Skip to main content

5 docs tagged with "SoD"

View all tags

Configuration

Here, you can learn about an alternative SoD process setup and acknowledge the configurable customer settings and customizations that may be implemented by the organization.

Constraint data setup

The SoD functionality contains many different features and workflows. This section covers the following use case examples with instructions on how to use these features: resources and business processes, constraints, and compensating controls.

Evaluating identity violations

If the organization has set up compensating controls, the Evaluate identity violations process will provide managers to review and mitigate these violations. The manager of an identity which has triggered a violation of any constraint will be able to review, and then decide to allow the violations.

Logs and overviews

If you want to see the history of potential violations of constraints, go to System > Policies... > Constraints, then open any of your created constraints and click Violations to open the Constraint violations view.

Segregation of Duties

The Segregation of Duties (SoD) module is used to define policies for toxic combinations of access rights assigned to the same person, detect any violations, and evaluate these to determine if the violating assignments should be allowed or blocked. With SoD, you can ensure that you cannot assign an identity to a combination of resources or business processes that violate the established rules of the organization, which is known as a toxic combination of resources/business processes.