Creating and Managing Business Roles
Creating and Managing Business Roles
Technical Roles
Document Control
View Documents
Business Role Manage Documents
Job Code = 5400
Account Administration
Accounting Clerk
View Bank Accounts
is authorized to have Manage Bank Accounts
View Payment Terms
Technical Roles
HR Tools
View Bank Accounts
NOTE: This chapter primarily discusses business role policy concepts and procedures. For
information about technical roles, see Chapter 16, “Creating and Managing Technical Roles,” on
page 171.
NOTE: Micro Focus recommends that you use this option if you have a large and complex
catalog, such as a catalog with a greater number of variations in extended attributes, with
multiple values of attributes, and a catalog size that slows role mining performance.
NOTE: Variations in the number of extended attributes, attributes with multiple values, or
overall catalog size may affect the performance of visual role mining. You might see invalid
results when mining larger or more complex data. You can disable this option by setting the
com.netiq.iac.analytics.role.mining.visual.hide global configuration property
to true. To optimize performance and to avoid invalid results, use the automated role mining
option to mine for roles.
Table 17-1 helps you determine the type of role mining to use.
If Then
You are not sure about where to start, have a small Select Visual Role Mining or Automated Role
catalog, and want Identity Governance to mine for Mining.
roles based on attributes specified in the role mining Modify the maximum number of results to
settings in Configuration > Analytics and Role Mining display for recommended attributes and the
Settings, and automatically suggest role candidates. required minimum number of members for each
role candidate.
Save the specified values to trigger the user
catalog analysis.
(Optionally) Click the gear icon to change the
specified values to optimize results and save the
values.
(For Visual Role Mining) Click an attribute node
(circle) to select a role candidate.
WARNING: You might not see recommendations
if the Settings > Minimum potential members
value is set too high, or if the role mining
settings in Configuration > Analytics and Role
Mining Settings do not meet the required
conditions. For more information, see
“Configuring Analytics and Role Mining Settings”
on page 319.
Click the Mining Results tab.
You do not know where to start, have large and Select Automated Role Mining.
complex data to mine, want Identity Governance to Modify the minimum number of attributes,
mine the data based on the attributes specified in the minimum number of occurrences, and
role mining settings in Configuration > Analytics and maximum results.
Role Mining Settings, and want to include minimum
occurrences of attributes as mining criteria without Modify the coverage criteria.
specifying any user attributes. NOTE: Identity Governance uses the permission,
the technical role, and application coverage
fields to determine which authorizations are
automatically populated in the business role
candidate. For example, if permission coverage
is at 50%, then 50% of the members must hold
the permission for Identity Governance to add it
as an authorization in the candidate. If it is
100%, then all members must hold the
permission for Identity Governance to add it as
an authorization.
Save the specified values to trigger the user
catalog analysis.
(Optional) Click the gear icon to change values
to optimize results and save the values to
refresh the candidate suggestions.
You want to direct the mining by specifying user Select Directed Role Mining.
attributes from the catalog. Specify the user attributes by entering the user
NOTE: When using this role mining option, you are attribute names or by searching for, and
not limited to using only the attributes included in selecting, the attributes based on the strength
the role mining settings in Configuration > Analytics of the recommendation.
and Role Mining Settings. Specify a minimum number of times the
attribute value must occur across users or the
percentage of all users who must have the
attribute value.
Specify additional coverage criteria.
Save the specified values to trigger the user
catalog analysis.
(Optional) Click the gear icon to adjust the
values to optimize results, then save the values
to refresh the candidate suggestions.
NOTE: Role recommendations are dependent on your data and role mining settings. To optimize
search results, administrators can modify default role mining settings in Configuration > Analytics and
Role Mining Settings. For more information see, “Configuring Analytics and Role Mining Settings” on
page 319.
After previewing users and their associated permissions, technical roles, and applications,
administrators can analyze specified potential role candidates to see if they duplicate existing roles
by matching on membership or authorizations. Existing roles that match the membership or
authorizations are displayed in the potential candidate list after performing the analysis.
Administrators can then choose not to create those candidates. Additionally, Identity Governance
could group common permissions under a technical role, and generate a technical role candidate for
each application.
NOTE: Identity Governance creates the mined business or technical roles in a candidate state.
Administrators can edit and save role candidates, but they must promote candidates before they can
activate them as roles. Administrators can also select multiple role candidates and submit them for
approval, publish them, or delete them using the options under Actions.
Identity Governance performs role mining as a background process. If you navigate from the role
mining page, role mining will continue. When you return to the role mining page, click Load Previous
Suggestions to list the mining suggestions, then create the business role candidates. The generated
role mining suggestions are available for 96 hours. You can adjust the mining retention interval by
selecting Configuration > Analytics and Role Mining Settings.
When you select Create business role hierarchy, you can select the attributes used in the role mining
as grouping attributes for the role hierarchy. For example, Figure 17-3 illustrates a company
organization chart in which each department includes job codes that represent positions. The
company wants to create departmental business roles for Engineering, Tours, Transportation and
Finance, as well as roles for each job code. Furthermore, they want an “All Department” role that
includes the Engineering department and all the other top-level departments. Selecting the
department attribute as the role hierarchy grouping attribute would create business roles that
mirror the organizational chart.
Figure 17-3 Company Organization with Department and Job Codes
All Employees
Tour Crew
TRS CRW
CANDIDATES The mining process created the business role, and the
administrators must promote it before they or others
can approve it (depending on the approval policy)
and publish it. This state corresponds to the internal
state called MINED.
NOTE: If you already generated new suggestions, you can click Load Previous Suggestions, click
Load for the mining suggestion you want to use to load potential role candidates, then skip to
Step 9. Only saved suggestions still within the specified retention interval appear as Previous
Suggestions.
6 Provide the requested role mining options relevant to the business role you want to create.
TIP: To differentiate among mining suggestions you generate, provide a description that lists the
attributes you want to use for role mining, or that specifies the purpose for the role.
7 Click Start.
8 Click Load next to the mining suggestion you want to use to load potential role candidates.
9 Select one or more potential candidates.
IMPORTANT: If you selected visual role mining, you must select one or more criteria from the
visual representation before you can select potential candidates.
NOTE: You can click Change Authorizations to modify the authorizations used to create the
mining suggestions. Changing the authorizations can modify the values for Users, Permissions,
Roles, and Applications.
NOTE: If you choose to create a business role candidate with members and authorizations that
match those in existing roles, you can analyze the candidate to calculate the match percentage.
For more information, see Section 17.6, “Analyzing Business Roles,” on page 202.
NOTE: The number of available levels is one less than the number of attributes you selected in
Role Mining Options. For example, if you selected three attributes, you would be able to group
the roles for up to two levels.
17 On the Roles tab, select one or more newly generated inactive roles.
NOTE: Identity Governance creates role candidates in a pending state, and administrators must
promote them before anyone can either approve the role candidates or publish them as a role.
Click the role candidate to ensure that the membership criteria and authorizations are as you
want them to be before publishing. You can edit the role candidate to make necessary changes.
After you create the business role and assigned owners and administrators, the business role is ready
for approval, depending on your approval policy. The approval policy allows you to have people
review the business role and approve or request changes to the business role. For more information,
see Section 17.4, “Adding a Business Role Approval Policy,” on page 200.
To detect users that meet the business role criteria in reviews or in the catalog, you must publish the
business role. For more information, see Section 17.5, “Publishing or Deactivating Business Roles,”
on page 200.
NOTE: A grace period specifies the number of days that you want Identity Governance to
consider the user as a member of the role when it detects that the member no longer
meets the membership policy requirements.
Risk level
5 Select the Membership tab, if not already selected, and provide information for one or
membership configuration items. For detailed information see Section 17.3.3, “Configuring
Business Role Membership,” on page 196.
6 Select the Authorizations tab, then provide configuration information for one of more of the
authorization configuration items.
NOTE: Applications must have an account collector to allow you to specify automatic grant or
revoke.
For detailed information about authorizing permissions, technical roles, and applications, see
Section 17.3.4, “Adding Authorizations to a Business Role,” on page 197.
7 Select the Owners and Administration tab to assign ownership for the following:
Role owner
Role manager
Fulfiller
Categories
Approval Policy
NOTE: If you do not make selections on this tab, Identity Governance makes default
assignments for the owner and fulfiller and assigns a default approval policy to the business
role.
8 (Optional) On the Membership tab, click View Membership to view the list of business role
members.
NOTE: During migration or upgrades, you must always run publication to refresh the list of
business role members. For more information about publishing data sources, see Chapter 8,
“Publishing the Collected Data,” on page 99.
NOTE: When editing an existing business role, the Owners and Administration tab has a
separate Save button, which allows you to change these items independent of other items that
refer to the business role.
NOTE: Business role authorization of a resource (permission, technical role, or application) for a user
is independent of assigning the resource to the user. For example, the business role might authorize
a user to have a permission, but Identity Governance might not have assigned the permission.
Similarly, Identity Governance might have assigned a permission, but the business role might not
authorize the permission.
Included Membership
Optionally, specify business roles whose membership criteria, users, and groups you want to
include in the new business role. When combining the included roles, Identity Governance
includes only membership of published roles and eliminates duplicates. For example, you can
include BR1 and BR2 in the membership of BR3. Then, role BR3 becomes the union of BR1 and
BR2 along with any membership criteria specified for BR3.
NOTE: Excluded members of the including role takes precedence over the inclusion of included
business role members. For example, when BR3 includes BR1, and BR1 has a member User A,
and BR3 excludes User A then Identity Governance also excludes the user.
Also, note that Identity Governance does not allow circular inclusions. For example, you:
Cannot include BR1 in BR1 (self inclusion)
Cannot include BR2 in BR1 then include BR1 in BR2
Cannot include BR2 in BR1 and BR3 in BR2 and then include BR1 in BR3
TIP: When adding date attributes such as start date to membership expression, you can specify
a date using the calendar date picker or use the date formula. For example, if you want to
automatically make new employees a member of a business role two days before their start
date, use the date formula.
NOTE: Excluding a user or group takes precedence over including them. For example, suppose
you include the Sales group and exclude the Contractors group. Then, Identity Governance
would exclude a user who belongs to both of those groups because exclusion takes precedence
over inclusion.
You can click View Membership to view the list of business role members.
NOTE: During migration or upgrades, you must always run publication to refresh the list of business
role members. For more information about publishing data sources, see Chapter 8, “Publishing the
Collected Data,” on page 99.
NOTE: If you specify auto-grant or auto-revoke on this kind of permission, the selected option
does not apply to any of the contained permissions. This is because if you grant or revoke a
permission that is an Identity Manager role that contains other contained Identity Manager
roles and Identity Manager resources, the Identity Manager system automatically grants or
revokes any contained Identity Manager roles and resources.
Authorized Applications
Identity Governance might preauthorize applications when you mine for roles or you might
need to define them. If needed, define which applications the members of the business role are
authorized to hold. This means Identity Governance can create accounts for the members of the
business role in the listed applications. Select applications from the entire catalog or from a list
of applications held by the business role members. Specify whether Identity Governance should
or should not automatically grant or revoke the application authorization. If needed, select the
calendar control to set an authorization period for when the members of the business role have
access to the application. The authorization policy can authorize a user in the business role to
have accounts in the applications included in the authorization policy.
NOTE: Applications must have an account collector to allow you to specify automatic grant or
revoke.
You can change the approval policy for a group of business roles at the same time by using the bulk
action on the business role list. You can also download business role approval policies as JSON files
using the bulk action menu. After editing, you can import the policies on the page that lists all
approval policies.
NOTE: Deactivating a business role disables the role from being a part of the review process and
removes resource authorizations from its members for its resources. However, deactivation
does not issue auto-revoke requests for resources that specify auto-revoke, and does not
change or retract any current or pending auto-grant or auto-revoke request.
or
If you have multiple versions of the business role, select the Draft or Published tab, then select
Publish or Deactivate.
NOTE: You must have two versions of the business role to have the Draft and Publish tabs
appear.
If you have many business roles that need to be published, Identity Governance provides a way to
publish all of the roles at the same time. On the Business Roles page, select the business roles to
publish, then select Actions > Publish.
NOTE: You can perform Business role similarity and Common authorizations analysis on
published or unpublished business roles, while you can perform Authorization effectiveness,
Mandatory authorizations, and Auto-grant authorization analysis only on published business
roles. If there are unpublished business roles in the list selected for Authorization effectiveness,
Mandatory authorization, and Auto-grant authorization analysis, Identity Governance highlights
them and skips them during analysis.
NOTE: We recommend that you think through business role definitions and add all members
and authorizations before publishing. If you need to make changes after publishing, keep in
mind that business role detections compare your last published state with the current state and
automatically generate grants and revocations if auto-grants and auto-revoke settings are
enabled. Also, note that the membership policy of a business role can include members from
other published business roles, however, circular inclusions are not allowed.
Identity Governance creates a draft of the business role for you to edit on the Draft tab.
5 Make the appropriate changes to the business role.
6 Select Save to save the draft.
7 (Conditional) Click Compare with published to compare the draft version with the published
version of the business role to ensure that the changes are correct.
8 (Conditional) If the business role approval policy requires approval, when the draft is ready for
approval, click Submit for approval. If the business role approval policy does not require
approval, the draft is automatically approved whenever you save your edits.
9 After you approve a draft, select Publish to publish it.
When you delete a published business role, Identity Governance archives the business role for
reporting and auditing purposes.
NOTE: During detection, Identity Governance monitors when a user gains or loses an authorization,
or when an authorization changes its auto-grant or auto-revoke policy. When Identity Governance
observes these kinds of changes, it triggers an evaluation of whether it needs to issue the auto
requests. However, detection does not monitor changes in user resource assignments. Authorization
for a resource is not the same thing as being assigned a resource. Since the detection process does
not monitor the assignment changes, assignment changes do not trigger an evaluation of whether to
issue the auto requests.
Figure 17-5 Business Role (Permissions and Applications) Automated Access Provisioning and Deprovisioning Process
The events that trigger Identity Governance to perform business role detections do not necessarily
result in Identity Governance issuing auto-grant or auto-revoke requests. The rules that trigger a
detection are different from the rules that govern whether Identity Governance will issue the auto
requests. For example, deactivating a technical role that is an authorized resource of a business role
NOTE: If a business role authorizes a technical role and a new permission is added to the
technical role, it ultimately results in a new authorization for that permission for all of the
business role members.
An authorization that is auto-granted and was not previously in its validity period enters its
validity period.
An authorization that is in its validity period changes from not auto-granted to auto-granted.
A user loses an authorization for a resource that is auto-revoked.
This might occur because a user lost membership in a business role, an authorization was
removed from a business role that the user is a member of, the business role is deleted, or the
business role is deactivated.
NOTE: When evaluating whether to issue an auto-revoke request, Identity Governance ignores
the loss of authorizations that occurs because an administrator deactivated the business role.
If a business role authorizes a technical role and a permission is deleted from the technical role,
it ultimately results in the members of the business role losing their authorization for that
permission. If the technical role itself is deleted, it ultimately results in the members of the
business role losing authorization for all of the permissions that were contained in that
technical role. However, if a technical role is simply deactivated rather than being deleted,
business role authorizations stemming from that technical role are not lost.
An authorization that is auto-revoked and was not previously in its validity period exits its
validity period.
An authorization that is not in its validity period changes from not auto-revoked to auto-
revoked.
During phase one, after Identity Governance calculates a business role's membership and
authorizations, it determines what other business roles include the members of the business role
and schedules single-role detections for each of those business roles. This occurs whether Identity
Governance detects BR1 during an all business role detection or during a single-role detection for
just BR1 because changes to the membership of a business role affect the membership of any
business roles that include it. For example, if BR1 is included by BR2 and BR3, after calculating
membership and authorizations for BR1, Identity Governance schedules single-role detections for
BR2 and BR3.
In phase two of detection, using the information collected in phase one, Identity Governance
determines what, if any, auto requests it should issue. For specific conditions that could result in
auto-grant requests being issued, see Section 17.9.2, “Automatic Provisioning Requests,” on
page 208. For specific conditions that could result in Identity Governance issuing auto-revoke
requests, see Section 17.9.3, “Automatic Deprovisioning Requests,” on page 209.
Some of the conditions that could result in Identity Governance issuing an auto-grant or an auto-
revoke request involve compensating for in-progress requests that would change whether a user has
a particular resource. An administrator can configure Identity Governance to compensate for in-
progress requests. For more information about compensating requests, see Section 17.9.4,
“Managing Compensating Requests,” on page 210.
NOTE: Identity Governance considers a request as pending until it is in a final state. Final states
include the following states: rejected by fulfiller, fulfillment error, fulfillment timed out,
completed and verified, completed and not verified and verification ignored, or completed and
verification timed out.
There is no previously issued auto-grant request from a business role detection for the user +
resource that is still in-progress. Auto-grant requests in a final state (see above) are obviously no
longer in progress. In addition, a request that has completed (marked as fulfilled) is not
considered to be in-progress, even though it might not yet be in verified, not verified and
verification ignored, or verification timed out state.
NOTE: When auto-grant option is enabled for a technical role resource, Identity Governance
generates fulfillment requests for the permissions that make up the technical role, but does not
generate fulfillment requests for the technical role assignment itself. Instead, Identity
Governance makes a technical role assignment immediately if it determines that the user does
not currently have the technical role assignment. Because there is no fulfillment request for
NOTE: Identity Governance considers a request to be pending until it is in a final state, which
includes the following states: rejected by fulfiller, fulfillment error, fulfillment timed out,
completed and verified, completed and not verified and verification ignored, or completed and
verification timed out.
There is no previously issued auto-revoke request from a business role detection for the user
and resource that is still in progress. Auto-revoke requests in a final state (see above) are
obviously no longer in progress. In addition, Identity Governance does not consider a request
that has been completed (marked as fulfilled) to be in-progress, even though it might not yet be
in verified, not verified and verification ignored, or verification timed out state.
NOTE: When the auto-revoke option is enabled for a technical role resource, Identity
Governance generates fulfillment requests for the permissions that make up the technical role,
but does not generate fulfillment requests for the technical role assignment itself. Instead,
Identity Governance removes a technical role assignment immediately if it determines that the
user currently has the technical role assignment. Because there is no fulfillment request for
removing technical role assignments, the previous comments about Identity Governance
checking for completed and in-progress pending fulfillment requests do not apply in the case of
removing technical role assignments.
The above conditions apply only to published business roles. Identity Governance ignores
deactivated business roles when determining if all conditions are met. The following scenario
provides an example of automatic deprovisioning.
Scenario 1: An authorized permission is removed from a business role
1. BR1 authorizes permission X and specifies auto-grant and auto-revoke on it.
2. User A is a member of BR1 and currently has permission X.
3. A business role administrator removes the permission X authorization from BR1 and re-
publishes BR1. This action triggers business role detection on BR1.
NOTE: Identity Governance rules for generating compensating requests are applicable to the
permissions that make up the technical role but are not applicable to technical role assignments.
The technical roles are managed and provisioned by Identity Governance itself. Auto-grant and auto-
revoke of technical role assignments do not involve generation of fulfillment requests because there
is no external data source for technical role assignments. Identity Governance makes or removes a
technical role assignment immediately and does not trigger fulfillment requests or compensating
requests.
Administrators can configure the types of requests for which Identity Governance might issue a
compensating request. The type of request indicates the Identity Governance process from which
the request originated. It might be an access request, a review, or a resolution of separation of duties
violations.
NOTE: Identity Governance always compensates for pending requests that originated from the
business role detection process.
The following scenarios provide a few examples of when Identity Governance would issue
compensating requests.
NOTE: There will never be pending revoke requests or in-progress auto-grant requests for technical
role assignments because Identity Governance always removes and fulfills technical role
assignments immediately.
NOTE: There will never be pending grant requests or in progress auto-revoke request for technical
role assignments because Identity Governance always removes and fulfills technical role
assignments immediately.
com.netiq.iac.brd.log.detected.members
When set to true this configuration property causes business role detection to store the list of
users who were added to and removed from a business role during the detection.
com.netiq.iac.brd.log.detected.auths
When set to true this configuration property causes business role detection to store the list of
authorizations that were added and deleted during the detection.
com.netiq.iac.brd.log.detected.autorequests
When set to true this configuration property causes business role detection to store the list of
auto-grant and auto-revoke requests that Identity Governance issued during the detection.
NOTE: Identity Governance does not automatically publish imported business roles. You must
publish them in order for them to take effect in the system. For more information, see
“Publishing or Deactivating Business Roles” on page 200.
11 (Conditional) If you import more than the preconfigured threshold for the number of roles that
can be displayed on the import page, Identity Governance will switch to bulk import mode.
When in bulk mode, instead of selecting whether to create, update, or handle conflicts for
specific roles, you can select to import all new roles and update all existing roles. For conflicts,
you can choose to either overwrite existing roles or create new roles.
NOTE: The default value for roles that can be displayed is 200 or the value specified in the
com.netiq.iac.importExport.maxImportsToDisplay property.
12 (Optional) Download the auto-generated import report from the download area. The import
report will identify what was imported as well as call out any unresolved references.
NOTE: The default value for policies that can be displayed is 200 or the value specified in
com.netiq.iac.importExport.maxImportsToDisplay property.
11 (Optional) Download the auto-generated import report from the download area. The import
report will identify what was imported as well as call out any unresolved references.