Users and user groups
Built-in user groups
Below you will find a table with the user groups that are available in the Omada Identity system.
A user can be assigned to a user group in a number of ways: for instance, through an access request, assignment policies, or the self-management configuration. You can also always be manually added to a group.
With the Governance for Omada Identity feature enabled, adding users to user groups is managed by roles: all the groups have a corresponding resource for managing user group membership. Creating a user group triggers the creation of a corresponding resource. (For details, see Resources.)
Users with roles related to managing access and ownership of objects are assigned to user groups through the so-called self-management RoPE extension. These roles include:
- Resource ownership
- Resource folder ownership
- Org. Unit management
- Identity management
- System ownership
- Cost center ownership
- Company ownership
- User group membership
- Service Desk agent role
- Classification tag ownership
- Employment ownership
A good example of the self-management method is the Managers role. Managers get their role automatically, following the concept of ownership. Self-management assigns the effective managers to the Org. Unit Manager role, which assigns the child resource Managers. Governance then provisions that resource by adding the user to the Managers user group.
For more details on the self-management RoPE extension, see:
There are two user groups that are added to user groups through a default assignment policy: the Employee and the Contractor. For details, see Assignment policies.
| User Group | Description | How to become one |
|---|---|---|
| Application Onboarding Admins | Users tasked with reviewing the result of the Application onboarding process. | Requested through access request, assigned through policy, or manually added to the Application Onboarding Admins user group. |
| Auditors | Internal and external auditors who access Omada Identity occasionally to verify that things are as they are supposed to be. | Requested through access request, assigned through policy, or manually added to the Auditors user group. |
| CIAM End Users | Users external to the organization who have performed self-registration via the CIAM portal. | A person who completes CIAM self-registration becomes a member of this user group. |
| CIAM Service Users | Service user group for the CIAM portal. See also the Impersonation service users user group. | Requested through access request, or manually added to the CIAM Service Users user group. For details, see Assignment policies. |
| Constraint Owners | Individuals appointed as owners of one or more constraints. | Requested through access request, or manually added to the Constraint owners user group. |
| Contractors | Individuals working for an external organization and hired as contract workers for a specified period. | Classify the identity as Contractor to automatically add them to the Contractors user group. This is done through an automatic assignment policy (for details, see Assignment policies). |
| Data Administrators | Individuals managing the "master data" related to identity management, including identities, resources, and systems. Note: Data admins cannot change the configuration of OIS or manage properties and data object types | Requested through access request, assigned through policy, or manually added to the Data administrators user group. |
| Employees | Regular employees. | Classify identity as Employee to automatically add them to the Employees user group. This is done through an automatic assignment policy (for details, see Assignment policies). |
| Everyone | All users. | All users are added to this group automatically . |
| Impersonation Service Users | Service users that are used for integration from third party integrations for example the Omada ServiceNow application. | Requested through access request, or manually added to the Impersonation service users user group. |
| Managers | Individuals who are managers of employees and contractors. | All identities assigned to the Manager resource in the Omada Identity system are automatically added to the Managers user group. This assignment can be obtained through methods such as the access request, assignment policies, or self-management configuration. |
| Operation Administrators | Individuals tasked with ensuring that Omada Identity runs smoothly. | Requested through access request, assigned through policy, or manually added to the Operation administrators user group. |
| Platform Administrators | Individuals tasked with ensuring that Omada Identity is installed correctly. | Managed by Omada Service Desk in Omada Identity Cloud. Only Platform administrators can manage access to the Platform administrators user group. |
| Provisioning users | Service users that must have permissions for special objects. These users can manage users and user groups in the Data Object Security Model. By default, it has no authorization roles and a Medium authentication level. | Requested through access request, assigned through policy, or manually added to the Provisioning users user group unless the Governance feature is enabled. |
| Request Interpreters | Individuals appointed to interpret access requests stated in clear text into specific access rights. | Requested through access request, assigned through policy, or manually added to the Request interpreters user group. |
| Resource Owners | Individuals appointed as owners of one or more resources, responsible for approving access requests and monitoring assignments. | All identities assigned to the Resource ownership resource in the Omada Identity system are automatically added to the Resource Owners user group. This assignment can be obtained through methods such as the access request, assignment policies, or self-management configuration. |
| Security Officers | Individuals appointed to conduct evaluation approvals in the SoD violation workflow. | Requested through access request, assigned through policy, or manually added to the Security officers user group. |
| Service Desk Agents | Individuals working in the service desk for a part of the organization. | All identities assigned to the Service Desk agent role in the Omada Identity system are automatically added to the Service Desk Agents user group. This assignment can be obtained through methods such as the access request, assignment policies, or self-management configuration. |
| System Administrators | Individuals administering the configuration of Omada Identity, including properties and data object types. | Requested through access request, assigned through policy, or manually added to the System administrators user group. |
| System Owners | Individuals who own one or more systems. | All identities assigned to the System ownership resource in the Omada Identity system are automatically added to the System owners user group. This assignment can be obtained through methods such as the access request, assignment policies, or self-management configuration. |
| Vault Service Users | Service users that are used for integration from third party vault integrations. | Requested through access request, or manually added to the Vault service users user group. |
User creation in the Omada Identity system (Governance for Omada Identity feature)
Now, user creation is done by provisioning. When client identities are created, they are automatically assigned to a role: for example, an Employee. Since this role corresponds to a group, the identity automatically receives an account for the group’s associated resource, which in this case is the Omada Identity user.
The provisioning process allows organizations to define rules: if an identity has certain rights, it automatically receives a user account (that is, it becomes a user in Omada). The goal is to ensure that access is granted only to those who have such needs and meet specific requirements, because not all identities might need a user (an account) in Omada Identity.
For users to be created automatically, based on being assigned a role/group, the system/resource type needs to be enabled for Auto Account.
Manual user creation
Though it is not the typical manner, it is possible to create a user manually. To do that, go to the list of users (Setup > Administration > Users) and click New.
Only a user with the Administrator role or the Provisioning User role can create new users directly from the users list.
The New User view is where you add or edit users. It is also where you assign group memberships to a user. In this example, Samuel Clarke is a new user who becomes a member of the Managers group.
Passwords
This section is only relevant for Forms authentication, which is usually only enabled in test/development environments. In most cases, Omada Identity is set up with Single sign-on, so that users are authenticated through federation to an external IdP (Identity Provider). In these cases, users do not have a separate password to Omada Identity.
For the existing users, you can change their password if needed. To do this, click the ellipsis (...) > Change password. Select Notify user of new password to send an email about the change.
You can decide if you want to make it a requirement to always create a password for a new user when you create one. Go to Setup > Administration > More... > Customer Settings and locate the Set new user password setting. If you set the value to True, a new password dialog box appears after you have created a new user.