IBM Security Identity Governance and Intelligence, Version 5.2.1

Personas and use cases

Persona is a user archetype based on role and other characteristics that influence how a user interacts with the offering. A Persona has a related set of responsibilities. In Identity Governance and Intelligence, you can represent those responsibilities by implementing Roles, and assigning them to Users. Any Role can be associated with any set of tasks, dashboards, reports, campaigns, and other resources. This topic provides examples of tasks that a certain Role can perform.

The main personas are:
Administrators
Business users

Business users are defined in the Regular Users schema and can perform tasks in the Service Center.

Virtual appliance administrators

The Virtual appliance administrator is responsible for the setup and activation of the Identity Governance and Intelligence virtual appliance and for its day-to-day administration. See the following tables for the Virtual appliance administrators deployment and maintenance tasks.

Table 2. Virtual appliance administrators maintenance tasks
Tasks Subtasks and references
Prepare for disaster recovery. Set up a secondary virtual appliance for an active-passive configuration.
  1. Setting up a primary virtual appliance
  2. Backing up the virtual appliance
  3. Reverting the virtual appliance to its backup
  4. Creating a snapshot of the virtual appliance
  5. Setting up a secondary virtual appliance
Monitor event logs, memory, CPU, storage, and cluster status.
Configure SNMP monitoring. Managing the SNMP monitoring
Configure external entities such as database servers, and OpenID connect providers.
Configure mail servers, custom files, and certificate stores.
Manage the virtual appliance update history, and license, firmware settings, and fix packs.
Manage log retrieval and configuration, core dumps, Identity Brokerage Providers configuration, and build information.
Manage network settings such as application interfaces, hosts files, routes.
Manage the Export/Import settings Exporting or importing the configuration settings
Manage the virtual appliance system settings
Manage the virtual appliance by using the command line interface.

Back to top

Identity Governance and Intelligence administrators

An Identity Governance and Intelligence administrator, also called Super Administrator is predefined. This Super Administrator is responsible for defining other Identity Governance and Intelligence administrator profiles in the Administration Console by using a free configuration of N base permissions.

The Super Administrator can define an Identity Governance and Intelligence administrator as:
  • An administrator of a single module or of all the Identity Governance and Intelligence modules.
  • An administrator who is authorized to perform a selected set of tasks on module A, B, and others.

See Super Administrator for examples of tasks that a Super Administrator can perform.

See the following references for examples of tasks that an Identity Governance and Intelligence administrator can perform, when granted access to any of these modules.
Examples of Identity Governance and Intelligence administrators that can be defined and used in the system:

Back to top

Super Administrator

A Super Administrator can perform the following tasks in the Administration Console:

Table 3. Super Administrator tasks
Tasks Subtasks and references

For target integration, configure the target system.

Configure the initial entities.
Configure organizational units.
Configure groups.

Configure roles.

On-board administrators.
  1. Create the Administrator role. See Admin Roles.
  2. Assign organization units to the Administrator role. See Org Units.
  3. Assign users to the Administrator role. See Users.

On-board users. For example, a new employee UserA, joined the organization.

Add entitlements to the on-boarded user, such as an external role. For example, assign UserA with the external role Senior Developer on the Data Manager application.

Enable a custom Segregation of Duties policy.

  1. Enable the external Segregation of Duties feature.
  2. Set up the external service, which can be a REST WEB Service or an implementation of a JAVA interface.

See General

Define a certification campaign.

Change account passwords for users.

Changing user passwords

Force users to change their Service Center password on their next login.

Forcing a password change

Configure the password service.

Configure the Access Requests workflows for change password, forgot password, or password reset functionalities.

Configuring the password service in Process Designer

Configure and assign dashboards.

Back to top

Access Risk Controls module

Administrators, who are granted access to the Access Risk Controls module, can perform the following tasks:
Table 4. Sample tasks in the Access Risk Controls module
Tasks Subtasks and references
Model a business activity tree structure. Business activities
Associate the permissions to one or more activities. Business activity mapping
Set mitigation controls. Mitigation controls
Define risks. Risk definition
Define domains. Domains
Evaluate risk violations. Risk violations
Compare configurations. Configuration comparison
Request or download report. Report

Back to top

Process Designer module

Administrators, who are granted access to the Process Designer module, can perform the following tasks:
Table 5. Sample tasks in the Process Designer module
Tasks Subtasks and references
Define activities that can be associated to a process. Activity
Design a process. Process
Assign one or more administrative roles to each activity defined in the process. Assign
Configure the Access Requests workflows for change password, forgot password, or password reset functionalities.

Password administration

Back to top

Access Optimizer module

Administrators, who are granted access to the Access Optimizer module, can perform the following tasks:
Table 6. Sample tasks in the Access Optimizer module
Tasks Subtasks and references
Configure and compare data snapshots. Data snapshot
Define access data sets. Access data sets
Configure relevance criteria. Relevance criteria
Create and manage a data exploration analysis. Data Exploration analysis and details
Create a role mining request. Role mining

Back to top

Report Designer module

Administrators, who are granted access to the Report Designer module, can perform the following tasks:
Table 7. Sample tasks in the Report Designer module
Tasks Subtasks and references
Create and customize report queries. Query
Create and customize reports. Report
Create and customize dashboard items. Dashboard
Assign the product report to a user or an entitlement. Report assignment
Organize the product reports. Menu

Back to top

Task Planner module

Administrators, who are granted access to the Task Planner module, can perform the following tasks:
Table 8. Sample tasks in the Task Planner module
Tasks Subtasks and references
Add jobs and configure job class attributes. Jobs
Create and configure tasks, define job class parameters, and configure scheduling. Tasks
Synchronize tasks to the selected scheduler. Scheduler
Group tasks by context. Context

Back to top

Application Managers

Application Managers, with administrative rights, can perform any of the following tasks in the Administration Console.

Table 9. Application Managers tasks in the Administration Console
Tasks Subtasks and references

For target integration, configure the target system.

On-board users. For example, a new employee UserA, joined the organization.

  1. Create the user profile. See Users.
  2. Assign user to a role. See Users.
  3. Assign an entitlement to the user. See Entitlements.
  4. Assign resources to the user. See User Resources.
  5. Create and manage the accounts for the registered user. See Accounts.
  6. Assign rights. See Rights.
  7. Set a mitigation action if the user is assigned with a risk level. See Mitigations.

Add entitlements to the on-boarded user, such as an external role. For example, assign UserA with the external role Senior Developer on the Data Manager application.

  1. View the permissions that are defined for the application.
    • Search for the external role you want to assign.
    • Check whether the external role configuration is set for user assignment on the target system.

    See Application Access.

  2. Add the entitlement. Assign the external role to the on-boarded user. See Entitlements.
  3. Check whether the assignment event Add Permission is generated for the external role. See Events.

Enable a custom Segregation of Duties policy.

  1. Enable the external Segregation of Duties feature.
  2. Set up the external service, which can be a REST WEB Service or an implementation of a JAVA interface.

See General

Back to top

User Managers

User Managers, with administrative rights, can perform any of the following tasks in the Administration Console.

Table 10. User Managers tasks in the Administration Console
Tasks Subtasks and references

On-board users. For example, a new employee UserA, joined the organization.

  1. Create the user profile. See Users.
  2. Assign user to a role. See Users.
  3. Assign an entitlement to the user. See Entitlements.
  4. Assign resources to the user. See User Resources.
  5. Create and manage the accounts for the registered user. See Accounts.
  6. Assign rights. See Rights.
  7. Set a mitigation action if the user is assigned with a risk level. See Mitigations.

Add entitlements to the on-boarded user, such as an external role. For example, assign UserA with the external role Senior Developer on the Data Manager application.

  1. View the permissions that are defined for the application.
    • Search for the external role you want to assign.
    • Check whether the external role configuration is set for user assignment on the target system.

    See Application Access.

  2. Add the entitlement. Assign the external role to the on-boarded user. See Entitlements.
  3. Check whether the assignment event Add Permission is generated for the external role. See Events.

Enable a custom Segregation of Duties policy.

  1. Enable the external Segregation of Duties feature.
  2. Set up the external service, which can be a REST WEB Service or an implementation of a JAVA interface.

See General

Back to top

Role Managers

Role Managers, with administrative rights, can perform any of the following tasks in the Administration Console, including tasks in the Process Designer module.

Table 11. Role Managers tasks in the Administration Console
Tasks Subtasks and references

Configure roles.

  • Create and publish roles. See Roles.
  • Define the entitlements. See Management.

On-board users. For example, a new employee UserA, joined the organization.

  1. Create the user profile. See Users.
  2. Assign user to a role. See Users.
  3. Assign an entitlement to the user. See Entitlements.
  4. Assign resources to the user. See User Resources.
  5. Create and manage the accounts for the registered user. See Accounts.
  6. Assign rights. See Rights.
  7. Set a mitigation action if the user is assigned with a risk level. See Mitigations.

Back to top

Risk Managers

Risk Managers, with administrative rights, can perform any of the following tasks in the Administration Console, including tasks in the Access Risk Controls module.

Table 12. Risk Managers tasks in the Administration Console
Tasks Subtasks and references

Add entitlements to the on-boarded user, such as an external role. For example, assign UserA with the external role Senior Developer on the Data Manager application.

  1. View the permissions that are defined for the application.
    • Search for the external role you want to assign.
    • Check whether the external role configuration is set for user assignment on the target system.

    See Application Access.

  2. Add the entitlement. Assign the external role to the on-boarded user. See Entitlements.
  3. Check whether the assignment event Add Permission is generated for the external role. See Events.

Enable a custom Segregation of Duties policy.

  1. Enable the external Segregation of Duties feature.
  2. Set up the external service, which can be a REST WEB Service or an implementation of a JAVA interface.

See General

Back to top

Business users: Managers

The following list provides examples of tasks Managers can perform in the Service Center, depending on their configuration.

Table 13. Managers tasks in the Service Center
Tasks Subtasks and references
Approve or revoke campaign requests. Campaign Management
Manage orphan accounts. User-account matching
Manage access requests.
Reset the account password for other users. Resetting account passwords for other users
Reset own Service Center password. Resetting my forgotten password
Map permissions and activities.
Configure, run, and download the report.
Note: User Managers and Application Managers have customized Service Center dashboards from which they can view and manage their activities. For more information, see:

Back to top

Business users: Help Desks

The following list provides examples of tasks that Help Desks can perform in the Service Center, depending on their configuration.

Table 14. Help Desks tasks in the Service Center
Tasks Subtasks and references
Reset the account password for other users. Resetting account passwords for other users

Back to top

Business users: Employees

The following list provides examples of tasks that Employees can perform in the Service Center, depending on their configuration.

Table 15. Employees tasks in the Service Center
Tasks Subtasks and references
Reset own Service Center password. Resetting my forgotten password
Change the account password for active accounts. Changing my account password
View Self Care requests status Viewing my requests in the Self Care application
Update the security questions for account recovery Updating my security questions
Note: Employees have customized Service Center dashboards from which they can view and manage their activities. For more information, see Employee dashboard.

Back to top