General
Use this tab to enable or disable specific features, show user data and synchronization status, and to specify options for Separation of Duties, Security, User Access, Auditing, and Flier Notification.
| Attribute | Description | |
|---|---|---|
| General | Enable Bulk Load input file download | Select to add the Input File column in the log records
that are displayed after you upload Bulk Data Load files in
. For
each log record, the Input File column shows the The option applies to the Bulk Data Load tool in the Access Governance Core and Access Risk Controls modules. It does not apply in Access Risk Controls for SAP, where the column is never present. By default, the option is not selected. |
| Disable Access Certification dashboards | Select to disable all certification dashboards in the Service Center. | |
| Disable Access Requests dashboards | Select to disable all Access Requests dashboards in the Service Center. | |
| View Person's sensitive data | If selected, all personal data is visible to Verify Governancemodules; otherwise, it is hidden. | |
| View Person's synchronization status | If selected, the Sync column is added in the
Users list in . If there are
synchronization errors, between the Access Governance Core
records and the records that are stored in an external target, of a user's accounts, application
access, or rights, the Note that if you select this option, the
Fulfillment tab is removed from the right frame. The reason is that selecting
|
|
| Request Center Layout | Select how the Request Center tabs are to be
presented to the users holding administrative roles or users (for self-requests):
|
|
| View Statistics for Access Certification Campaigns | If selected, the Show Certification Progress Bar option is selected by
default in the Details page of the configuration of Access Certification
campaigns (). This means that the progress bars are directly displayed to
reviewers and supervisors in the Campaign summaries in Access Certification. If not selected, the Show
Certification Progress Bar option is unselected by default. This means that the progress
bars are displayed only if reviewers or supervisors select the By default, this attribute is selected. |
|
| Log Level |
Four different log levels can be set:
|
|
| Prevent account deletion when used in role(s) | With IBM Security Verify Governance v10.0 Fix Pack 2, the administrator has the capability to prevent an account from being deleted if it is associated with one or more roles. For more information, see Prevent account deletion if associated with a role | |
| SoD/External SoD | Enable Role Policy | If selected, all controls for role conflict (Access Risk Controls) are enabled, including controls for External SoD. |
| Enable external SoD | If selected, the information about risks associated to users will be provided by external systems. | |
| Split Role into Permissions | If selected, the common hierarchical structure of a Role is split into a flat collection of component Permissions, before sending it to an external SoD engine. | |
| Rest | With this radio button you can specify the REST service address. | |
| Class | With this radio button you can specify the Java Class used for managing external SoD. | |
| Security | Token Validity (minutes) | Indicates the time frame validity of the SAML token, expressed in minutes. The SAML token contains sensitive information related to the user accessing the system, and is used for different steps of the authorization process. |
| Password Hashing Algorithm | Select the algorithm to use for password hashing. ISVG v10.0.2 Fix Pack 3 release supports PBKDF2 with HMAC-SHA256 algorithm, in addition to the SHA-256 algorithm. To
use this feature, you must complete the following steps:
Attention:
|
|
| Access
Select what credentials are requested by the system to grant users access to the Service Center. |
Login UserID and Password | The credentials requested in the login phase are User ID and password. |
| Login User ID | Select this option if you are using a single sign-on authentication method that
is based on Open Id Connect (with external user registry only) or on ISAM (external authentication).
The identity of the user is paired with the name of an account that is owned by the user. These two
items are used to grant access to a user. When you select this option, you are asked to select an
account name in another window.
If the system uses external authentication for single sign-on and this option is not
selected, by default it authenticates with the See Single sign-on overview for reference. |
|
| Login DN | The credentials requested in the login phase include the distinguished name extracted from a digital certificate (generally stored into a smartcard). | |
| Login SAML | The credential requested in the login phase is a token SAML. | |
| Internal authorization | Select this option if you are using a single sign-on authentication method that
is based on LPTA keys (internal authentication). Note that this option nullifies the Forget
password feature.See Single sign-on overview for reference. |
|
| Auditing | Set Hour | If selected, sets the Start (hh:mm) attribute and changes the measurement
unit from minutes to hours of the Repeat every attribute. |
| Start (hh:mm) | Defines the time to start the daily audit task. | |
| Repeat every | Defines the snooze time (in seconds). | |
| Number of Lines | Number of lines involved in the audit process. | |
| Account Matching | Enable automatic account matching | When an automatic account creation is triggered, if this option is selected, the application
attempts to find an already existing unmatched account and to associate it to the user. If there is
no applicable unmatched account, the application creates a new account for the user. If the option is not selected, the application creates a new account without searching for unmatched accounts. |
| Flier Notification In the Administration Console and the Service Center, notifications to users are displayed in
self-dissolving fliers at the top of the current window.
Note: This applies only to user notification
messages. Messages that are issued following actions that involve the input or change of data are
shown in pop up windows.
|
Information message timeout (seconds) | Specify the number of seconds, from 1 to 60, that flier notifications for Information messages are displayed before dissolving. The default is 3 seconds. If you enter -1, users must click on the fliers to close them. |
| Warning message timeout (seconds) | Specify the number of seconds, from 1 to 60, that flier notifications for Warning messages are displayed before dissolving. The default is 5 seconds. If you enter -1, users must click on the fliers to close them. | |
| Error message timeout (seconds) | Specify the number of seconds, from 1 to 60, that flier notifications for Error messages are displayed before dissolving. The default is 10 seconds. If you enter -1, users must click on the fliers to close them. | |
| Custom Hierarchy | Hierarchy | For detailed information about this section, see Hierarchy options. |
- Custom hierarchy for role consolidation and connector sync
- Instead of the default hierarchy, you may choose a different (custom) hierarchy. From the drop-down list, select the type of hierarchy, for example - ORGANIZATIONAL_UNIT
- Hierarchy empty node retain option
-
Prior to ISVG 10.0.2 FP4 release, all the empty nodes in the custom hierarchy were automatically deleted. ISVG 10.0.2 FP4 release provides you the capability to either retain or delete the empty nodes in the custom hierarchy, as per your requirement.
- Consolidate role within assigned group
-
Use this check box to determine the behavior for role consolidation with respect to the groups (organization units) that are assigned to the role under Access Governance Core → Manage → Roles → Organization Units tab.
- Check box is not selected (Default behavior): When the check box is clear, the roles are consolidated for users in all the groups from the hierarchy that is selected in Custom Hierarchy field. Furthermore, any group from the hierarchy which is not already assigned to the role, will be assigned if that group has a user who was a part of the consolidation process.
- Check box is selected: When the check box is selected, the role will be consolidated for only those users in the groups that are already assigned to the role, belonging to the hierarchy selected in Custom Hierarchy field.
Note: In the scenario where this check box is selected but there are no groups assigned to the role before the role consolidation begins, the default behavior is applied (that is, the roles are consolidated for users in all the groups from the hierarchy that is selected in Custom Hierarchy field).
Click Save to record your selections.
- NightShiftAccessRiskControls
- HousekeepingCore
- Access the Task Planner module
- Select
- Select
- In the Details tab, set the name of the new task as SystemRiskAnalysis
- In the Scheduler combo box, select the Singleton scheduler
- Click Save
- Repeat steps 3, 4, 5 and 6 for a new task that you name BatchProccessedActionsAGC
- In the Task tab, select the NightShiftAccessRiskControls task
- Stop the task with
- Repeat steps 8 and 9 also for the HousekeepingCore task
- Select the stopped NightShiftAccessRiskControls task
- In the central frame, select the Job tab
- Select the SystemRiskAnalysis job and delete it with
- Select the stopped HousekeepingCore task
- In the central frame, select the Job tab
- Select the BatchProccessedActionsAGC job and delete it with
- In the Task tab, select the SystemRiskAnalysis task
- In the central frame, select the Job tab
- Select
- In the Specify a Job for This Task pop-up window, select the SystemRiskAnalysis job
- Click Ok
- Repeat steps 17,18 and 19 for the BatchProccessedActionsAGC task
- In the Add a Job to a Task pop-up window, select the BatchProccessedActionsAGC job
- Click Ok
- In the Task tab, select theNightShiftAccessRiskControls task
- Start the task with
- Repeat steps 25 and 26 for the HousekeepingCore, SystemRiskAnalysis, and BatchProccessedActionsAGC tasks
Prevent account deletion if associated with a role
- Log in to Administration Console as an administrator.
- Go to Access Governance Core.
- Go to the Settings > Core Configurations > General tab.
- Enable the check box Prevent account deletion when used in role(s).
Note: By default, this check box is not selected.
- Save the changes.
- When the check box is unchecked (Default behavior)
-
For example, consider a user ‘John’ has a Developer role, for which John requires an account Acct1 for each application. If administrator removes Acct1, then the account will be removed while preserving the Developer role membership to user John.
It is also possible to recover the deleted or missing account. Perform the following steps to recover the deleted or missing account:- Go to View Entitlement.
- In Account Selection, select the application for which you want to recover the deleted or missing account.
- Click Add New.
- In the Account Creation dialog, provide the required details, and save the changes.
- If the check box is selected
-
When the Prevent account deletion when used in role(s) check box is selected, if you try to delete an account that is used in one or more roles, an error message appears informing that the account is being used in the specified roles and hence cannot be deleted until you de-link the associated roles.
icon. An administrator can select this icon to get the file that was used in the
operation.