if the Software Management Module is installed.
Software can be assigned directly or indirectly to a workdesk. Indirect assignment is
carried out by assigning workdesks and software to company structures, such as
departments, locations, or business roles. For more information about working with
software, see the One Identity Manager Software Management Administration Guide.
To react quickly to special requests, you can assign software directly to a workdesk.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 181
Managing devices and workdesks
To assign software to a workdesk

1. In the Manager, select the Devices & Workdesks > Workdesks > Names
category.
2. Select the workdesk in the result list.
3. Select the Assign software task.
4. In the Add assignments pane, assign software.
TIP: In the Remove assignments pane, you can remove assigned software.

To remove an assignment
l Select the software and double-click .
5. Save the changes.

Related topics
l Assigning workdesks to departments, cost centers, and locations on page 179
l Assigning workdesks to business roles on page 180

Displaying the workdesk overview


Use this task to obtain an overview of the most important information about a workdesk.

To obtain an overview of a workdesk

1. In the Manager, select the Devices & Workdesks > Workdesks > Names
category.
2. Select the workdesk in the result list.
3. Select the Workdesk overview task.

Assigning devices to workdesks


Use this task to assign a workdesk to several devices, for example, workstations, printers,
monitors, or other peripheral devices. You can also assign the workdesk through the
device's main data.

To assign devices to a workdesk

1. In the Manager, select the Devices & Workdesks > Workdesks > Names
category.
2. Select the workdesk in the result list.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 182
Managing devices and workdesks
3. Select the Assign devices task.
4. In the Add assignments pane, assign the devices.
TIP: In the Remove assignments pane, you can remove the device assignments.

To remove an assignment
l Select the device and double-click .
5. Save the changes.

Related topics
l General main data for devices on page 165

Assigning workdesks to identities


Use this task to assign a workdesk to several identities. You can also assign the workdesk
through the identity's main data.

To assign a workdesk to identities

1. In the Manager, select the Devices & Workdesks > Workdesks > Names
category.
2. Select the workdesk in the result list.
3. Select the Assign identities task.
4. In the Add assignments pane, add identities.
TIP: In the Remove assignments pane, you can remove assigned identities.

To remove an assignment
l Select the identity and double-click .
5. Save the changes.

Related topics
l General main data of identities on page 101

Entering tickets for workdesks


NOTE: This function is only available if the Helpdesk Module is installed.
Use the Helpdesk Module to enter service agreements and tickets for a workdesk. For more
information about the help desk, see One Identity Manager Help Desk Module User Guide.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 183
Managing devices and workdesks
To enter help desk data for a workdesk

1. Select the Devices & Workdesks > Workdesks > Names category.
2. Select the workdesk in the result list.
3. Select Show tickets, to show the tickets entered for a workdesk.
4. Select the New ticket task, to enter a new ticket.
5. Save the changes.

Asset data for devices


One Identity Manager offers the possibility for the administration of data for assets and
accounting within the framework of inventory management. Further information about
business partners, ownership (leasing, purchasing, renting) and the associated contract
information about cost and time periods belongs here. For the assets inventory
management, data can be taken from another system and adopted by the
One Identity Manager. For example a file extracted from the SAP R/3 assets accounting can
act as data source.

To use this function


l In the Designer, set the Hardware | AssetAccounting configuration parameter
and compile the database.
NOTE: If you disable the configuration parameter at a later date, model compon-
ents and scripts that are no longer required, are disabled. SQL procedures and
triggers are still carried out. For more information about the behavior of prepro-
cessor relevant configuration parameters and conditional compiling, see the
One Identity Manager Configuration Guide.

Detailed information about this topic


l Creating and editing asset classes for devices on page 185
l Creating and editing asset types for devices on page 185
l Basic data for device admin on page 157
l Entering investments and investment plans for devices on page 186
l Editing device asset data on page 187
l Configuration parameters for managing devices and workdesks on page 218

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 184
Managing devices and workdesks
Creating and editing asset classes for
devices
Enter and edit the asset classes for the asset information about a device.

To create an asset class

1. In the Manager, select the Devices & Workdesks > Basic configuration data >
Asset classes category.
2. Click in the result list.
3. On the main data form, edit the main data of the asset class.
4. Save the changes.

To edit the main data of an asset class

1. In the Manager, select the Devices & Workdesks > Basic configuration data >
Asset classes category.
2. In the result list, select an asset class and run the Change main data task.
3. Edit the asset class's main data.
4. Save the changes.

Enter the following data for an asset class.

Table 54: Asset class main data

Property Description

Storage class Description of the asset class.

Display name Name for displaying in the One Identity Manager tools.

Description Text field for additional explanation.

Creating and editing asset types for devices


Enter and edit the asset types for the asset information about a device.

To create an asset type

1. In the Manager, select the Devices & Workdesks > Basic configuration data >
Asset types category.
2. Click in the result list.
3. On the main data form, enter the following main data.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 185
Managing devices and workdesks
l Asset type: Name of the asset type.
l Description: Text field for additional explanation.
4. Save the changes.

To edit the main data of an asset type.

1. In the Manager, select the Devices & Workdesks > Basic configuration data >
Asset types category.
2. In the result list, select an asset type and run the Change main data task.
3. Edit the main data of the asset type.
4. Save the changes.

Entering investments and investment plans


for devices
Enter the data for investments and investment plans and assign then to devices.

To create an investment

1. In the Manager, select the Devices & Workdesks > Investments category.
2. Click in the result list.
3. On the main data form, edit the following main data.
4. Save the changes.

To edit main data of an investment

1. In the Manager, select the Devices & Workdesks > Investments category.
2. In the result list, select an investment and run the Change main data task.
3. Edit the main data.
4. Save the changes.

Enter the following data for an investment.

Table 55: Investments main data

Property Description

Investment Name of the investment plan.

Date Date of investment.

Investment manager Identity responsible for the investment.

Description Text field for additional explanation.

Remarks Text field for additional explanation.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 186
Managing devices and workdesks
Related topics
l General main data for devices on page 165

Editing device asset data


To edit a device's asset information

1. In the Manager, select the Device & Workdesks > Basic configuration data >
<filter> category.
2. Select the device in the result list.
3. Select the Edit asset data task.
4. Edit the asset data's main data.
5. Save the changes.

Detailed information about this topic


l Main data for devices' asset data on page 187
l Commercial data for devices on page 189

Main data for devices' asset data


Enter the following main data of the asset data of a device.
NOTE: Prices are given to 2 decimal places by default. The number of decimal places to
enter can be modified in the Designer. For more information, see the
One Identity Manager Configuration Guide.

Table 56: Device asset data

Property Description

Asset number Number of the asset in the bookkeeping.

Asset Asset.

Storage class Asset class.


Storage type Asset type.
Device status The device's status.
Enabling Date for enabling the asset or beginning the lease, respectively.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 187
Managing devices and workdesks
Property Description

Deactivation Date for disabling the asset or end of lease, respectively.

Replacement Value for replacing with a new device.


value

Depreciated Depreciation value for the device.


value

Company Specifies whether the device is owned by the company.


owned

Leased Specifies whether the device is leased.

Invoice number Invoice number of the purchase.

PSP character Asset PSP as character string.


string

Last inventory Date of last inventory.


run

Primary cost Cost center. Company resources can be inherited by a device through
center these primary assignments if One Identity Manager is appropriately
configured.

Serial number Serial number of the device.

Delivery Text field for additional explanation.


remarks

Inventory Text field for additional explanation.


remarks

Primary Business role. A workdesk can obtain company resources over the
business role primary assignments when One Identity Manager is correspondingly
configured.
NOTE: This property is available if the Business Roles Module is
installed.

Primary Location. Company resources can be inherited by a device through


location these primary assignments if One Identity Manager is appropriately
configured.

Primary Department. Company resources can be inherited by a device through


department these primary assignments if One Identity Manager is appropriately
configured.

Related topics
l Creating and editing asset classes for devices on page 185
l Creating and editing asset types for devices on page 185
l Basic principles for assigning company resources on page 15

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 188
Managing devices and workdesks
Commercial data for devices
Enter the following asset data for a device.
NOTE: Prices are given to 2 decimal places by default. The number of decimal places to
enter can be modified in the Designer. For more information, see the
One Identity Manager Configuration Guide.

Table 57: Commercial data of a device

Property Description

Acquisition Date of purchase.


date

Delivery date Date of delivery.

Delivery Delivery voucher number.


voucher
number

Voucher Voucher. For more information about vouchers, see the


One Identity Manager Chargeback Administration Guide.

Warranty Warranty expiry date.

Warranty Warranty number.


number

Setup date Date of going into operation.

Owner Leasing company.

supplier Name of supplier.

Manufacturer Name of manufacturer.

Purchase price Purchase price.

Internal price Internal price.

Sales price Sales price.

Currency Currency unit

Inventory note Text field for additional explanation.

Withdrawal Date for writing off the device.


date

Investment Investment or investment plan.

Leasing fee Leasing fee.

Internal Internal transfer price.


transfer price

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 189
Managing devices and workdesks
Property Description

Depreciation Depreciation in months


month

Related topics
l Creating and editing business partners on page 160
l Entering investments and investment plans for devices on page 186

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 190
Managing devices and workdesks
6

Managing resources

One Identity Manager not only offers the possibility to map IT resources but also non-IT
resources such as mobile phones, desks, company cars, and keys, meaning everything
that is necessary to create an efficient working environment for an identity. In
One Identity Manager, you can assign resources directly to an identity or via
classification into hierarchical roles. Similarly, you can request resources for an identity
through the IT Shop.
Resources are divided up from a functional point of view.

Table 58: Resource types

Type Description Table

Resources Resources that an identity (workdesk, QERResource


device) may own just once.
The resources can be requested in the
IT Shop just once. The resources are
assigned to the identities after approval
has been granted. They remain assigned
until the request is unsubscribed. You can
request them again a later point.
Example: phone, company car.

Multi-request resources Resources that can be requested more QERReuse


than once in the IT Shop. Requests are
automatically canceled once approved.
The resources are not explicitly assigned
to identities.
Example: resource for requesting remote
desktop sessions for assets in a PAM
system; consumables, such as pens,
printing paper.

Multi Resources that an identity can request QERReuseUS


requestable/unsubscribable more than once in the IT Shop but must
resources return them explicitly once they are no

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 191
Managing resources
Type Description Table

longer needed. The resources are


assigned to the identities after approval
has been granted. They remain assigned
until the request is canceled.
Example: printer, monitor,
Azure Active Directory role assignment

Assignment resources Assignment resources are special QERAssign


resources for requesting any number of
assignments to hierarchical roles or to
delegate responsibilities in the IT Shop.
For more information about assignment
resources, see the One Identity Manager
IT Shop Administration Guide.

Detailed information about this topic


l Creating and editing resources on page 194
l Assigning resources to identities on page 196
l Creating and editing multi-request resources on page 201
l Assigning multi-request resources to identities on page 203
l Reports about resources on page 205

One Identity Manager users for


managing resources
The following users are used for user administration.

Table 59: Users

Users Tasks

Administrators for the Administrators must be assigned to the Request &


IT Shop Fulfillment | IT Shop | Administrators application role.
Users with this application role:
l Edit the resources and assign them to IT Shop structures.

One Identity Manager One Identity Manager administrator and administrative system
administrators users Administrative system users are not added to application
roles.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 192
Managing resources
Users Tasks

One Identity Manager administrators:


l Create customized permissions groups for application
roles for role-based login to administration tools in the
Designer as required.
l Create system users and permissions groups for non role-
based login to administration tools in the Designer as
required.
l Enable or disable additional configuration parameters in
the Designer as required.
l Create custom processes in the Designer as required.
l Create and configure schedules as required.
l Create and configure password policies as required.

Basic data for resources


The following basic data is required for managing resources.
l Resource types
You can use resource types to group resources.
l Extended properties
Extended properties are meta objects, such as operating codes, cost codes, or cost
accounting areas that cannot be mapped directly in One Identity Manager.

Detailed information about this topic


l Resource types on page 193
l Creating and editing extended properties on page 208

Resource types
You can use resource types to group resources.

To create or edit resource types

1. In the Manager, select the Entitlements > Basic configuration data > Resource
types category.
2. Click in the result list.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 193
Managing resources
3. On the main data form, enter the following main data.
l Resource type: Name of the resource type.
l Description: Text field for additional explanation.
4. Save the changes.

To edit the main data of a resource type

1. In the Manager, select the Entitlements > Basic configuration data > Resource
types category.
2. In the result list, select an resource type and run the Change main data task.
3. Edit the main data of the resource type.
4. Save the changes.

Creating and editing resources


Create and edit resources that an identity (workstation, device) can own exactly once. The
resources can be requested in the IT Shop just once. The resources are assigned to the
identities after approval has been granted. They remain assigned until the request is
canceled. You can request them again a later point.

To create a resource

1. In the Manager, select the Entitlements > Resources category.


2. Click in the result list.
3. Edit the resource's main data.
4. Save the changes.

To edit the main data of a resource

1. In the Manager, select the Entitlements > Resources category.


2. Select a resource in the result list and run the Change main data task.
3. Edit the resource's main data.
4. Save the changes.

Detailed information about this topic


l Main data for resources on page 195
l Assigning resources to identities on page 196

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 194
Managing resources
Main data for resources
Enter the following main data of a resource.

Table 60: Resource main data

Property Description

Resource Resource identifier.


Resource type Resource type for grouping resources.

Service item Service item through which you can request the resource in the
IT Shop. Assign an existing service item or add a new one.

Required resource Define the dependencies between resources. When this resource is
requested or assigned, the required resource is assigned
automatically.

Risk index Value for evaluating the risk of assigning the resource to identities.
Set a value in the range 0 to 1. This input field is only visible if the
QER | CalculateRiskIndex configuration parameter is set.
For more information, see the One Identity Manager
Risk Assessment Administration Guide.

IT Shop Specifies whether the resource can be requested through the


IT Shop. This resource can be requested through the Web Portal and
allocated by defined approval processes. The resource can still be
assigned directly to identities and roles outside of the IT Shop.
For more information, see the One Identity Manager IT Shop
Administration Guide.

Only for use in Specifies whether the resource can be requested through the
IT Shop IT Shop. This resource can be requested through the Web Portal and
allocated by defined approval processes. The resource cannot be
directly assigned to roles outside the IT Shop.
For more information, see the One Identity Manager IT Shop
Administration Guide.

No inheritance on Resources marked with this option are not inherited by identity that
security risk are rated as a security risk.

Description Text field for additional explanation.

Automatic assign- Specifies whether the resource is automatically assigned to all


ment to identities internal identities. By saving the resource, it is assigned to every
identity that is not marked as external. Once a new internal identity
is created, they automatically obtain this resource.
To automatically remove the resource assignment from all
identities, disable this option. The resource cannot be reassigned to

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 195
Managing resources
Property Description

identities from this point on. Existing resource assignments remain


intact.

Spare field no. 01 Additional company-specific information. Use the Designer to


... Spare field no. customize display names, formats, and templates for the input
10 fields.

Related topics
l Resource types on page 193
l General main data of identities on page 101
l Calculation of assignments on page 22

Assigning resources to identities


Resources can be assigned to identities directly, indirectly, or through IT Shop requests. In
the case of indirect assignment identities and resources are arranged in hierarchical roles.
The number of resources assigned to an identity is calculated from the position in the
hierarchy and the direction of inheritance. Add identities to a shop as customers so that
resources can be assigned through IT Shop requests. All resources, which are assigned to
this shop can be requested by the customers. Requested resources are assigned to the
identities after approval is granted.

The prerequisite for indirect assignment of resources to identities is:


l Assignment of identities and resources is permitted for role classes (departments,
cost centers, locations, or business roles).

Detailed information about this topic


l Permitting assignments of identities, devices, workdesks, and company resources to
roles on page 29
l Basic principles for assigning company resources on page 15

Assigning resources to departments, cost


centers, and locations
Assign a resource to departments, cost centers or locations such that identities inherit the
resource through these organizations.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 196
Managing resources
To assign a resource to departments, cost centers and locations

1. In the Manager, select the Entitlements > Resources category.


2. Select a resource in the result list.
3. Select the Assign organizations task.
4. In the Add assignments pane, assign the organizations:
l On the Departments tab, assign departments.
l On the Locations tab, assign locations.
l On the Cost centers tab, assign cost centers.
TIP: In the Remove assignments pane, you can remove assigned organizations.

To remove an assignment
l Select the organization and double-click .
5. Save the changes.

Related topics
l Departments, cost centers, and locations on page 52
l Basics for mapping company structures in One Identity Manager on page 10

Assigning resources to business roles


NOTE: This function is only available if the Business Roles Module is installed.
Assign a resource to business roles such that the resource is inherited by identities through
these business roles. For more information about working with business roles, see the
One Identity Manager Business Roles Administration Guide.

To assign a resource to business roles

1. In the Manager, select the Entitlements > Resources category.


2. Select a resource in the result list.
3. Select the Assign business roles task.
4. In the Add assignments pane, select the role class and assign business roles.
TIP: In the Remove assignments pane, you can remove assigned business roles.

To remove an assignment
l Select the business role and double-click .
5. Save the changes.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 197
Managing resources
Assigning resources directly to identities
Resources can be assigned directly or indirectly to identities. Indirect assignment is carried
out by allocating identities and resources in company structures, like departments, cost
centers, locations, or business roles.
To react quickly to special requests, you can assign resources directly to identities.

To assign a resource directly to identities

1. In the Manager, select the Entitlements > Resources category.


2. Select a resource in the result list.
3. Select the Assign to identities task.
4. In the Add assignments pane, add identities.
TIP: In the Remove assignments pane, you can remove assigned identities.

To remove an assignment
l Select the identity and double-click .
5. Save the changes.

Related topics
l Identity administration on page 93
l Basic principles for assigning company resources on page 15

Adding resources to the IT Shop


Once a resource has been assigned to an IT Shop shelf, it can be requested by the shop
customers. There are other prerequisites required to make a resource requestable.
l The resource must be labeled with the IT Shop option.
l The resource must be assigned to a service item.
l The resource must be also labeled with the Only use in IT Shop option if it is only to
be assigned to identities by means of IT Shop requests. Then, the resource may not
be assigned directly to hierarchical roles.

For more information about requesting company resources through the IT Shop, see the
One Identity Manager IT Shop Administration Guide.

To add a resource to the IT Shop

1. In the Manager, select the Entitlements > Resources category.


2. Select a resource in the result list.
3. Select the Add to IT Shop task.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 198
Managing resources
4. In the Add assignments pane, assign the resource to the IT Shop shelves.
5. Save the changes.

To remove a resource from individual IT Shop shelves

1. In the Manager, select the Entitlements > Resources category.


2. Select a resource in the result list.
3. Select the Add to IT Shop task.
4. In the Remove assignments pane, remove the resource from the IT Shop shelves.
5. Save the changes.

To remove resource from all IT Shop shelves

1. In the Manager, select the Entitlements > Resources category.


2. Select a resource in the result list.
3. Select the Remove from all shelves (IT Shop) task.
4. Confirm the security prompt with Yes.
5. Click OK.
The resource is removed from all shelves by the One Identity Manager Service.
All requests and assignment requests that include this resource are canceled in
the process.

Related topics
l Main data for resources on page 195

Adding resources in system roles


NOTE: This function is only available if the System Roles Module is installed.
A resource can be added to different system roles. A system role that only contains
resources can be labeled with the Resource package system role type. Resources can
also be added to system roles that are not resource packages. When you assign a system
role to an identity the resource is assigned to the identity.
For more information about working with system roles, see the One Identity Manager
System Roles Administration Guide.
NOTE: Resources with the Only use in IT Shop option set can only be assigned to
system roles that also have this option set.

To assign a resource to system roles

1. In the Manager, select the Entitlements > Resources category.


2. Select a resource in the result list.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 199
Managing resources
3. Select the Assign system roles task.
4. In the Add assignments pane, assign system roles.
TIP: In the Remove assignments pane, you can remove assigned system roles.

To remove an assignment
l Select the system role and double-click .
5. Save the changes.

Displaying the resources overview


Use this task to obtain an overview of the most important information about a
resource. The affiliation of the resource to hierarchical roles and IT Shop structures
counts in this here.

To obtain an overview of a resource

1. In the Manager, select the Entitlements > Resources category.


2. Select a resource in the result list.
3. Select the Resource overview task.

Assigning extended properties to


resources
Extended properties are meta objects, such as operating codes, cost codes, or cost
accounting areas that cannot be mapped directly in One Identity Manager.

To specify extended properties for an resource

1. In the Manager, select the Entitlements > Resources category.


2. Select a resource in the result list.
3. Select Assign extended properties.
4. In the Add assignments pane, assign extended properties.
TIP: In the Remove assignments pane, you can remove assigned extended
properties.

To remove an assignment
l Select the extended property and double-click .
5. Save the changes.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 200
Managing resources
Detailed information about this topic
l Creating and editing extended properties on page 208

Creating and editing multi-request


resources
Multi-request resources are resources that an identity can request multiple times in the
IT Shop. Requests are automatically canceled once approved. The resources are not expli-
citly assigned to identities.
Multi requestable/unsubscribable resources are resources that an identity can request
multiple times in the IT Shop, but that must be explicitly returned when they are no longer
needed. The resources are assigned to the identities after approval has been granted. They
remain assigned until the request is canceled.
You can only edit multi-request resources if the QER | ITShop configuration
parameter is set.
l In the Designer, check if the configuration parameter is set. Otherwise, set the
configuration parameter and compile the database.

To create or edit multi-request resources

1. In the Manager, select the Entitlements > Multi-request resources for


IT Shop category.
2. Select a resource in the result list and run the Change main data task.
- OR -
Click in the result list.
3. Edit the multi-request resource's main data.
4. Save the changes.

To create or edit multi requestable/unsubscribable resources

1. In the Manager, select the Entitlements > Multi requestable/unsubscribable


resources for IT Shop category.
2. Select a resource in the result list and run the Change main data task.
- OR -
Click in the result list.
3. Edit the multi requestable/unsubscribable resource's main data.
4. Save the changes.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 201
Managing resources
Detailed information about this topic
l Main data for multi-request resources on page 202
l Assigning multi-request resources to identities on page 203
l Adding multi-request resources to the IT Shop on page 203

Main data for multi-request resources


Enter the following main data of a multi-request resource.

Table 61: Main data for a multi-request resource

Property Description

Multi-request resource Resource identifier.


Multi
requestable/unsubscribable
resource
Resource type Resource type for grouping resources.
Service item Service item through which you can request the resource
in the IT Shop. Assign an existing service item or add a
new one.
Risk index Value for evaluating the risk of assigning the resource to
identities. Set a value in the range 0 to 1. This input field
is only visible if the QER | CalculateRiskIndex
configuration parameter is set.
For more information, see the One Identity Manager
Risk Assessment Administration Guide.
IT Shop Specifies whether the resource can be requested through
the IT Shop. This resource can be requested through the
Web Portal and allocated by defined approval processes.
The resource can still be assigned directly to identities
and roles outside of the IT Shop.
This option cannot be disabled. For more information, see
the One Identity Manager IT Shop Administration Guide.
Only for use in IT Shop Specifies whether the resource can be requested through
the IT Shop. This resource can be requested through the
Web Portal and allocated by defined approval processes.
The resource cannot be directly assigned to roles outside
the IT Shop.
This option cannot be disabled. For more information, see
the One Identity Manager IT Shop Administration Guide.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 202
Managing resources
Property Description

Description Text field for additional explanation.


Spare field no. 01 ... Spare Additional company-specific information. Use the
field no. 10 Designer to customize display names, formats, and
templates for the input fields.

Related topics
l Resource types on page 193

Assigning multi-request resources to


identities
Assign multi requestable resources through IT Shop requests to identities. To do this, add
identities to a shop as customers. All resources, which are assigned to this shop can be
requested by the customers. For more information, see the One Identity Manager IT Shop
Administration Guide.

Detailed information about this topic


l Adding multi-request resources to the IT Shop on page 203
l Assigning company resources through IT Shop requests on page 19

Adding multi-request resources to the


IT Shop
A multi-request resource can be requested by shop customers when it is assigned to an
IT Shop shelf. For more information, see the One Identity Manager IT Shop
Administration Guide.

To set up multi-request resources and add them as products in the IT Shop

1. In the Manager, select the Entitlements > Multi-request resources for


IT Shop category.

2. Click in the result list.


3. Edit the resource's main data.
4. Save the changes.
5. Select the Add to IT Shop task.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 203
Managing resources
In the Add assignments pane, assign a shelf.
TIP: In the Remove assignments pane, you can remove shelf assignments.

To remove an assignment
l Select the shelf and double-click .
6. Save the changes.

To set up multi requestable/unsubscribable resources and to add them as


products to the IT Shop

1. In the Manager, select the Entitlements > Multi requestable/unsubscribable


resources for IT Shop category.

2. Click in the result list.


3. Edit the resource's main data.
4. Save the changes.
5. Select the Add to IT Shop task.
In the Add assignments pane, assign a shelf.
TIP: In the Remove assignments pane, you can remove shelf assignments.

To remove an assignment
l Select the shelf and double-click .
6. Save the changes.

To remove multi-request resources from all IT Shop shelves

1. In the Manager, select the Entitlements > Multi-request resources for


IT Shop category.
- OR -
In the Manager, select the Entitlements > Multi requestable/unsubscribable
resources for IT Shop category.
2. Select a resource in the result list.
3. Select the Remove from all shelves (IT Shop) task.
4. Confirm the security prompt with Yes.
5. Click OK.
The resource is removed from all shelves by the One Identity Manager Service. This
cancels all requests for this resource.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 204
Managing resources
Displaying the multi-request resource
overview
Use this task to obtain an overview of the most important information about a multi-
request resource. For this, take into account the affiliation of the resource to IT Shop
structures.

To obtain an overview of a multi-request resource

1. In the Manager, select the Entitlements > Multi-request resources for


IT Shop category.
2. Select a resource in the result list.
3. Select the Multi-Request resource overview task.

To obtain an overview of a requestable/unsubscribable resource

1. In the Manager, select the Entitlements > Multi requestable/unsubscribable


resources for IT Shop category.
2. Select a resource in the result list.
3. Select the Multi requestable/Unsubscribable resource overview task.

Reports about resources


One Identity Manager makes various reports available containing information about the
selected base object and its relations to other One Identity Manager database objects. The
following reports are available for resources.
NOTE: Other sections may be available depending on the which modules are installed.

Table 62: Reports about resources

Report Description

Overview of all assign- This report finds all roles containing identities with the selected
ments resource.

Related topics
l Analyzing role memberships and identity assignments on page 123

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 205
Managing resources
7

Setting up extended properties

Extended properties are meta objects, such as operating codes, cost codes, or cost
accounting areas that cannot be mapped directly in One Identity Manager. You can assign
extended properties to company resources, hierarchical roles, identities, and attestation
cases. They can, for example, be used in the rule conditions of compliance rules.

To assign extended properties

1. First, set up a property group, under which the extended properties will be grouped.
2. Set up the extended properties in the property group.
3. Assign the extended properties to the objects.
There can be any number of objects of different object types assigned to an extended
property at this point.

Detailed information about this topic


l Creating property groups for extended properties on page 207
l Creating and editing extended properties on page 208

One Identity Manager users for


managing extended properties
The following users are used for managing extended properties.

Table 63: Users

Users Tasks

Administrators for the Administrators must be assigned to the Request &


IT Shop Fulfillment | IT Shop | Administrators application role.
Users with this application role:

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 206
Setting up extended properties
Users Tasks
l Create extended properties for company resources of any
type.

One Identity Manager One Identity Manager administrator and administrative system
administrators users Administrative system users are not added to application
roles.
One Identity Manager administrators:
l Create customized permissions groups for application
roles for role-based login to administration tools in the
Designer as required.
l Create system users and permissions groups for non role-
based login to administration tools in the Designer as
required.
l Enable or disable additional configuration parameters in
the Designer as required.
l Create custom processes in the Designer as required.
l Create and configure schedules as required.
l Create and configure password policies as required.

Creating property groups for extended


properties
Property groups are used to group extended properties. Each extended property must be
assigned to at least one property group. Furthermore, you can assign the extended
properties to any other property groups.

To create a property group

1. In the Manager, select the Entitlements > Basic configuration data > Extended
properties category.
2. Click in the result list.
3. Enter a name and description for the property group.
4. Save the changes.

Related topics
l Assigning extended properties to property groups on page 209
l Main data for extended properties on page 208
l Assigning additional property groups to extended properties on page 210

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 207
Setting up extended properties
Creating and editing extended
properties
To create an extended property

1. In the Manager, select the Entitlements > Basic configuration data > Extended
properties > <property group> category.
2. Click in the result list.
3. On the main data form, edit the main data of the extended property.
4. Save the changes.

To edit main data of a extended property

1. In the Manager, select the Entitlements > Basic configuration data > Extended
properties > <property group> category.
2. Select the extended property in the result list. Select the Change main data task.
3. Edit the extended property's main data.
4. Save the changes.

Detailed information about this topic


l Main data for extended properties on page 208
l Specifying scope limits for extended properties on page 210

Main data for extended properties


Enter the following data for an extended property.

Table 64: Extended property main data

Property Description

Extended Name of the extended property.


property
name

Property The property group for structuring extended properties. You can assign a
group primary property group to a property on the main data form. Extended
properties are grouped by this property group in navigation.
If you have to assign an extended property to several property groups,
you can assign additional property groups.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 208
Setting up extended properties
Property Description

Lower scope Lower scope limit for further subdivision.


limit

Upper scope Upper scope limit for further subdivision.


limit

Description Text field for additional explanation.

Spare field Additional company-specific information. Use the Designer to customize


no. 01 ... display names, formats, and templates for the input fields.
Spare field
no. 10

Related topics
l Specifying scope limits for extended properties on page 210
l Assigning additional property groups to extended properties on page 210
l Assigning extended properties to property groups on page 209

Assigning extended properties to


property groups
Each extended property must be assigned to at least one property group. Furthermore, you
can assign the extended properties to any other property groups.
If you want to assign more properties to a property group, use the Assign extended
properties task.

To assign extended properties to a property group

1. In the Manager, select the Entitlements > Basic configuration data > Extended
properties category.
2. Select a property group in the result list.
3. Select the Assign extended properties task.
4. In the Add assignments pane, assign extended properties.
TIP: In the Remove assignments pane, you can remove assigned extended
properties.

To remove an assignment
l Select the extended property and double-click .
5. Save the changes.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 209
Setting up extended properties
Related topics
l Main data for extended properties on page 208
l Assigning additional property groups to extended properties on page 210

Assigning additional property groups to


extended properties
Each extended property must be assigned to at least one property group. Furthermore, you
can assign the extended properties to any other property groups. If an extended property
needs to be assigned to several property groups, then you can use the Assign property
groups task to assign additional property groups.

To assign an extended property to a property group

1. In the Manager, select the Entitlements > Basic configuration data > Extended
properties > <property group> category.
2. Select the extended property in the result list.
3. Select the Assign property groups task.
4. In the Add assignments pane, assign property groups.
TIP: In the Remove assignments pane, you can remove assigned property
groups.

To remove an assignment
l Select the property group and double-click .
5. Save the changes.

Related topics
l Main data for extended properties on page 208
l Assigning extended properties to property groups on page 209

Specifying scope limits for extended


properties
You can subdivide extended properties by specifying scoped limits. You are not obliged to
enter scoped limit. If you do enter a lower boundary you are not required to enter an upper
one. However, if you specify an upper boundary, you have to enter a lower one.
Take note of the following when defining scoped limits:

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 210
Setting up extended properties
l Basically, any string is permitted as a lower or upper scoped limit.
l You can use * as a wildcard for any number of characters (even null).
l Wild cards can only be added to the end of a string, for example, AB*. Strings such as
*AB or A*B are not allowed, for example.
l If you enter a lower boundary without a wildcard, you cannot use a wildcard in the
upper boundary.

The following restrictions apply for the length of the string:


l If you enter a lower and upper boundary without a wildcard, the strings have to be
the same length, for example, lower boundary 123/upper boundary 456. A lower
boundary of 123 and an upper of 45, for example, is not permitted or a lower
boundary 123/upper boundary 4567 is also not allowed.
l If you use a wildcard in the lower boundary but none in the upper boundary, then the
length of the upper boundary string needs to be the same as or bigger than the string
in the lower boundary.
l If you use a wildcard in the lower and upper boundary, they have to be the same
length, for example, lower boundary 123*/upper boundary 456*. A lower boundary
of 123* and an upper of 45*, for example, is not permitted or a lower boundary
123*/upper boundary 4567* is also not allowed.

Assigning objects to extended


properties
You can assign extended properties to company resources, hierarchical roles, identities,
and attestation cases.

To assign objects to an extended property

1. In the Manager, select the Entitlements > Basic configuration data > Extended
properties > <property group> category.
2. Select the extended property in the result list.
3. Select the Assign objects task.
4. In the Table menu, select the required object type.
The object belonging to the object types are displayed on the form.
5. In the Add assignments pane, assign objects.
TIP: In the Remove assignments pane, you can remove object assignments.

To remove an assignment
l Select the object and double-click .
6. Save the changes.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 211
Setting up extended properties
Displaying the extended properties
overview
Use this task to obtain an overview of the most important information about an extended
property. For this you need to take into account the affiliation of the extended property to
the different One Identity Manager objects.

To obtain an overview of an extended property

1. In the Manager, select the Entitlements > Basic configuration data > Extended
properties > <property group> category.
2. Select the extended property in the result list.
3. Select the Extended property overview task.

To obtain an overview of a property group

1. In the Manager, select the Entitlements > Basic configuration data > Extended
properties category.
2. Select a property group in the result list.
3. Select the Property group overview task.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 212
Setting up extended properties
Appendix A

Appendix: Configuration parameters for


managing departments, cost
centers, and locations

The following configuration parameters are additionally available in One Identity Manager
after the module has been installed.

Table 65: Configuration parameter

Configuration parameters Description

QER | Structures Controls whether hierarchical roles are supported.


QER | Structures | Controls generation of calculation tasks for dynamic
DynamicGroupCheck roles. If the configuration parameter is not set, the
subparameters do not apply.

QER | Structures | If the parameter is set, a calculation task for


DynamicGroupCheck | modifications to identities or identity level objects is
CalculateImmediatelyPerson queued immediately in the DBQueue Processor. If the
parameter is not set, the calculation tasks are queued
the next time the schedule is planned to run.

QER | Structures | If the parameter is set, a calculation task for


DynamicGroupCheck | modifications to devices or device level objects is
CalculateImmediatelyHardware queued immediately in the DBQueue Processor. If the
parameter is not set, the calculation tasks are queued
the next time the schedule is planned to run.

QER | Structures | If the parameter is set, a calculation task for


DynamicGroupCheck | modifications to workdesks or workdesk level objects
CalculateImmediatelyWorkdesk is queued immediately in the DBQueue Processor. If
the parameter is not set, the calculation tasks are
queued the next time the schedule is planned to run.

QER | Structures | Preprocessor relevant configuration parameter for


ExcludeStructures defining the effectiveness of role memberships. If this
parameter is set, mutually excluding roles can be

One Identity Manager 9.2 Identity Management Base Module


Administration Guide
213
Appendix: Configuration parameters for managing departments,
cost centers, and locations
Configuration parameters Description

defined. Changes to this parameter require the


database to be recompiled.
If you disable the configuration parameter at a later
date, model components and scripts that are no
longer required, are disabled. SQL procedures and
triggers are still carried out. For more information
about the behavior of preprocessor relevant config-
uration parameters and conditional compiling, see the
One Identity Manager Configuration Guide.

QER | Structures | Inherite | Specifies whether identities inherit through primary


Person assignment.

QER | Structures | Inherite | Specifies whether identities inherit assignments from


Person | GroupExclusion their primary department (Person.UID_Department).

QER | Structures | Inherite | Specifies whether identities inherit assignments from


Person | FromLocality their primary location (Person.UID_Locality).

QER | Structures | Inherite | Specifies whether identities inherit assignments from


Person | FromProfitCenter their primary cost center (Person.UID_ProfitCenter).

QER | Structures | Inherite | Specifies whether devices inherit through primary


Hardware assignment.

QER | Structures | Inherite | Specifies whether devices inherit assignments from


Hardware | FromDepartment their primary department (Hardware.UID_Department).

QER | Structures | Inherite | Specifies whether devices inherit assignments from


Hardware | FromLocality their primary location (Hardware.UID_Locality).

QER | Structures | Inherite | Specifies whether devices inherit assignments from


Hardware | FromProfitCenter their primary department (Hardware.UID_Department).

QER | Structures | Inherite | Specifies whether workdesks inherit through primary


Workdesk assignment.

QER | Structures | Inherite | Specifies whether workdesks inherit assignments


Workdesk | FromDepartment from their primary department (Workdesks.UID_
Department).

QER | Structures | Inherite | Specifies whether workdesks inherit assignments


Workdesk | FromLocality from their primary location (Workdesk.UID_Locality).

QER | Structures | Inherite | Specifies whether workdesks inherit assignments


Workdesk | FromProfitCenter from their primary cost center (Workdesk.UID_
ProfitCenter).

One Identity Manager 9.2 Identity Management Base Module


Administration Guide
214
Appendix: Configuration parameters for managing departments,
cost centers, and locations
Appendix B

Appendix: Configuration parameters for


managing identities

The following configuration parameters are additionally available in One Identity Manager
after the module has been installed.

Table 66: Configuration parameters

Configuration parameter Description

QER | Person If this configuration parameter is set, identity admin-


istration is supported.

QER | Person | AllowLo- Specifies whether identities that are classified as


ginWithSecurityIncident security risks are allowed to log in to the
One Identity Manager.
If the configuration parameter is set, login is possible.
If the configuration parameter is not set, identities
that are classified as security risk are not allowed to
log in (default).

QER | Person | Specifies how the central user account is mapped.


CentralAccountGlobalUnique
If the configuration parameter is set, the central user
account name of an identity is made up uniquely with
respect to all identity central user accounts and the
account names of all permitted target systems. If the
configuration parameter is not set, the name is only
formed with respect to the central user account of all
identities.

QER | Person | Default mail domain. The value is used to establish an


DefaultMailDomain identity's email address.

Person | MasterIdentity | Specifies whether the main identity should be used to


UseMasterForAuthentication log in to One Identity Manager tools using an identity-
based authentication module.
If this parameter is set, the main identity is used for
identity-based authentication. If this parameter is not

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 215
Appendix: Configuration parameters for managing identities
Configuration parameter Description

set, the subidentity is used for identity-based authen-


tication.

QER | Person | Specifies whether the password questions used for a


PasswordResetAuthenticator | successful password reset become invalid afterward.
InvalidateUsedQuery

QER | Person | Specifies the number of password questions that an


PasswordResetAuthenticator | identity has to define in order to change their
QueryAnswerDefinitions password.

QER | Person | Specifies the number of password questions that an


PasswordResetAuthenticator | identity has to answer in order to change their
QueryAnswerRequests password.

QER | Person | Specifies whether a passcode generated by the help


PasswordResetAuthenticator | desk is split into two components, one for the help
PasscodeSplit desk and one for the identity's manager.

QER | Person | Controls the behavior between identities and user


TemporaryDeactivation accounts if identities are deactivated.
If the configuration parameter is set, the user
accounts of the identity are locked for the period of
temporary or permanent disablement. If the config-
uration parameter is not set, the properties of the
associated identity have no influence over the user
accounts.

QER | Person | Specifies whether the identity's central password is


UseCentralPassword used in the user accounts. The identity’s central
password is automatically mapped to the identity’s
user accounts in all permitted target systems. This
excludes privileged user accounts, which are not
updated.

QER | Person | UseCen- Specifies whether an identity's central password is


tralPassword | CheckAllPolicies checked against all the target system's password
policies of the identity's user accounts. Checking is
only carried out in the Password Reset Portal.

QER | Person | UseCen- Specifies whether the identity's central password is


tralPassword | SyncToSys- copied to the identity's system user password.
temPassword

QER | Person | UseCen- Specifies whether the identity's system user account
tralPassword | SyncToSys- is unlocked when the central password is
temPassword | synchronized.
UnlockByCentralPassword

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 216
Appendix: Configuration parameters for managing identities
Configuration parameter Description

SysConfig Allows configuration of general system behavior


settings.

SysConfig | Display Allows the configuration of the front-end design.

SysConfig | Display | Preprocessor relevant configuration parameter for


SourceDetective controlling how the source of an identity's entitle-
ments are displayed. Changes to this parameter
require the database to be recompiled.
If you disable the configuration parameter at a later
date, model components and scripts that are no
longer required, are disabled. SQL procedures and
triggers are still carried out. For more information
about the behavior of preprocessor relevant config-
uration parameters and conditional compiling, see the
One Identity Manager Configuration Guide.

QER | Person | Specifies whether deactivated identities are hidden,


HideDeactivatedIdentities for example, in menus on forms.
If the configuration parameter is set, activated and
deactivated identities are hidden and cannot be
assigned. However, deactivated identities that are
already assigned are shown. If the configuration
parameter is not set, activated and deactivated
identities are shown and can be assigned. (Default)

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 217
Appendix: Configuration parameters for managing identities
Appendix C

Configuration parameters for


Appendix:

managing devices and workdesks

The following configuration parameters are additionally available in One Identity Manager
after the module has been installed.

Table 67: Configuration parameter

Configuration Description
parameters

Hardware Preprocessor relevant configuration parameter to control the


database model components for device administration. If the
parameter is set, the device administration components are
available. Changes to this parameter require the database to be
recompiled.
If you disable the configuration parameter at a later date,
model components and scripts that are no longer required, are
disabled. SQL procedures and triggers are still carried out. For
more information about the behavior of preprocessor relevant
configuration parameters and conditional compiling, see the
One Identity Manager Configuration Guide.

Hardware | Preprocessor parameter to control the model components for


AssetAccounting asset accounting. If the parameter is set, asset accounting
components are available. Changes to this parameter require
the database to be recompiled.
If you disable the configuration parameter at a later date,
model components and scripts that are no longer required, are
disabled. SQL procedures and triggers are still carried out. For
more information about the behavior of preprocessor relevant
configuration parameters and conditional compiling, see the
One Identity Manager Configuration Guide.

Hardware | Display Specifies whether the displaying of device properties can be


configured.

Hardware | Display | Specifies whether forms customized to the main data are

One Identity Manager 9.2 Identity Management Base Module


Administration Guide
218
Appendix: Configuration parameters for managing devices and
workdesks
Configuration Description
parameters

CustomHardwareType displayed when setting up a new device with the appropriate


device model.

Hardware | Display | Add a device type that represents a mobile phone.


CustomHardwareType |
MobilePhone

Hardware | Display | Add a device type that represents a monitor


CustomHardwareType |
Monitor

Hardware | Display | Add a device type that represents a PC.


CustomHardwareType |
PC

Hardware | Display | Add a device type that represents a printer.


CustomHardwareType |
Printer

Hardware | Display | Add a device type that represents a server.


CustomHardwareType |
Server

Hardware | Display | Add a device type that represents a tablet.


CustomHardwareType |
Tablet

Hardware | Display | Pipe delimited list of all monitor resolutions that are supplied on
DisplayResolutions the device's main data forms.

Hardware | Display | Specifies whether the data for remote booting of workstations
MachineWithRPL and servers can be edited.

Hardware | Workdesk If this configuration parameter is set, workdesk administration


is supported.

Hardware | Workdesk | Specifies whether when setting up a workstation or server, an


WorkdeskAuto associated workdesk is automatically created.

Hardware | Workdesk | If this configuration parameter is set, creating a workdesk


WorkdeskAutoPerson automatically creates an associated identity. This identity can
be used to make requests for this workstation.

One Identity Manager 9.2 Identity Management Base Module


Administration Guide
219
Appendix: Configuration parameters for managing devices and
workdesks
About us

About us

One Identity solutions eliminate the complexities and time-consuming processes often
required to govern identities, manage privileged accounts and control access. Our solutions
enhance business agility while addressing your IAM challenges with on-premises, cloud and
hybrid environments.

Contacting us
For sales and other inquiries, such as licensing, support, and renewals, visit
[Link]

Technical support resources


Technical support is available to One Identity customers with a valid maintenance contract
and customers who have trial versions. You can access the Support Portal at
[Link]
The Support Portal provides self-help tools you can use to solve problems quickly and
independently, 24 hours a day, 365 days a year. The Support Portal enables you to:
l Submit and manage a Service Request
l View Knowledge Base articles
l Sign up for product notifications
l Download software and technical documentation
l View how-to videos at [Link]/OneIdentity
l Engage in community discussions
l Chat with support engineers online
l View services to assist you with your product

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 220
About us
Index
Index

A C
application role calculation schedule
additional manager 53 default schedule 40
administrators 53, 94 run immediately 43
approver 53, 62 set up 40
approver (IT) 53, 62 certification 90
assign identity 117 certification status 90
attestors 53, 61 company resources
base roles assign 15, 83, 110, 169, 177
identity managers 94 configuration parameter 215, 218
Identity Management cost center
identity administrators 53
administrators 94 allow assignment 29
identity managers 94 approver 62, 68
assignment approver (IT) 62, 68
about IT Shop request 19 assign company resources 25, 83
company resources 25 assign devices 82, 171
direct 16 assign extended properties 90
dynamic role 19 assign identity 82, 115
indirect 16 assign workdesk 179
primary 17 assign workdesks 82
configurations 17 attestors 53, 61, 68
secondary 16 basics 11
configurations 29 certification status 90
permit 29 conflicting roles 33, 88
country 71

B dynamic 85
edit 68
business partner 137, 160
functional area 71

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 221
Index
IT operating data 77 object ID 64
manager 68 profit 67
no inheritance 30-31, 68 risk index 67
profit 71 rule violation 67
risk index 71 short name 64
rule violation 71 state 67
short name 68 transparency index 67
state 71 turn over 67
transparency index 71 device
turn over 71 assign business role 165, 172
assign company resources 169

D assign cost center 82, 165, 171


assign department 82, 165, 171, 187
department
assign location 82, 165, 171
administrators 53
assign to workdesk 165, 182
allow assignment 29
company 160
approver 62, 64
device ID 165
approver (IT) 62, 64
device model 157, 165
assign company resources 25, 83
device status 162, 187
assign devices 82, 171
edit 164
assign extended properties 90
enter ticket 173
assign identity 82, 115
location 187
assign workdesk 179
network configuration 168
assign workdesks 82
no inheritance 31, 165
attestors 53, 61, 64
service agreement 173
basics 11
storage class 185, 187
certification status 90
storage data 184
conflicting roles 33, 88
storage type 185, 187
contact data 66
workdesk 174
country 67
device model
dynamic 85
deactivate 158
edit 63
device type 158
functional area 67
edit 157
IT operating data 77
local periphery 158
manager 64
logic PC 158
no inheritance 30-31, 64

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 222
Index
PC 158 F
server 158
functional area 59
device status 162
device type 158
I
direction of inheritance 11
dynamic role identity 95, 107

calculate 39, 44, 46 access restriction 128

calculation schedule 36, 40, 50 add to IT Shop 117

condition 36, 50 address 106

test 38 administrators 94

cost center 85 assign application role 117

department 85 assign business role 104, 116

edit excluded list 86 assign company resources 110

exclude identity 48, 86 assign cost center 82, 104, 115

excluded list 48 assign department 82, 104, 115

location 85 assign extended properties 133

object class 50 assign location 82, 115

organizations 50 assign reports 119

recalculation 50 assign resource 118

role 50 assign software 120

set up 36 assign system role 119


assign to workdesk 183
central password 99, 107
E
central SAP user account 107
exclude list (dynamic role) 48
central user account 98, 107
incorrect entries 86
certification status 101, 128
extended property 206
company 101, 137
assign objects 211
country 106, 131-132
assign property group 210
default email address 98, 107
assign resource 200
delete 127
assign to identities 133
delete permissions 127
create 208
deputy 104
overview form 212
enter ticket 133
property group 208
entry date 104
scope limit 208, 210

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 223
Index
external 101 virtual identity 107
group identity 95, 107 work hours 132
identity card number 104 X500 identity 107
identity managers 94 identity managers 94
image 106 inheritance
language 101, 131 block 30
leaving date 104 bottom-up 11
location 106 calculate 20-22
locked 154 halt 13, 30
log 100 limit 30-31
logins 107 top-down 11
Machine identity 95, 107 XIsInEffect 22
main identity 95, 97, 107 XOrigin 22
manager 104 inheritance exclusion 33
managerial scope 129 define for roles 88
new user 128 IT operating data 77
no inheritance 31, 101 change 81
organizational identity 95, 107
permanently deactivate 101, 125 L
personalized admin identity 95, 107
leaser 137, 160
phone 106
location
primary identity 95, 107
address 75-76
re-enable 126
administrators 53
reenable 125-126
allow assignment 29
report 134
approver 62, 72
risk index 101
approver (IT) 62, 72
security key (Webauthn) 130
assign company resources 25, 83
security risk 101, 195
assign devices 82, 171
service identity 95, 107
assign extended properties 90
sponsored identity 95, 107
assign identity 82, 115
state 106, 131-132
assign workdesk 179
subidentity 95, 97, 107
assign workdesks 82
system user 107
attestors 53, 61, 72
temporarily deactivate 104, 124
basics 11
user account 129, 133
certification status 90

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 224
Index
conflicting roles 33, 88 character sets 148
country 75 check password 153
dynamic 85 conversion script 150, 152
edit 72 default policy 143, 146
functional area 76 display name 146
IT operating data 77 edit 146
manager 72 error message 146
network configuration 76 excluded list 153
no inheritance 30-31, 72 failed logins 147
profit 76 generate password 153
risk index 76 initial password 147
rule violation 76 name components 147
short name 72 password age 147
state 75 password cycle 147
transparency index 76 password length 147
turn over 76 password strength 147
predefined 142

M test script 150


property group 206
mail definition 139
add 207
main identity 95, 107
assign extended properties 209-210
manufacturer 137, 160

R
O
resource 191
organizations
assign extended properties 200
certify 90
assign system role 199
overview form
assign to identities 118, 195
extended property 212
inheritance 195, 202
resource 200, 205
overview form 200, 205
requestable 195, 202
P resource type 195, 202
password risk index 195, 202
central 99, 107 security risk 195
password policy 142 service item 195, 202
assign 143 set up 194

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 225
Index
resource type 195, 202 system role
set up 193 add resource 199
risk assessment assign to identities 119
functional area 59 assign to workdesk 181
risk index system user 107
for resource 195, 202 locked 154
role
conflicting roles 33 T
role classes 56
template
role type 57, 59
IT operating data, modify 81
role type 57
assign 57, 59
create 58 U
role classes 57, 59 user account
roles apply template 81
allow assignment 29
assign company resources 25 W
basics 11
workdesk
inheritance
assign business role 174, 180
bottom-up 11
assign company resources 177
top-down 11
assign cost center 82, 174, 179
no inheritance 30-31
assign department 82, 176, 179
assign device 182
S assign identity 183
service item assign location 82, 176, 179
for resource 195, 202 assign software 181
software assign system role 181
assign to identities 120 create automatically 174
assign to workdesks 181 edit 174
storage class 185 no inheritance 31, 174
storage type 185 status 174
subidentity 95, 107 workdesk status 163
subscribable report workdesk type 163, 174
assign to identities 119 workdesk status 163
supplier 137, 160 workdesk type 163

One Identity Manager 9.2 Identity Management Base Module


Administration Guide 226
Index

Common questions

Powered by AI

To initiate an immediate recalculation of dynamic role memberships, select the role for which the dynamic role was created in the Manager. Open the role's overview form, select Dynamic roles, and click on the dynamic role. Then, select the 'Change main data' task and the 'Start recalculation immediately' task, closing the prompt with OK. This action sets a processing task for the DBQueue Processor in the DBQueue .

An identity's central password can be published to the user accounts of the identity if the target system is synchronized by One Identity Manager. The identity's central password is not replicated to privileged user accounts. If a target system is read-only, the central password is not propagated to user accounts in that system. Additionally, if a password cannot be changed due to an error, an email notification is sent to the identity .

Disabling immediate recalculation of dynamic role memberships means that changes to specified properties will not trigger automatic updates in role memberships. As a result, existing role memberships remain unchanged until a manual recalculation is performed or a scheduled recalculation occurs. This can ensure system stability by minimizing frequent recalculations but may delay role membership updates .

Maintaining an exclusion list for dynamic roles serves to exempt specific identities from automatic role assignments based on criteria such as denied attestation or rule violations. It allows for granular control over role membership, ensuring that only compliant identities are included in dynamic roles. This mechanism also facilitates management of incorrectly excluded identities by enabling their removal from the exclusion list when necessary .

To edit recalculation properties for a dynamic role, select the role in the Manager for which the dynamic role was created, open the role's overview form, and select Dynamic roles. Click on the dynamic role, and select the 'Change main data' task. In the Recalculation Properties tab, add the properties, save the changes and define which properties will trigger recalculation .

Excluding identities from dynamic roles due to rule violations involves selecting the role for which the dynamic role was created in the Manager, opening the role's overview form, and selecting Dynamic roles and clicking on the dynamic role. Then, select the 'Exclude identities' task, click Add to select the identity from the Identity menu, optionally enter a reason for the exclusion, and save the changes. An excluded list is maintained to manage such exclusions based on denied attestation or rule violations .

To prepare hierarchical roles for company resource assignments, select the Organizations category, such as a role class, in the Manager. Then, in the result list, select the role and the appropriate task (e.g., Assign identities). You can add assignments in the Add assignments pane and remove them in the Remove assignments pane .

Predefined password policies can be customized by using the default installation supplied by One Identity Manager. You can adjust the settings of these policies or define your own password policies to meet specific requirements. This allows for flexibility in managing identity password constraints .

One Identity Manager assigns workdesks to organizational units by selecting the workdesk in the Manager under the Devices & Workdesks category. The 'Assign organizations' task allows assignment to departments, locations, and cost centers through the Add assignments pane. Changes are saved after assignments to facilitate the distribution of company resources through these organizations .

If the configuration parameter is set, the central user account for an identity is formed uniquely in relation to the central user accounts of all identities and the user account names of all permitted target systems. If the configuration parameter is not set, it is only formed uniquely in relation to the central user accounts of all identities, which is the default setting .

You might also like