Recertification policies and access control items
Recertification policies can also be targets of access control items.
IBM Verify Identity Governance provides default access control items that target recertification policies. The default access control items are described in Table 1.
Who has access | Target object and access control item | Effect |
---|---|---|
Service owner group | Recertification policy - add, modify, remove, or search | Allow service owners to manage recertification policies. |
Auditor or manager group | Recertification policy - search | Allows members of the auditor group or manager group to search or view recertification policies. |
Auditor, manager, or service owner groups | Reports (pending recertification, history, and policies) - run operation | Allows members of these groups to view these reports. |