You are viewing an earlier version of the admin guide. For the latest version, please visit EmpowerID Admin Guide v7.211.0.0.
Person Versus Account
Each IT system or application has the concept of a user or “user account” object. The user account is what is used to control permissions within the application and for authentication. In EmpowerID, the user account object is the Person and stored in the Person table. Anyone authenticating to use the EmpowerID application must have a Person object. All activities are centered around this Person object. For example: assigning roles, granting access, recertifying access, assessing risk, and reporting. Employees, partners, and customers can authenticate and use the EmpowerID applications with only a Person object even if they do not have any other user accounts.
As an Identity Management platform, one of EmpowerID’s primary use cases is to present an accurate picture of the security within each IT system in an organization's on-premise and Cloud landscape. To do this, EmpowerID periodically inventories and pulls in the user account objects from these “external” or “managed” systems into the Account table. From this point forward, we'll refer to them simply as Accounts to avoid confusion and avoid the terms user accounts or user. Accounts are users from external systems, and Person objects are the primary identity or user object for the EmpowerID system. External systems containing user accounts are known as “Account Stores” in EmpowerID terminology and will be referred to as such going forward.
We mentioned above that a key use case is to present an accurate picture of the access assigned to Accounts across an organization’s IT systems and whether it is compliant with risk policies. What makes access “compliant”? Compliant access is appropriate to the person to whom it is assigned in compliance with the organizational standards and business policies to minimize risk. The key here is that the appropriateness of access in IT systems is based on who they are, what role they perform in the organization, and other related information considered within the business context of the person. To have a holistic view and analysis of this information, a Person’s Accounts cannot be analyzed and managed In isolation but must be linked together and viewed as a whole unit. For this purpose and the management of their lifecycle (creation, modification, deletion), they are linked and owned by a single Person object.
What About Accounts That Aren’t People?
The first thing many of you might ask yourself is, “Yes, HR Accounts are always human people, but what about the downstream Account Stores' technical or non-human accounts? These accounts are referred to as “Non-Person Accounts” and defined as “Any account not specifically assigned to a person, such as accounts used for devices, services, and servers.”
Source: Bago (Editor) E. & Glazer I., (2021) “Introduction to Identity - Part 1: Admin-time (v2)”, IDPro Body of Knowledge 1(5).
A valid question is whether you need to create Person objects for these types of Accounts. The answer is not always clear-cut but rather a maybe or sometimes. You are not required to create a Person object for non-person accounts you wish you manage directly in EmpowerID (create, edit, add/remove from groups, reset the password, disable, etc.)
Below is a list of common use cases for which you would want to create a Person object to own the non-person Account.
Deciding When You Need a Person Object
If the Account will log in to use any EmpowerID applications, user interfaces, or REST APIs (e.g., PAM Application to Application, Bots, etc.)
If you would like to shop for access in the IT Shop for the Account
If the owner of the technical Account requires access to perform a self-service password reset for the password of the technical Account
If you would like to assign EmpowerID roles to the account so it receives policy-controlled access in downstream Account Stores (e.g., group membership). Group membership can still be managed directly for Accounts without a Person object.
If you would like attribute changes to flow between that Account and other related Accounts.
Handling Multiple Person Objects for the Same Person
Some situations require multiple Person objects for the same human being or non-human identity. A typical case is where a Person has privileged access in an Account Store. Privileged access is often granted by creating an additional personal privileged Account in the Account Store for use by that person when performing admin activities. Using Active Directory as an example would mean that a Person would have two Accounts in the same AD domain (Account Store). If EmpowerID were to link these two Account objects to the same person, some undesired consequences would occur:
EmpowerID flows attributes between all Accounts owned by the Person, and the rules are per Account Store and not per attribute. This would make the title, email, and other attributes the same.
All access assignments by a policy in EmpowerID are summed up on a Person-by-Person basis and are not account-specific. This means that when a Person is granted membership in a group directly or via a role assignment, all user accounts they own in that Account Store are added to the group.
To segregate the access for a Person’s multiple accounts in the same account store, EmpowerID supports the concept of a core identity. Just as a person can have multiple user accounts in different external directories, a core identity can have more than one person where the core identity represents the central identity. Core Identity can be seen as a master identity representing one individual who might have one or more professional identity (represented in EmpowerID as a person). Like the joining of accounts to people, the joining of person objects to the corresponding core identity is determined by Join rule configuration specific to core identity processing.
Core Identity is used to link all those different professional identities (persons). This data is used to show associated identities on the View One Person page and selecting the identity to log in with during the login to the EmpowerID UI. It also provides a foundation for a fully automated leaver process and deprovisioning of additional identities if the primary person gets terminated. Core Identity stores only basic persons attributes such as first name, last name, birth date, social security number, etc., which are not tied with a job or place in the organization.
Access assignments, ownership assignments, organizational and job-specific attributes (e.g., department, line manager, etc.) can be set on the person only. Users can use only the person’s credential to log in as core identity does not have its own credentials.
Managing Resource Responsibility
In addition to the relationship where a Person owns an Account, EmpowerID supports assigning and tracking responsible parties for key objects like accounts, groups, computers, management roles, locations, and shared credentials. This responsibility relationship differs from that of a Person owning an account. An account owned by a Person represents that person and serves as their personal account. From a security and audit perspective, responsible parties are assigned to signify who is responsible for an IT object.
Any EmpowerID RBAC Actor Type can be assigned as the responsible party, but most organizations configure EmpowerID only to allow Person assignments. The field that stores this assignment is the OwnerAssigneeID field, and you can find it in each supported object's table.
When a person is leaving or changing positions, you can transfer all their responsibilities to another party. You can either do this manually, using the Transfer Responsibilities workflow or automate the process in a Planned Leaver Event.
To help you avoid situations where you have objects with no responsible party, you can run reports to find them.
Key Takeaways:
Person is the user object for the EmpowerID application.
Not all Accounts require a Person object.
EmpowerID provides complete delegated administration of non-human technical Accounts.
Person objects should be created for all active HR records.
Having two Accounts in the same Account Store requires the creation of more than one Person object unless they will be managed as technical Account objects and do not require functionality available for Person object management.
EmpowerID will merge the attributes for two Accounts in the same Account Store belonging to the same Person.
EmpowerID will merge the group memberships for two Accounts in the same Account Store belonging to the same Person.
The Core Identity is an optional object that relates multiple Person objects owned by the same human being or thing.
Authentication to EmpowerID can be done by using a Person object username and password or through a trusted IdP such as Azure using an external Account owned by a Person. In all cases, authentication occurs as the Person object.