3181 Workbook
3181 Workbook
1
Identity Governance Workbook
2
SECTION 1 Installing Identity Governance
To run the Identity Governance product, you need the following components:
Databases for Identity Governance and Identity Reporting. You can use
PostgreSQL or Oracle.
An application server. Identity Governance requires Apache Tomcat.
One SSO Provider (OSP).
LDAP authentication server (NetIQ eDirectory or Microsoft Active Directory).
(Optional) ActiveMQ.
(Optional) Identity Reporting.
Puede obtener los componentes del sitio de descargas de NetIQ en Identity
Manager. Para su comodidad, Apache Tomcat y PostgreSQL se incluyen en el
mismo programa de instalación. Si ya tiene las versiones apropiadas de PostgreSQL,
ActiveMQ y Tomcat, no necesita instalar las aplicaciones nuevamente.
También deberá descargar, descomprimir y ejecutar las siguientes máquinas
virtuales desde ftp.novell.com/outgoing:
ftp.novell.com/outgoing/TS-3181-IDV-Server-VM.zip
ftp.novell.com/outgoing/TS-3181-IG-UofM-VM.zip
ftp.novell.com/outgoing/TS-3181-IG-Server-VM.zip
In this section, you install the Identity Governance software and its required
components and framework.
The following exercises are included in this section:
1. “Install Apache Tomcat and the PostgreSQL Database” on page 4
2. “Install One Single Sign-On Provider” on page 7
3. “Install Identity Governance” on page 9
3
Identity Governance Workbook
7. Take note of the product features that will be installed; then select Next.
8. From the Tomcat install folder screen, note the Tomcat install folder location;
then select Next.
4
9. From the Tomcat details screen, note the default port assignments; then accept
the port assignments by selecting Next.
10. From the ActiveMQ install folder screen, note the ActiveMQ install folder
location; then select Next.
11. From the PostgreSQL install folder screen, note the PostgreSQL install folder
location; then select Next.
12. From the PostgreSQL details screen, type the following:
Password for ‘postgres’ user: netiq000
Confirm password for ‘postgres’ user: netiq000
13. Note the default PostgreSQL port; then select Next.
The following is displayed:
5
Identity Governance Workbook
(End of Exercise)
6
Exercise 1-2 Install One Single Sign-On Provider
One SSO Provider (OSP), allows you to configure Identity Governance for single
sign-on access.
By default, the installation program installs the OSP components in the /opt/netiq/
idm/apps/osp directory.
Do the following:
1. At the command prompt, start the OSP installer by entering ./osp-install-
linux.bin.
The installation program starts.
2. From the Introduction screen, select Next.
3. From the License Agreement screen, scroll to the bottom of the license
agreement text.
4. Select I accept the terms of the License Agreement; then select Next.
5. From the Select install location screen, note the Install location; then select Next.
6. From the Tomcat details screen, note the value for the TOMCAT_HOME Folder;
then, accept the displayed value by selecting Next.
7. From the Tomcat Java home screen, note the value for Select a Folder; then select
Next.
8. From the Application address screen, type the following:
Host name: 172.17.5.115
Port: 8080
9. Select Next.
10. From the Login screen customization screen, read the text displayed in the text
box; then select Next.
11. From the Authentication details screen, type the following:
NOTE: The authentication source used in the exercises is the eDirectory Identity Vault on the
IDV server.
7
Identity Governance Workbook
8
Exercise 1-3 Install Identity Governance
In this exercise, you do the following:
“Install Identity Governance Using the GUI Installation Wizard” on page 9
“View the Identity Governance Database Structure” on page 12
9
Identity Governance Workbook
9. Verify that the value for Runtime identifier is local; then select Next.
10. From the Tomcat Java home screen, note the value for Select JRE home folder;
then, accept the displayed value by selecting Next.
11. From the Application Address screen, type the following:
Host name: 172.17.5.115
Port: 8080
12. Select Next.
13. From the Authentication details screen, for Service password and Confirm
service password, type netiq000.
NOTE: This is the secret used by the client to connect to the OSP authentication service. This
secret is used by the OSP server and Identity Governance.
10
30. From the sixth Database details screen, for Reporting database name, type igrpt;
then, for Reporting database users password and Confirm password, type
netiq000.
31. Select Next.
32. From the seventh Database details screen, verify that Update is selected; then
select Next.
NOTE: This step publishes the default users and the schema in the database.
33. From the Report default language screen, from the Target locale drop-down list,
verify that English is selected; then select Next.
34. From the Report email delivery screen, in the SMTP server field, type
172.17.5.115; then select Next.
NOTE: Email delivery of reports is not covered in this course so a valid email server is not
specified.
35. From the Report retention details screen, accept the default settings by selecting
Next.
36. From the Identity Audit screen, leave the Enable auditing check-box de-
selected, then select Next.
37. From the Pre-Installation summary screen, select Next.
38. From the second Pre-Installation summary screen, select Install.
Wait while Identity Governance is installed.
39. When finished, select Done.
40. From the command prompt, restart the server by entering init 6.
41. After the server has restarted, login as root with the password of netiq000; then,
from the desktop, open Firefox.
You see the Identity Governance sign in screen:
11
Identity Governance Workbook
NOTE: If you encounter a connection failure message, select OK; then launch pgadmin again.
12
5. From the left-panel, expand Databases.
You see the databases associated with Identity Governance including the igrpt
database that is associated with Identity Reporting:
13
Identity Governance Workbook
14
Collecting Identity Governance Data
Para certificar que sus usuarios tienen los niveles apropiados de acceso a sus
recursos y aplicaciones, debe completar el catálogo de Gobierno de identidad con
las identidades, las cuentas de las aplicaciones, y permisos de aplicación que existen
en su entorno. Identity Governance organiza los datos según su tipo de fuente:
identidad o aplicación. Cuando crea una fuente de datos, también configura la
configuración para la recopilación de datos.
Identity Governance debe recopilar información sobre los usuarios de fuentes de
identidad. Después de que Identity Governance recopile esta información, debe
publicar la información para completar el catálogo. Luego puede asignar a estos
usuarios autorizaciones administrativas en el producto.
Los siguientes ejercicios están incluidos en esta sección:
1. “Verify OSP Integration” on page 16
2. “Collect Identity Governance User Data” on page 18
3. “Add a CSV-Based Application Source and Collect Its Data” on page 26
4. “Add Identity Manager as an Application Source and Collect Application Data”
on page 35
15
Identity Governance Workbook
2. From the NetIQ Access page, sign in as igadmin with the password of netiq000.
You now verify that Identity Governance is properly configured to use the OSP.
3. In the upper-right corner of the Overview page, select the down-arrow next to
Bootstrap Admin; then select Sign out.
16
Collecting Identity Governance Data
4. From the NetIQ Access page, sign in as aastin with the password of netiq000.
You see the following:
The aastin user was able to sign in to the Identity Governance interface because
the user exists in the eDirectory Identity Vault (the OSP authentication source).
Because aastin has not yet been collected into the Identity Governance database,
the user does not have the ability to access any Identity Governance tools.
5. Sign out as aastin; then sign in again as igadmin.
(End of Exercise)
17
Identity Governance Workbook
2. For Name, type IG Users; then, from the Name field, copy the IG Users text.
3. In the Description field, select the upper case B; then paste the text from the
previous step.
4. From the Publish behavior drop-down list, select Publish without merging.
5. Select the New Collector section heading.
You see the collector parameters.
6. In the Collector name field, type Identity Manager.
7. From the Collector template drop-down list, select Identity Manager Identity.
8. From the list of sections, select the Service Parameters section heading.
You see the following:
18
Collecting Identity Governance Data
19
Identity Governance Workbook
22. Select the check-box for Identity Manager Collector; then select Run Test
Collection.
The following is displayed:
23. Select the check-box for Identity Manager Collector; then for the Identity
collection, replace the word ALL with the number 5.
24. Select Run Raw Data Collection.
Wait while the test collection takes place. You see the following:
20
Collecting Identity Governance Data
25. From the Actions drop-down list, select View; then, from the IG Users Test
Collection dialog, select Identity (5 records of raw data).
You see the following:
You see a solid representation of data that will be collected with a full identity
collection.
26. Review the data; then, if desired, review the data associated with groups and
group relationships.
27. Close the IG Users Test Collection dialog; then, from the Collection Testing and
Analytics page, select the Download and Emulation tab.
You see the options for downloading collection data sources and emulation
packages.
28. From the left-panel, under Data Sources, select Identities; then, begin the
identity collection by selecting the Collect icon .
Wait while the collection takes place.
29. From the left-panel, under Catalog, select Users.
You see that the catalog is empty because the identity data has been collected but
not published.
30. From the left-panel, under Data Sources, select Identities.
21
Identity Governance Workbook
You see that the IG Users Identity Source has been collected. Next to Collect
Status, you see a red diamond. The red diamond indicates that the data has not
been published.
31. Next to the Identity Sources heading, select the Publish icon .
Wait while the identity data is published. When finished, you see the following:
22
Collecting Identity Governance Data
23
Identity Governance Workbook
6. From the left-panel, select Administration; then, from the Administration page,
select Authorization Assignments.
7. Make the following administration assignments:
NOTE: This setting makes it so that the Identity Reporting admin utility will open when
selecting the Home icon in the upper-right corner of the Identity Governance admin utility.
11. Contract the General Settings section, by selecting General Settings; then select
Identity Manager System connection Information.
12. Type the following:
Identity Manager URL: http://172.17.5.105:8180/IDMProv
Identity Manager username: uaadmin
Identity Manager password: netiq000
13. Select Test Connection.
The following is displayed:
24
Collecting Identity Governance Data
If the connection test fails, double check the parameter values; then try again.
14. Select the Save icon .
15. Sign out as aastin; then sign in as cnano with the password netiq000.
Notice that Chip has the same access as aastin.
16. Sign out as cnano; then sign in as tmellon password netiq000.
You see that Terry has limited options according to his administrative role
assignments.
17. Sign out as tmellon; then login as cnano.
18. Minimize Firefox.
(End of Exercise)
25
Identity Governance Workbook
Exercise 2-3 Add a CSV-Based Application Source and Collect Its Data
En este ejercicio, agrega una fuente de aplicación basada en CSV -. La aplicación
consta de dos archivos de base de datos planos -: uno incluye datos de cuenta y el
otro incluye datos de permisos.
Haz lo siguiente:
1. Desde la esquina superior izquierda - del escritorio del servidor IG, abra la carpeta Instalar.
2. Copie los archivos mmpAccounts.csv y mmpPermissions.csv; luego busque y pegue los archivos
en /opt/netiq.
3. En el navegador de archivos, desde el directorio /opt/netiq, abra el archivo mmpAccounts.csv.
Tome nota del texto resaltado en la siguiente imagen:
26
Collecting Identity Governance Data
27
Identity Governance Workbook
17. En el campo Asignación de usuario de la cuenta -, escriba Cuenta - Titular; luego, de la lista
desplegable del atributo Mapto -, seleccione ID de fuerza laboral como se muestra a continuación:
18. Scroll to the top of the New Application Source page; then select the Save icon
.
19. To add another collector to this application source, select the plus sign.
20. From the list of sections, select the New Collector section heading.
21. For Collector name, type Permissions; then, from the Collector template drop-
down list, select CSV Permission.
You see the following:
28
Collecting Identity Governance Data
NOTE: These values are the headings from the mmpPermissions.csv file.
24. En el área de mapeo de propietarios de Permiso -, verifique que el propietario esté asignado
a ID de usuario desde Fuente.
25. Desplácese hacia abajo hasta el área de asignación de cuenta o usuario de Permiso -.
26. En el campo Permiso - Cuenta o Asignación de usuario, reemplace el contenido con ID de
cuenta; luego, de la lista desplegable Mapa a atributo -, seleccione ID de cuenta de origen.
27. Desplácese hacia abajo hasta que vea la lista de secciones para este recopilador como se
muestra a continuación:
29
Identity Governance Workbook
34. Desplácese hacia abajo hasta que vea la lista de secciones para este recopilador.
35. Seleccionar el Collect Permission hierarchy based on child to parent section
heading.
36. Bajo la jerarquía de permisos de recopilación basada en el encabezado de niño a
padre (, es posible que deba desplazarse hacia arriba ), para recopilar estos
datos? seleccione la casilla de verificación - para Yes.
37. For File Name, type /opt/netiq/mmpPermissions.csv
38. Desplácese hacia abajo hasta la jerarquía de permisos de recopilación en función
del área de atributos de niño a padre; luego, realice los siguientes cambios:
Child Permission ID from Source: Permission ID
Parent Permission(s): Parent
39. Scroll to the top of the ManageMyProject page; then select the Save icon .
Take note of what will be and what will not be collected based on this application
source definition:
30
Collecting Identity Governance Data
40. Scroll to the bottom of the ManageMyProject page; then select Test Collection
and Troubleshooting.
You see the following:
41. Next to the Name heading, select the check-box; then select Run Test
Collection.
The following is displayed:
42. Select the check-boxes for Account and Permission; then for both collectors
replace the word All with the number 5.
43. Select Run Raw Data Collection.
Wait while the test collection takes place. When finished, you see the following:
31
Identity Governance Workbook
You see a good representation of account data from the mmpAccounts.csv file.
46. Select Permission (5 records of raw data).
You see the following:
32
Collecting Identity Governance Data
33
Identity Governance Workbook
You see that you have the ability to filter accounts that are mapped to Identity
Governance users and those that are unmapped.
(End of Exercise)
34
Collecting Identity Governance Data
2. For Name, type Identity Manager Permissions; then, from the Name field,
copy the Identity Manager Permissions text.
3. In the Description field, select the upper case B; then paste the text from the
previous step.
4. Select the New Collector section heading.
You see additional collector parameters.
5. In the Collector name field, type IDM Permissions.
6. From the Collector template drop-down, select Identity Manager AE
Permission.
7. From the list of sections, select the Service Parameters section heading.
You see the following:
35
Identity Governance Workbook
36
Collecting Identity Governance Data
37
Identity Governance Workbook
38
Building Identity Governance Reviews
Las revisiones pueden contener una sola etapa, con cada elemento de revisión
asignado a un solo revisor o grupo de revisores o etapas múltiples, con cada
elemento de revisión asignado a múltiples revisores que actúan sobre los elementos
de revisión solo después de que el revisor anterior complete una acción.
Los siguientes ejercicios están incluidos en esta sección:
1. “Create a Review with Manual Fulfillment” on page 40
2. “Fulfill a Review” on page 44
3. “Create and Run a Review with Automated Fulfillment” on page 46
39
Identity Governance Workbook
Verá que tiene la capacidad de establecer los tipos de cambio que permitirá
el cumplimiento manual de la aplicación. En este ejercicio, no realiza
ningún cambio.
6. Close the Manual Fulfillment options by selecting the X.
40
Building Identity Governance Reviews
Crear la revisión
1. Desde el panel izquierdo, debajo del Catálogo, seleccione Applications; luego, de la
lista de aplicaciones, seleccione el ManageMyProject solicitud.
2. Select the Edit icon .
3. Para Riesgo, establezca el control deslizante en un valor de rango normal.
4. Para propietarios, agregue Jack Miller; luego seleccione Save.
5. Desde el panel izquierdo, debajo del Catálogo, seleccione Applications; luego, de la lista
de aplicaciones, seleccione el ManageMyProject solicitud.
Ves algo similar a lo siguiente:
NOTE: Recuerde que a Terry se le asigna la función administrativa del Administrador de revisión.
41
Identity Governance Workbook
NOTE: Como administrador de revisiones, Terry tiene acceso a todas las revisiones en proceso.
42
Building Identity Governance Reviews
21. Para los usuarios Bill Burke y Kate Smith, seleccione Keep; luego para los
usuarios Bill Bender y Jane Brown, seleccione Remove.
22. En la esquina superior derecha de la página, seleccione
Submit 4 item(s). Ves que la revisión de Jack está completa.
23. Cerrar sesión como jmiller; entonces el signo es como tmellon.
24. Desde el panel izquierdo, en Comentarios, seleccione Comentarios; luego, de la
lista de Comentarios, select Projects and Time Create Permissions Review.
25. To view the status of the review, select the Review Items tab.
You see the current status of the review.
26. In the upper-right corner of the page, select Approve.
You see that the review is certified.
(End of Exercise)
43
Identity Governance Workbook
3. Para cumplir con la solicitud, minimice Firefox; luego, desde el escritorio del
servidor, abra la carpeta de instalación.
4. Desde el navegador de archivos, busque la carpeta /opt/netiq; luego
abra el archivo mmpPermissions.csv.
5. En el archivo mmpPermissions.csv, busque la Hora - Crear permiso. Verá
que el valor de ID de permiso asignado a Time - Create es 70100:
8. Edit the mmpAccounts.csv file by removing the 70100 permission from Bill’s
permissions as shown below:
44
Building Identity Governance Reviews
9. Perform the same steps for Jane Brown; then save and close the
mmpAccounts.csv file.
10. Close the file browser; then maximize Firefox.
11. From the Manual Fulfillment Requests page, next to the Task heading, select the
check-box; then, from the Actions drop-down list, select Fulfilled.
12. From the upper-right corner, select Submit 2 item(s).
13. From the left-panel, under Data Sources, select Applications.
14. For the ManageMyProject application, select the Collect Now icon
Wait while the collection takes place.
15. For the ManageMyProject application, select the Publish Now icon .
Wait while the publication takes place.
16. When finished, from the left-panel, under Fulfillment, select Status; then, from
the Fulfillment Status page, select the VERIFIED box.
The following is displayed:
(End of Exercise)
45
Identity Governance Workbook
Configure Fulfilment
1. Desde el panel izquierdo, debajo de Cumplimiento,
seleccione Configuration. Ves lo siguiente:
46
Building Identity Governance Reviews
The edit page allows you to assign an owner to the entitlement as well as
associated risk and cost.
12. Slide the risk bar to a setting somewhere in the normal range; then select Save.
13. From the left-panel, under Catalog, select Permissions.
You see the VPN Access permission with the associated risk that you just
assigned:
2. From the left-panel, under Reviews, select Definitions; then, from the Review
definitions page, select the plus sign.
3. From the Review type drop-down list, verify that User Access Review is
selected; then type the following:
Name: Review VPN Access
Description: Determine who has access to the VPN Permission
4. Under User Access Review items heading, from the first drop-down list, select
Select permissions.
5. In the Search for permissions field, add VPN Access; then select Save icon .
6. Select the Run icon ; then, from the Start review dialog, select Start and Go
Live.
7. From the left-panel under Reviews, select Reviews.
You see VPN Access as a running review:
47
Identity Governance Workbook
Under the User column heading, you see that Jay, Kip, and Sally currently have
permissions to the VPN Corporate Access User Application role. The first step
for approving the assignment is assigned to the users’ supervisor, displayed
under the Current Reviewer column. Because Terry Mellon is a Review
Administrator, if desired, he can override this approval step.
10. Sign out as tmellon; then sign in as kkeller.
You see that Kip has one review that requires his attention.
11. Select the Review VPN Access review.
You see the following:
48
Building Identity Governance Reviews
As the owner, Terry could override these decisions if they are not part of standard
business controls. In this case, however, Terry realizes that Sally no longer needs
VPN access so he approves the review.
21. In the upper-right corner of the page, in the OWNER APPROVAL box, select
Approve as shown below:
49
Identity Governance Workbook
23. From the bookmarks bar, select the IDM User App bookmark; then log in to the
User Application as uaadmin with password of netiq000.
NOTE: If you are presented with the Single Sign On Setup Security Questions page, select the
IDM User App bookmark again.
24. In the User App, from the top menu, select Roles and Resources; then, from the
Role Catalog list, select VPN Access.
25. From the VPN Access window, select the Assignments tab.
Notice that Jay and Kip still have VPN Access, but Sally does not:
27. Select Cancel; then, in Firefox, switch to the Identity Governance tab.
28. Sign out as tmellon; then sign in as cnano.
29. From the left-panel under Fulfillment, select Status.
You see the following:
50
Building Identity Governance Reviews
(End of Exercise)
51
Identity Governance Workbook
52
Implementing Technical Roles
53
Identity Governance Workbook
4. Desde la página Nuevo rol técnico, para Nombre, escriba el rol de permisos de
facturas; luego, desde el campo Nombre, copie el texto del Rol de permisos de
facturas.
5. En el campo Descripción, pegue el texto del paso anterior.
6. En el campo Propietarios, agregue Abby Spencer.
7. Establezca la configuración del nivel de riesgo en un valor normal.
8. Junto a los permisos, seleccione el signo más.
9. En la esquina superior derecha de la lista, en el campo Buscar permisos, escriba
Facturas.
Ves lo siguiente:
54
Implementing Technical Roles
10. Para agregar todos los permisos mostrados, junto al Nombre del permiso,
seleccione la casilla de verificación; luego seleccione Agregar (4).
11. From the top of the Invoices Permissions Role page, select the Active check-box;
then select the Save icon .
12. From the left-panel, under Catalog, select Roles.
13. From the Technical roles page, select the plus sign.
14. From the New Technical Role page, for Name, type Estimates Permissions
Role; then, from the Name field, copy the Project Create Permission Role text.
15. In the Description field, paste the text from the previous step.
16. In the Owners field, add Abby Spencer.
17. Set the Risk Level Configuration to a Normal value.
18. Next to Permissions, select the plus sign.
You see all the collected permissions from the Identity Governance catalog.
19. In the upper-right corner of the list, in the Search for permissions field, type
Estimates.
You see the following:
20. To add all displayed permissions, next to Permission Name, select the check-
box; then select Add (4).
21. From the top of the Estimates Permissions Role page, select the Active check-
box; then select the Save icon .
55
Identity Governance Workbook
1. From the left-panel, select Administration; then, from the list of administration
options, select Analytics and Role Mining Settings.
2. Scroll down until you see the following:
3. Next to the Name column heading, select the check-box; then, from the Actions
drop-down list, select Collect Metrics.
4. From the Collect Metrics dialog, select Collect Now.
Wait for the collection to finish.
56
Implementing Technical Roles
3. In the Minimum permissions field, type 2; then in the Minimum users field, type
2.
57
Identity Governance Workbook
6. Close the Permissions dialog; then, if desired, review any of the other role
candidates.
7. From the Role mining approach drop-down list, select Visual Role Mining.
You see the following:
58
Implementing Technical Roles
12. Under the Name column heading, select the Candidate technical role; then select
Edit.
The following is displayed:
59
Identity Governance Workbook
13. From the Technical Role Candidate page, replace the contents of the Name field
with Client and Projects Edit Role; then, from the Name field, copy the Client
and Projects Edit Role text.
14. In the Description field, replace the contents by pasting the text from the
previous step.
15. Set the Risk Level Configuration to a Normal value.
16. From the top of the page, from the Do you wish to promote this role candidate?
drop-down list, select Yes; then select the Save icon .
17. From the left-panel, under Catalog, select Roles.
You see the following:
60
Implementing Technical Roles
14. From the Reviews list, select Review Estimate and Invoice Access.
You see the list of users that meet the criteria as defined in the Review Estimate
and Invoice Access review.
61
Identity Governance Workbook
You were not aware that Kate has the permissions to qualify for the Estimates
Permissions Role technical role, so you need to address her permissions.
15. For the Kate Smith Estimates Permissions Role, select Remove; then, for all
other Review Items, select Keep.
16. In the upper-right corner of the Compare Project Roles page, select Submit 6
item(s).
17. Sign out as aspencer; then sign in as cnano.
18. From the left-panel, under Reviews, select Reviews.
19. From the Reviews list, select Review Estimate and Invoice Access; then, from
the Review Estimate and Invoice Access page, select the Review items tab.
Chip has the authority to inspect each Review item and could choose to override
the decisions made in the previous steps. In this case, he decides to approve the
review.
20. In the upper-right corner, in the Owner Approval box, select Approve.
The review is Certified.
21. From the left-panel, under Fulfillment, select Requests.
You see the following:
22. To fulfill the request, minimize Firefox; then, from the server desktop, open the
install folder.
23. From the file browser, browse to the /opt/netiq folder; then open the
mmpPermissions.csv file.
24. In the mmpPermissions.csv file, search for the permissions associated with
Estimates.
You see that the Permission ID values range from 50000 to 50300.
25. Close the mmpPermissions.csv file; then open the mmpAccounts.csv file.
26. Search for the Kate Smith user.
27. Edit the mmpAccounts.csv file by removing the 50000 level permissions from
Kate; then save and close the mmpAccounts.csv file.
28. Close the file browser; then maximize Firefox.
62
Implementing Technical Roles
29. From the Manual Fulfillment Requests page, next to the Task heading, select the
check-box; then, from the Actions drop-down list, select Fulfilled.
30. From the upper-right corner, select Submit 4 item(s).
31. From the left-panel, under Data Sources, select Applications.
32. For the ManageMyProject application, select the Collect Now icon
Wait while the collection takes place.
33. For the ManageMyProject application, select the Publish Now icon .
Wait while the publication takes place.
34. When finished, from the left-panel, under Fulfillment, select Status.
The following is displayed:
(End of Exercise)
63
Identity Governance Workbook
64
Using Identity Governance Policy
Las políticas muestran a los auditores externos que tiene estructuras establecidas
para garantizar el cumplimiento en su entorno. Las políticas de separación de
funciones funcionan para evitar que un solo usuario tenga demasiado acceso. Los
roles comerciales automatizan la aplicación del acceso apropiado en función de la
función laboral. Los factores de riesgo y la ponderación permiten que el gobierno de
identidad calcule el nivel de riesgo según sus criterios. Request automatiza la
concesión de acceso a las solicitudes de los usuarios al permitirle definir criterios
para otorgar automáticamente el acceso solicitado o las solicitudes de aprobación de
ruta a la entidad correspondiente.
Separation of Duties
Separación de deberes Los administradores pueden crear políticas para permitir que
Identity Governance busque usuarios y cuentas con demasiado acceso. Identity
Governance crea casos cuando encuentra violaciones, y los propietarios de políticas
revisan los casos y aprueban o resuelven las violaciones.
Cuando una persona en su empresa tiene acceso a demasiados sistemas, podría tener
problemas para demostrar que sus sistemas están a salvo de fraude cuando es hora
de auditorías.
El administrador de SoD debe ser un propietario de una empresa que comprenda los
niveles de acceso adecuados para las personas en su empresa. Al crear políticas para
evitar que una persona tenga demasiada responsabilidad, el Administrador de SoD
permite que el Gobierno de Identidad identifique a los usuarios con acceso a los
activos de la compañía que deben revisarse. Tener estas políticas de SoD pone las
reglas de control de acceso sobre sus sistemas comerciales para brindarle la
capacidad de mostrar a los auditores la protección automatizada que proporciona
Identity Governance.
Cuando tiene políticas activas de SoD, Identity Governance crea casos para
cualquier violación de las políticas y las enumera en la página de Violaciones. El
administrador de SoD o los propietarios de políticas revisan los casos para
determinar si los resuelven o los aprueban.
Los casos de SoD son similares al proceso de revisión estándar. En lugar de una
definición de revisión que se ejecuta en un horario regular, las políticas de SoD se
ejecutan siempre que estén activas y creen casos continuamente para violaciones.
65
Identity Governance Workbook
Business Roles
Identity Governance le permite administrar los roles técnicos y comerciales en su
organización. Para permitir una gestión más fácil de estos roles, Identity
Governance ve a los administradores de roles técnicos y administradores de roles
comerciales con responsabilidades separadas pero superpuestas.
Los roles comerciales organizan a las personas por su función comercial y los
atributos basados en el usuario para resolver preguntas a las que los usuarios deben
tener acceso debido a quiénes son o qué necesitan o podrían tener un opción de
solicitar sin aprobación adicional.
Access Requests
66
Using Identity Governance Policy
67
Identity Governance Workbook
6. In the Owners field, add Chip Nano; then set the Risk Level Configuration to a
high value.
7. Scroll down to the SoD Conditions area.
You see the following:
8. For the first condition, from the drop-down list, select User has one or more of
the following.
9. In the first condition area, select permissions; then, from the Search for and
select permissions page, search for the Proposals - Create permission.
10. Select the check-box for Proposals - Create; then select Add (1).
11. In the second condition area, verify that the drop-down list displays User has all
of the following.
12. In the second condition area, select permissions; then, from the Search for and
select permissions page, search for the Invoices - Create permission.
13. Select the check-box for Invoices - Create; then select Add (1).
You see the following:
14. From the top of the page, select the Save icon .
Wait a minute or two to make sure the policy runs its course. The following will
be displayed:
68
Using Identity Governance Policy
69
Identity Governance Workbook
70
Using Identity Governance Policy
8. From the Fulfillment Requests page, for the Josh Kelly Remove Permission
Assignment task, select Fulfilled; then, from the upper-right corner, select
Submit 1 item(s).
9. From the left-panel, under Data Sources, select Applications.
10. For the ManageMyProject application, select the Collect Now icon
Wait while the collection takes place.
11. For the ManageMyProject application, select the Publish Now icon .
Wait while the publication takes place.
12. When finished, from the left-panel, under Fulfillment, select Status.
You see that the status for the Remove Permission Assignment task is verified
fulfilled.
13. From the left-panel, under Policy, select Violations.
You see the following:
71
Identity Governance Workbook
72
Using Identity Governance Policy
(End of Exercise)
73
Identity Governance Workbook
NOTE: It is from this location that you create new approval policies. In this exercise, you use
the No Approval policy.
3. From the Business Roles page, select the Roles tab; then, next to Business Roles,
select the plus sign.
You see the following:
74
Using Identity Governance Policy
4. For Name, type Sales Director Proposal Access; then, copy the Sales Director
Proposal Access text.
5. In the Description field, paste the text from the previous step.
6. In the Grace period field, type 20.
The grace period determines the amount of time users are allowed to continue as
role members when they no longer meet the conditions of the business role
policy.
7. Set the Risk Level Configuration to a normal level.
8. From the Membership tab, select the Membership expressions section
heading; then, next to Add expression, select the plus sign.
You see the following:
9. In the Search for catalog attribute value or enter your own field, add Sales
Director.
You see the following:
75
Identity Governance Workbook
NOTE: This is the approval policy from the first part of the exercise.
76
Using Identity Governance Policy
21. From the Owners and Administration tab, select the Save icon ; then from the
displayed dialog, select Save.
22. From the Sales Director Proposal Access page, select Publish.
23. From the left-panel, under Fulfillment, select Requests.
The following is displayed:
24. To fulfill the requests, minimize Firefox; then, from the server desktop, open the
install folder.
25. From the file browser, browse to the /opt/netiq folder; then open the
mmpPermissions.csv file.
26. In the mmpPermissions.csv file, search for the Proposals permission.
You see that the Permission ID value is 40000.
27. Close the mmpPermissions.csv file; then open the mmpAccounts.csv file.
28. Search for the Chris Black user; then add the 40000 permission to Chris.
29. Search for the Ernie Euro user; then add the 40000 permission to Ernie.
30. Search for the Ricardo Castro user; then add the 40000 permission to Ricardo.
31. Save and close the mmpAccounts.csv file.
32. Close the file browser; then maximize Firefox.
33. From the Fulfillment Requests page, next to the Task column heading, select the
check-box; then, from the Actions drop-down menu, select Fulfilled.
34. From the upper-right corner, select Submit 3 item(s).
35. From the left-panel, under Fulfillment, select Status.
You see the following:
77
Identity Governance Workbook
37. For the ManageMyProject application, select the Collect Now icon
Wait while the collection takes place.
38. For the ManageMyProject application, select the Publish Now icon .
Wait while the publication takes place.
39. From the left-panel, under Fulfillment, select Status
You see fulfilling the Add permission to user tasks have been verified:
4. In the Group candidates by field, add Title; then select the Mine roles icon .
The following is displayed:
78
Using Identity Governance Policy
5. Under the # Users column, for the Acct Executive title, select 4.
You see the users that match the Acct Executive title criteria:
79
Identity Governance Workbook
9. Under the # Applications column, for the Acct Executive title, select 2.
You see the applications that the current Acct Executives are assigned:
12. From the drop-down list, select Create a single business role candidate; then,
in the Name field, type Default Acct Executive Permissions.
13. Select Create Candidates.
14. From the Business Roles page, select the Roles tab.
15. From the list of business roles, select Default Acct Executive Permissions;
then, from the displayed details page, select Edit.
16. In the Grace period field, type 20.
17. Set the Risk Level Configuration to a normal level.
18. From the Membership tab, select the Membership expressions section
heading.
You see the following:
80
Using Identity Governance Policy
22. From the dialog box select Close; then close the Analyze SoD Violations box.
23. To fix the potential SoD violation, for the Invoices Create permission, at the end
of the permission line, select the X.
24. In addition, remove the permissions associated with the IDM roles by selecting
the X for the Resource Administrator and Resource Manager permissions.
25. For each permission, change No Auto-Grant or Auto-Revoke to Auto-Grant
and Auto-Revoke.
26. Select the Authorized Applications section heading.
You see the applications that were added during the mining process.
27. Select the Owners and Administration tab.
You see the values that were added during the mining process.
28. Select the check-box for Automatic Fulfillment.
81
Identity Governance Workbook
29. From the Owners and Administration tab, select the Save icon .
30. Scroll to the top of the page.
You see the following:
31. From the Do you wish to promote the is role candidate? drop-down, select Yes;
then select the Save icon ;
32. From the Default Acct Executive Permissions page, select Publish.
33. From the left-panel, under Fulfillment, select Requests.
The following is displayed:
34. To fulfill the requests, minimize Firefox; then, from the server desktop, open the
install folder.
35. From the file browser, browse to the /opt/netiq folder; then open the
mmpPermissions.csv file.
36. In the mmpPermissions.csv file, search for the Proposals - Create permission.
You see that the Permission ID value is 40100.
37. Close the mmpPermissions.csv file; then open the mmpAccounts.csv file.
38. Search for the April Smith user; then add the 40100 permissions to April.
39. Search for the Ken Carson user; then add the 40100 permission to Ken.
40. Search for the Kevin Chang user; then add the 40100 permission to Kevin.
41. Save and close the mmpAccounts.csv file.
42. Close the file browser; then maximize Firefox.
43. From the Fulfillment Requests page, next to the Task column heading, select the
check-box; then, from the Actions drop-down menu, select Fulfilled.
44. From the upper-right corner, select Submit 3 item(s).
82
Using Identity Governance Policy
83
Identity Governance Workbook
84
Using Identity Governance Policy
29. Under Action heading, select Fulfilled; then select Submit 1 item(s).
30. From the left-panel, under Data Sources, select Applications; then, for the
ManageMyProject application, perform a Collect and Publish.
31. From the left-panel, under Fulfillment, select Status.
You see Kevin’s being removed from the business role is verified.
NOTE: This review is designed to review the members of the business role - not the permissions
assignment. In the exercise, Kevin was removed as a member of the business role, but his access to
the role permissions was not removed.
(End of Exercise)
85
Identity Governance Workbook
8. In the Search for catalog attribute value or enter your own field, add Account
Manager.
You see the following:
86
Using Identity Governance Policy
15. From the No Auto-Grant or Auto Revoke drop down list, select Auto-Grant and
Auto-Revoke.
16. Select the Authorized Applications section heading; then, next to Applications,
select the plus sign.
17. From the pop-out box, select Add applications from catalog.
18. From the Search for and select applications page, select the check-box for Utopia
Active Directory Driver; then select Add (1).
19. Select the Owners and Administration tab.
20. For Role owner, Role manager and Fulfiller, add Chip Nano.
21. For Approval Policy, add No Approval.
22. Select the check-box for Automatic Fulfillment.
23. From the Owners and Administration tab, select the Save icon ; then from the
displayed dialog, select Save.
24. From the Manager VPN Access page, select Publish.
25. From the left-panel, under Fulfillment, select Status.
The following is displayed:
87
Identity Governance Workbook
NOTE: If you are presented with the Single Sign On Setup Security Questions page, select the
IDM User App bookmark again.
28. From the top menu, select Roles and Resources; then, from the Role Catalog,
select VPN Access.
29. From the VPN Access page, select the Assignments tab.
You see that the five Account Manager users have been granted VPN access.
Take note of the Initial Request Description for each of the users.
30. Select Cancel; then, in Firefox, switch back to the Identity Governance tab.
31. From the left-panel, under Data Sources, select Applications; then, for the
Identity Manager Permissions application, perform a Collect and Publish.
32. From the left-panel, under Fulfillment, select Status
88
Using Identity Governance Policy
You see fulfilling the Add permission to user tasks have been verified:
(End of Exercise)
89
Identity Governance Workbook
4. For Name, type Request Proposals Permissions; then, copy the Request
Proposals Permissions text.
5. In the Description field, paste the text from the previous step.
6. From the list of sections, select the Allowed Users section heading; then, next to
Users, select the plus sign.
90
Using Identity Governance Policy
7. From the Search for and select users page, search for and select the check-boxes
for the following users: Kip Keller, Ned North, Sally South, Jay West, and
Cal Central; then select Add (5).
You see the following:
8. For Kip Keller, de-select the check-box for Self; then select the check-box for
Direct Reports.
9. From the New Access Request Policy page, select the Save icon .
10. From the Request Proposals Permissions page, select the Permissions tab; then,
next to Permissions, select the plus sign.
11. From the Search for and select permissions page, in the Search for permission
field, type proposals.
You see a list of four proposal permissions.
12. Select the check-boxes for the four Proposals permissions; then select Add (4).
The policy is automatically saved.
13. From the left-panel, under Policy, select Access Request; then, from the Access
Request Policies page, select the Approval Policies tab.
The following is displayed:
91
Identity Governance Workbook
14. From Access Request Approval Policies section, under the Name heading, select
Manager Approval.
15. For the Manager Approval policy, select Edit; then, from the Manager Approval
page, select the Permissions tab.
16. Next to Permissions, select the plus sign.
17. From the Search for and select permissions page, in the Search for permission
field, type proposals.
18. Select the check-boxes for the four Proposals permissions; then select Add (4).
The policy is automatically saved.
92
Using Identity Governance Policy
Notice that Kip cannot request access for himself, but he can request for the other
members of his team. (Those he can request for are highlighted in light blue.)
4. Select Cal Central.
You see Cal’s list of permissions to which he has access.
5. From the menu, select Request > Browse; then, from the Browse Requests page,
select the box for ManageMyProject.
You see the list of permissions that Kip is authorized to assign to Cal as defined
in the Access Request policy:
9. Next to Browse Requests, select the shopping cart icon; then, from the Confirm
and submit requests dialog, select Submit.
10. Sign out as ssouth; then sign in as kkeller.
93
Identity Governance Workbook
You see that Kip has one request awaiting his approval:
11. From the menu, select Approvals > My Approvals; then, under My Approvals,
select the box that contains the access request submitted by Sally South.
You see the following:
16. To fulfill the requests, minimize Firefox; then, from the server desktop, open the
install folder.
17. From the file browser, browse to the /opt/netiq folder; then open the
mmpPermissions.csv file.
18. In the mmpPermissions.csv file, search for the Proposals - Create permission.
You see that the Permission ID value for Proposals - Create is 40100.
19. Search for the Proposals - Edit permissions.
You see that the Permission ID value for Proposals - Edit is 40200.
20. Close the mmpPermissions.csv file; then open the mmpAccounts.csv file.
94
Using Identity Governance Policy
21. Search for the Sally South user; then add the 40100 and 40200 permissions to
Sally.
22. Save and close the mmpAccounts.csv file.
23. Close the file browser; then maximize Firefox.
24. From the Fulfillment Requests page, next to the Task column heading, select the
check-box; then, from the Actions drop-down menu, select Fulfilled.
25. From the upper-right corner, select Submit 2 item(s).
26. From the left-panel, under Fulfillment, select Status.
You see the following:
27. To verify the request, from the left-panel, under Data Sources, select
Applications; then, for ManageMyProject, perform a Collect and a Publish.
Wait while the Collect and Publish take place.
28. From the left-panel, under Fulfillment, select Status.
You see that the status for each of the add permission requests is Verified
fulfilled:
(End of Exercise)
95
Identity Governance Workbook
96
Integrating Identity Reporting
Identity Governance integrates with Identity Reporting to generate reports about the
status of reviews, collected and published data, and fulfillment. The Report
Administrator can create, run, and view reports. You can use Identity Reporting with
Identity Governance, as standalone installation, or run reports from an existing
installation of Identity Manager Identity Reporting.
In this section, you use Identity Reporting with Identity Governance in an
environment without Identity Manager.
You do the following exercise:
1. “Implement Identity Reporting” on page 98
97
Identity Governance Workbook
3. From the left-panel, select Data Sources; then, from the Data Sources page,
select the plus sign.
You see the following:
98
Integrating Identity Reporting
Username: igrptuser
Password: netiq000
5. Select Test Connection.
You see the following:
6. Select Save.
The data source is added:
99
Identity Governance Workbook
NOTE: In a non-lab environment, with Internet access, you would be able to perform any of
the displayed actions for your desired reports. Because Internet access is not available for the
labs in this course, the report source files have been downloaded for you and are stored on the
IG Server virtual machine. Instead of installing the report definitions from the Internet, you
import the source files from the server. The end-result is the same.
9. From the left-panel, select Import; then, from the Import Report Definitions
page, select Browse.
You see a list of report definition source files.
10. From the list, select the Catalog-Accounts-Details_3.0.0.0.rpz file; then select
Open.
The following is displayed:
12. In the yellow shaded area, select the link for Repository.
You see the newly-imported report definition.
13. From the definitions list, use the mouse pointer to hover over Catalog Accounts
Details.
You see the following:
100
Integrating Identity Reporting
17. In the yellow shaded area, select the link for Reports.
You see the completed report:
101
Identity Governance Workbook
102