IBM Support

Dashboard settings need to be customized  for usability, performance, and scalability before deployment.

Preventive Service Planning


Abstract

IBM Security Identity Governance and Intelligence comes out of the box with all its dashboards enabled. A heavy dashboard use might impact performance. Before going into the deployment phase, you should check your environment so that you keep and customize the dashboards that you really need.

Content

The Dashboard settings need to be customized  for usability, performance, and scalability before deployment.  IBM Security Identity Governance and Intelligence encourages a customized user experience, while minimizing the performance impact, through the following levels of customization:

  • Customize, remove selected elements, or disable all dashboard elements based on Access Requests.
  • Customize, remove selected elements, or disable all dashboard elements based on Reports.
  • Disable all dashboard elements based on Access Certifier.
  • Disable all dashboards.

To disable all Access Certifier and Access Requests dashboards, administrators log in to the Administration Console->Access Governance Core->Settings->Core Configurations->General and in the General section select Disable certification dashboards and Disable Access Requests dashboards.

To enable or disable dashboard views of requests in the User Access Change context and of Daily Work in the Request Report context in Access Requests, administrators take the following steps:
  1. Log in to the Administration Console->Process Designer->Manage->Activity
  2. Select an activity with the User Access Change context or the Request Report (with the Daily Work functionality) context
  3. In the activity scope, go to the Required data tab and scroll down to the Enable dashboard field
  4. Select True or False to enable or disable the dashboard view of the activity

To customize Service Center dashboard elements in Report Designer, see Dashboards for Service Center.

[{"Product":{"code":"SSGHJR","label":"IBM Security Identity Governance and Intelligence"},"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Component":"--","Platform":[{"code":"PF004","label":"Appliance"}],"Version":"5.2.2","Edition":"","Line of Business":{"code":"LOB24","label":"Security Software"}}]

Document Information

Modified date:
16 June 2018

UID

swg21995884