Verify Governance (Identity Governance)
Verify Governance (Identity Governance) Courses:
These labs show a day in the life of a line of business manager, who uses IBM Security Identity Governance and Intelligence (IGI) to manage accesses for his team members.
The Access Risk Controls module of IBM Identity
Governance and Intelligence (IGI) enforces Segregation of Duties (also
known as Separation of Duties, or SoD) checks, based on relationships
established between the Business Activities layer (BA) and the
Role-Based Access Controls model (RBAC).
This lab provides a real business user experience with certification campaigns in IGI, and focuses on certification campaign redirections.
Certification campaigns are a formal process that automates the periodic review of a given relationship, and enables critical access decisions by nontechnical line of business managers.
These labs show how administrators configure certification campaigns to satisfy the company's business needs, and how business users (campaign reviewers and supervisors) operate and interact during a certification campaign.
Overview
- Tour of the Administration Console
- Tour of the Service Center
- Access Governance Core
- Managing the exchange of data
- Loading data by using the Bulk Data Load tools
- Loading data by using the Enterprise Connectors
- Role lifecycle management
- Exploring roles
- Exploring role mining
- Access risk control modeling
- Certification campaigns
- Reporting
- Automating tasks
- Tour of the Virtual Appliance console
A role identifies the set of permissions that are assigned to a user.
These permissions are assigned to a user to allow access to the
resources of an organization. These labs will teach you how roles are created and managed in IGI.
A multi-step certification campaign is a review that involves multiple sequential review steps. The exercises in this lab describe the steps to create and run a multi-step certification campaign. You act as the managers involved in the review, and as certification supervisor.
The exercises in this lab describe the steps required to manage and govern users and groups on a Windows domain, by using IBM Security Identity Governance and Identity.
The exercises in this lab describe several configurations that you can
perform to customize your IGI environment to fit your company branding,
visual identity, and preferences.