Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

...

...

...

...

...

...

Div
classbreadcrumbs

Home / Identity Governance / Recertification / Current: Adding Recertification Policies to Audits

In EmpowerID, an audit is a user-defined, logically named object for identifying or grouping recertification tasks and running the

...

recertification policies that generate those tasks. After creating an audit, you add

...

recertification policies to it to define what you want to audit. Then when the audit runs, it compiles those

...

recertification policies, creating

...

any necessary recertification tasks.

Info
titlePrerequisites

Both the audit and the policy must exist in EmpowerID. If they do not, please see Creating Recertification Policies and Creating Audits for more information.

To add

Recertification

recertification policies to audits

  1. Log in to the EmpowerID Web application as an auditor or other person with the ability to configure audits.
  2. In the Navigation Sidebar, expand Compliance Management and click Audit Configuration.
  3. From the Audit Configuration page, click the Click the Audits tab and search for the audit to which you want to add a Recertification policy.
  4. Click the Audit link. 
    Image Removed
    Image Added
    This opens the View One page for the Audit. View One pages allow you to view information about an object in EmpowerID and manage it as needed.
    Image Removed
    Image Added
  5. From the audit's View One page, expand the Recertification Policies accordion and click the Add New Recertification Policy (+) button in the Policy grid.  
    Image Removed
    Image Added
  6. In the Recertification Policy dialog that appears, type the name of the policy you want to add to the audit, and then click the tile for that policy.  
    Image Removed
    Image Added
  7. Optionally, type a number in the Ignore Any Certified Within Last X Days field.

    Tip

    This is useful in situations where a previous audit closed before all recertification tasks it generated were completed. This way, managers only receive recertification tasks for any direct reports who were not certified in the last audit.

    This setting does not completely exclude previously audited direct reports; it only excludes those access assignments that were re-certified within the specified day range. Thus, if a direct report gains access to a new resource, such as becoming the member of a new group, the audit generates a Recertification recertification task for that new membership.


    Image RemovedImage Added

  8. Click Save to add the Recertification policy to the audit. You should see the The policy is added to the Recertification Policies grid.
    Image Removed
    Image Added

To add exclusions to the Policy

 Optionally, you can keep the audit from creating recertification tasks for certain access assignments that would normally be generated by the Recertification recertification policy.

  1. On the Recertification Policy grid, click the Exclusions button for the policy.
    Image Removed
    Image Added
    This opens a view for the selected Audit Recertification policy. The view has with two grids: an Exclude These Entitlements grid and an and Exclude These Entitlement Types grid.  These grids allow you to exclude entitlements granted to specific actors—such actors, such as an individual person people or group—as groups, as well as an entitlement type, like belonging to a role or group that has types, such as roles or groups that have no bearing for the audit.
    Image Removed
    Image Added
  2. To exclude a specific entitlement, in the Exclude These Entitlements grid, click the Add (plus) button, drop down the Type and select an actor type, then search for and select the specific actor to exclude.
    Image RemovedAdd button.

    Image Added
    This opens the Attestation Policy Target dialog, where you can select the type of resource, such as Business Role and Location, and a specific object of that type, such as Sales Rep in Boston.

    Image Added
  3. Select a target type from the Type drop-down, for example, Management Role

    Image Added
    A box (or if you choose Business Role and Location, a pair of tree selectors) appears to the right.

    Image Added
  4. Click in the box and press Enter for a list of available options, or type the name of the specific actor to exclude, in this case "customer," select the tile for the actor, and click Save.

    Image Added
    The Customer actor type is added to the grid of entitlements to exclude from this audit.

    Image Added
  5. To exclude a type of entitlement, in the Exclude These Entitlement Types grid, click the Add (plus) button, drop down the Type and select a type, then click Save.
    Image Removedbutton.

    Image Added
  6. Select a Type from the drop-down list. The following types are available:
    • Business Role excludes business roles from the type of entitlements audited.
    • Group Membership excludes group membership from the type of entitlements audited.
    • Inherited Direct by Business Role excludes any access inherited directly from the person's business role from the type of entitlements audited.
    • Inherited Direct by Management Role excludes any access inherited directly from the person's management role from the type of entitlements audited.
    • Inherited Direct by Primary Business Role excludes any access inherited directly from the person's primary business role from the type of entitlements audited.
    • Inherited Location based by Business Role excludes any location inherited from the person's business role from the type of entitlements audited.
    • Inherited Location by Primary Business Role excludes any location inherited from the person's primary business role from the type of entitlements audited.
    • Inherited Management Role by Primary Business Role excludes any management role inherited directly from the person's primary business role from the type of entitlements audited.
    • Inherited Role Group Membership excludes any group membership inherited from the person's role from the type of entitlements audited.
    • Management Role excludes management roles from the type of entitlements audited.
    • Primary Business Role excludes primary business roles from the type of entitlements audited.
    • Resource Role excludes resource roles from the type of entitlements audited.
    • Role Group Membership excludes role group membership from the type of entitlements audited.

  7. Click Save.

    Image Added
    The type is added to the grid of excluded entitlement types.

    Image Added


Once you have finished adding your Recertification policies to the audit, the next step is to generate the recertification tasks associated with the policies. You do this by compiling the audit. This is demonstrated in the Compiling Audits topic.

...

iconfalse
titleRelated Content

...

Rw ui expand macro
titleAdministrative Procedures

Creating Recertification Policies

Creating Audits

Compiling Audits

...

titleUser Procedures

Responding to Recertification Tasks

Performing Revokes Quality Checks

...