Recertification policies and access control items

Recertification policies can also be targets of access control items.

IBM Verify Identity Governance provides default access control items that target recertification policies. The default access control items are described in Table 1.

Table 1. Recertification policies and access control items
Who has access Target object and access control item Effect
Service owner group Recertification policy - add, modify, remove, or search Allow service owners to manage recertification policies.
Auditor or manager group Recertification policy - search Allows members of the auditor group or manager group to search or view recertification policies.
Auditor, manager, or service owner groups Reports (pending recertification, history, and policies) - run operation Allows members of these groups to view these reports.