IBM Support

How to execute operations on Identity Governance & Intelligence (IGI), without triggering new events.

Troubleshooting


Problem

In this abstract, we will use the term end-point to reference any mechanism that is used to communicate with a system, being ISIGADI, Identity Broker or manual operations. When administrators are required to perform specific operation at IGI that trigger a mass changes, e.g.: removing an application or permission, that can cause critical problems if those events are processed by IGI. For instance, if not synchronized for a long time, ISIGADI might lose its ability to reflect changes made at ISIM in IGI, meaning that the user information will not be aligned between both systems.

[{"Product":{"code":"SSGHJR","label":"IBM Security Identity Governance and Intelligence"},"Business Unit":{"code":"BU048","label":"IBM Software"},"Component":"General Information","Platform":[{"code":"PF004","label":"Appliance"}],"Version":"Version Independent","Edition":"All Editions","Line of Business":{"code":"LOB77","label":"Automation Platform"}},{"Product":{"code":"SSGHJR","label":"IBM Security Identity Governance and Intelligence"},"Business Unit":{"code":"BU048","label":"IBM Software"},"Component":" ","Platform":[{"code":"","label":""}],"Version":"","Edition":"","Line of Business":{"code":"LOB77","label":"Automation Platform"}}]

Log InLog in to view more of this document

This document has the abstract of a technical article that is available to authorized users once you have logged on. Please use Log in button above to access the full document. After log in, if you do not have the right authorization for this document, there will be instructions on what to do next.

Document Information

Modified date:
16 June 2018

UID

swg22016008