12.07.2015 Views

CA Identity Manager Implementation Guide - CA Technologies

CA Identity Manager Implementation Guide - CA Technologies

CA Identity Manager Implementation Guide - CA Technologies

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Complying with Business Policies<strong>CA</strong> <strong>Identity</strong> <strong>Manager</strong> performs two types of policy validations:– ComplianceProposed changes are validated against the <strong>CA</strong> RCM role model tosee if they violate explicit, predefined business policy rules in <strong>CA</strong>RCM.– PatternProposed changes are compared to the <strong>CA</strong> RCM role model to see ifthey cause the subject of the change to become "out of pattern." <strong>CA</strong><strong>Identity</strong> <strong>Manager</strong> also makes sure that the changes do notsignificantly alter an established pattern in the role model.You can configure <strong>CA</strong> <strong>Identity</strong> <strong>Manager</strong> to perform these validationsautomatically when users perform certain tasks, or allow users toinitiate the validation manually.You can implement Smart Provisioning in an <strong>Identity</strong> <strong>Manager</strong> Environmentonce there is an established role model, based on <strong>Identity</strong> <strong>Manager</strong> data, in<strong>CA</strong> RCM.Note: For more information, see the Administration <strong>Guide</strong>.■<strong>Identity</strong> policiesYou can create a compliance policy, a type of identity policy (see page 21),which prohibits users from having certain privileges if they have otherprivileges. For example, you can prohibit users who can approve checks fromissuing checks.Compliance policies enforce a segregation of duties in your environment.■Compliance reports<strong>CA</strong> <strong>Identity</strong> <strong>Manager</strong> includes sample reports that display the compliancestatus for users in your environment. Using these reports, you can see whichusers are not compliant with your business policies.Compliance Reports<strong>CA</strong> <strong>Identity</strong> <strong>Manager</strong> includes the sample reports in the following table that youcan use to monitor compliance with corporate business policies.ReportRole MembersDescriptionDisplays the roles in the report database and liststhe members of those rolesChapter 2: Addressing Business Needs 23

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!