Configuration
Here, you can learn about an alternative SoD process setup and acknowledge the configurable customer settings and customizations that may be implemented by the organization.
Here, you can learn about an alternative SoD process setup and acknowledge the configurable customer settings and customizations that may be implemented by the organization.
The SoD functionality contains many different features and workflows. This section covers the following use case examples with instructions on how to use these features: resources and business processes, constraints, and compensating controls.
If the organization has set up compensating controls, the Evaluate identity violations process will provide managers to review and mitigate these violations. The manager of an identity which has triggered a violation of any constraint will be able to review, and then decide to allow the violations.
If you want to see the history of potential violations of constraints, go to System > Policies... > Constraints, then open any of your created constraints and click Violations to open the Constraint violations view.
The Segregation of Duties (SoD) module is used to define policies for toxic combinations of access rights assigned to the same person, detect any violations, and evaluate these to determine if the violating assignments should be allowed or blocked. With SoD, you can ensure that you cannot assign an identity to a combination of resources or business processes that violate the established rules of the organization, which is known as a toxic combination of resources/business processes.