Business alignment
The Business alignment processes concern the business benefits obtained such as cost efficiency and risk management. These benefits are achieved by addressing roles, assignment and constraint policies, as well as the reasons for being in the organization or identities context.
As a result, for the success of any IGA project, and to reach the full potential of Omada Identity, it's important to have a good understanding and modeling of the business, such as the relationship of identities to user accounts, access rights and profiles, as well as business roles and processes and their connection to the organizational structure, as well as other relevant structures, for example, projects.
The following subchapters describe the processes included in the framework: Managing roles, Managing policy, and Managing contexts.
Managing roles
Basic entitlements or roles (also called birth rights) must be administered, allowing companies and organizations to introduce, modify or terminate roles. When a target system resource is not delivered by the source system anymore, a Data Administrator must update in Omada Identity that the resource cannot be requested anymore, and the Resource Status must be set to Obsolete.
Roles
In the Omada Identity Data model there is one Object Data Type resource which is subdivided into the following three resources:
- Account
- Permission
- Enterprise resource
By default, each system has one account resource for the personal account type, and one account resource for the unknown account type. Permission resources represent the target system, such as AD groups, SAP Roles and others. An Enterprise role only exists in Omada Identity and is a compound resource that includes a child Permission resource.
This diagram describes the relation between Enterprise roles, permissions and target system resources:

Enterprise roles can have multiple layers, however, out of the box, Omada Identity supports management processes only for one layer.
Out of the box, target system resources are read directly from the target system, and then the corresponding permission resources are created in Omada Identity.
When a target system resource is not delivered by the source system anymore, a Data Administrator must update in Omada Identity that the resource cannot be requested anymore, and the Resource Status must be set to Obsolete.
Creating, modifying and terminating roles
The creation, modification and termination of Enterprise roles in Omada Identity is performed by a Data Administrator through Master Data Management or using the Onboard application process.
Generally, and when not delivered by the target system, each resource in Omada Identity requires appropriate data enrichment for the following information:
- Owner (for Access approval):
- Requestable in the Access Request process.
- The Resource Folder defining:
- Manual Provisioner
- Approval Levels
- The Resource Type defining:
- Attributes
- Post-validity
- Delegation