- Password reset
- New permissions and accounts requests
- Overview of current permissions and accounts
- Overview of contracted positions, contact information
Virtual systems are supported
A virtual system is a system, that can not be directly connected for online management. The reason may be for example the absence of a suitable system connector. The virtual system is basically only a registration mode, where for each system change is generated the implementation request (notification) that is assigned to the particular implementer. This implementer must ensure that the change is made to the target system.
Identity manager helps on the field of privileges management. It can solve tasks like roles evidence and distribution or role assignment to users. Another benefit of identity manager is that role assignment can usually be driven by workflow and user tasks. How does it work in CzechIdM, you will find out in the article.
In the first part of our series, we discussed important features the company’s certificate authority should have. In today’s post, we will present the CAW, our execution engine. Read on.
Task scheduler is a tool in CzechIdM which manages long running operations. One can plan to run tasks automatically in scheduled terms or start them manually. They e.g. manage personnel processes like End of contract or Enabled contract. Moreover, password expiration, automatic roles assigning and other task are also managed by task scheduler. In current version of CzechIdM you are not only able to find list of tasks and their detail, but every detail now show the history of processed object (e.g. identities). But that is not at all, new version of task scheduler brings the feature of Dry run! Read on. Continue reading
Everyone knows that an identity manager automatically handles access rights of users in connected systems. But how does it do that? CzechIdM 7 comes with a set of default processes that do the job. What are they about you will find out in the article.
Many companies use an on-premise certificate authority (CA) for their internal purposes. Without a doubt, one specific function of the certificate authority in a company is handling users’ certificates. Those certificates are bound to physical persons and as such, they fit neatly into the identity management problematics.
For this reason, CzechIdM implements the CA functionality in the form of a module. In this short series of posts, we will describe basic workings of our CA implementation and how it can be fit into the company’s infrastructure.
In MS Active Directory, groups can have members not only from the same domain but also from other trusted domains. This is determined by “type” of a group. Such cross domain group membership can be now managed by CzechIdM.
You installed CzechIdM and then connected systems to it. You prepared provisioning and synchronization definitions with attributes mapping. Well done, now you can automatically distribute information about identities, roles and other object between connected systems. But what to do, if there is some attribute value transformation required? You will find you in the following text.