Watch this video to learn how One Identity Manager’s Application Governance provides a method for application owners to prove governance.
Use Cases - Customization - Configure Synchronization Editor - Customization capabilities overview
Use Cases – Configuration - Business Configuration Data - Configure Approval Workflows - Web Portal Configuration
Use Cases - Reports and Auditing - Use Available Reports - Report Subscription - Show Entitlement Origin
Use Cases - Resource Lifecycle - Access Certification - Create a Campaign - Create and Manage a Segregation of Duties Rule
Use Cases - Request and approval - Make a Role Requestable - Request a Business Role - Approve a Requestable - Request with Mandatory Expiry Date o Configure Mandatory Request Properties o Request with a Mandatory "Valid Until" Date
Use Cases - Resource Lifecycle - Create a Role - Assign a Business Resources - Configure a Dynamic Role
Use Cases - Identity and Account Lifecycle - Disable an Identity - Enable an Identity - Password management
Use cases - Identity and Account Lifecycle - Create Identities and Accounts - Business Data Modification
- Comprehensive IGA - Target System Support - Docker Support - Analyst Wording
- Target System Centric vs. Identity Governance - Active Directory Management vs. Identity and Access Governance
Learn how Ulta Beauty safely runs SAP in their enterprise with Identity Manager, which allows the retailer to control its modules by the mantra, "configure, not code". "Security starts with identity, because identity... is at the center of everything." - Paul Lucido, Manager of IAM
Learn how systems integrator, IPG, leverages One Identity Bootcamps to gain hands-on experience, valuable insights and direct access to subject-matter experts.