How To
Summary
A common requirement found in multiple deployments is the necessity to skip specific authorization steps, there are multiple ways of achieving this behavior from using custom rules that can be deployed/developed by professional services or utilizing IGI’s internal “no_required_approvers” property.
Document Location
Worldwide
[{"Business Unit":{"code":"BU048","label":"IBM Software"},"Product":{"code":"SSGHJR","label":"IBM Security Identity Governance and Intelligence"},"ARM Category":[{"code":"a8m0z0000001hilAAA","label":"Identity Governance \u0026 Intelligence-\u003EWorkflow"}],"ARM Case Number":"","Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"5.2.5;5.2.6","Line of Business":{"code":"LOB77","label":"Automation Platform"}}]
Log InLog in to view more of this document
This document has the abstract of a technical article that is available to authorized users once you have logged on. Please use Log in button above to access the full document. After log in, if you do not have the right authorization for this document, there will be instructions on what to do next.
Was this topic helpful?
Document Information
Modified date:
29 June 2020
UID
ibm16241606