Verify Governance (Identity Governance)

IBM Security Verify Governance (Identity Governance and Intelligence) is a network appliance-based integrated identity governance solution.
This solution employs business-centric rules, activities, and processes.

Verify Governance (Identity Governance) Courses:

A Day in the Life of a Line of Business Manager

These labs show a day in the life of a line of business manager, who uses IBM Security Identity Governance and Intelligence (IGI) to manage accesses for his team members.

IGI Access Risk Control modeling overview

The Access Risk Controls module of IBM Identity Governance and Intelligence (IGI) enforces Segregation of Duties (also known as Separation of Duties, or SoD) checks, based on relationships established between the Business Activities layer (BA) and the Role-Based Access Controls model (RBAC).

IGI Certification campaign redirection

This lab provides a real business user experience with certification campaigns in IGI, and focuses on certification campaign redirections.

IGI Certification Campaigns overview labs

Certification campaigns are a formal process that automates the periodic review of a given relationship, and enables critical access decisions by nontechnical line of business managers.

These labs show how administrators configure certification campaigns to satisfy the company's business needs, and how business users (campaign reviewers and supervisors) operate and interact during a certification campaign.


IGI Overview

Overview

IBM Security Identity Governance and Intelligence (IGI), is an appliance-based integrated identity governance solution. This solution employs business-centric rules, activities, and processes. It empowers line-of-business (LOB) managers, auditors, and risk managers to govern access and evaluate regulatory compliance across enterprise applications and services.

Objectives
This lab provides a brief tour of the available applications to help you become familiar with the IGI user interface.

  • Tour of the Administration Console
  • Tour of the Service Center
  • Access Governance Core
  • Managing the exchange of data
    • Loading data by using the Bulk Data Load tools
    • Loading data by using the Enterprise Connectors
  • Role lifecycle management
    • Exploring roles
    • Exploring role mining
  • Access risk control modeling
  • Certification campaigns
  • Reporting
  • Automating tasks
  • Tour of the Virtual Appliance console

IGI role lifecycle management overview lab

A role identifies the set of permissions that are assigned to a user. These permissions are assigned to a user to allow access to the resources of an organization. These labs will teach you how roles are created and managed in IGI.

Multi-step certification campaigns

A multi-step certification campaign is a review that involves multiple sequential review steps. The exercises in this lab describe the steps to create and run a multi-step certification campaign. You act as the managers involved in the review, and as certification supervisor.

Active Directory integration

The exercises in this lab describe the steps required to manage and govern users and groups on a Windows domain, by using IBM Security Identity Governance and Identity.

User Interface and branding customization

The exercises in this lab describe several configurations that you can perform to customize your IGI environment to fit your company branding, visual identity, and preferences.