Skip to main content

Identity Lifecycle Management (ILC)

The Identity lifecycle processes are common identity management scenarios. This section of the demo will demonstrate the processes that are delivered out-of-the-box with Omada Identity.

The demo has an HR system that we use to add, transfer and offboard an employee. The script uses the same user throughout the lifecycle, but you can choose different users if you want to. It is more important that you choose to use the same org. units as in the example. These are Invest Chicago or Internal Accounts Chicago.

Onboarding a contractor and delegate access is also a part of the identity Lifecycle process section of the demo. These processes are handled in the Portal.

Onboard Employee (ILC01.01)

This section of the demo shows the onboarding activities for an identity, in this case an employee.

Employee records are usually sourced from an HR system, such as SAP HR.

  1. Click the HR System link on the desktop. This opens the Global Banking Group HR system.

  2. In the Add Identity form, enter a new employee. The demo script uses the name Emily Black, but any name is fine. If you choose another name, take note of the generated UID.

  3. Give the employee a First Name and Last Name. The UID fields is automatically populated.

  4. Give the employee a Job Title, it is recommended to use Trader – Currency as there is an assignment policy defined for that Job Title.

  5. Use US as country.

  6. In the Org. unit drop-down, select Invest Chicago.

  7. In Manager, select Robert Wolf – the manager is derived from the Org. Unit, but the manager selected in this attribute will be copied into the Employment Context for the new Identity. Leave the other fields as is. Employment Contexts are used to support multi affiliation – they are personal, have validity periods and managers assigned.

  8. Click Save. Click OK in the confirmation dialog.

  9. Close the HR system.

  10. Log in to the Portal as System Administrator and go to Setup > Master Data > Systems.

  11. Select the Global Banking Group HR System.

  12. Click Start data import.

  13. Click OK to start the import from the HR System. An Import progress pop-up will appear, it is safe to close the pop-up, and while the import is running, you can talk about the system onboarding that has taken place prior to running the import.

  14. Log in to the Portal as Robert Wolf.

  15. Click My Data > Manage > My Contexts. He is the manager of six departments including Invest Chicago and is therefore Emily Black’s manager.

    • The Business Context feature makes it possible to manage other business contexts in addition to, or instead of, the organizational structure. Using the feature allows for managing (for example) a Project hierarchy. Each project can have one or more Owners with the responsibility of managing who are assigned to the project context. Identities assigned to a project context can request access to be used while performing project duties. Once an identity is no longer assigned to a project, the system will automatically revoke it.

    • Business benefits include:

      • Ability to manage other business contexts in addition to the organizational structure.
      • Delegated management of who is assigned to a context.
      • Self-service requests for access to be used in a specific context with the following approval of the context owner.
      • Automatic revocation of access granted for use in a context when an identity is no longer in it.
  16. When the import has finished, click Identities and search for Emily Black, who is now visible in the list of Managed Identities.

  17. Click EMIBLA in the list. The View Identity page opens. If the Identity is awaiting calculation, wait some time and refresh.

  18. Below the Identity Details, the Resource Assignments grid shows all calculated resource assignments for an identity.

  19. Notice that she already has some basic access assigned. The resources are assigned via Assignment Policies ~ inherited from the org. structure and her Job Title. The Compliance Status is calculated as Implicitly Approved because all assignments are assigned via Assignment Policies. Click the Reasons value for Active Directory corporate.com Personal account.

  20. The reason for the assignment is: Policy: All Employees in Global Banking Group, this is what we refer to as Desired State. The other reason is: Unconfirmed Actual: Provisioning claim [<timestamp>], this is what we refer to as Actual State. The reason status is unconfirmed is because the Omada Provisioning Service has claimed it has successfully provisioned the user account in AD, but we are pending the confirmation – which will happen at the next reconciliation import from AD to the Data Warehouse. When import is completed, the status will change to: Actual Direct: Actual Assignment [<timestamp>].

  21. Return to the start page. Notice that there is a task called Onboard employee in the Tasks section. Open the task.

  22. The Onboard employee activity opens.

  23. If you want to see more details about the Identity, click the name and a pop-up window with details (imported from HR System) appears, click Close to return. The manager can now choose to request access for the new employee, but we will perform the request in the Access Request scenario.

  24. Click Submit and Reconciliation.

  25. Log in to the Portal as System Administrator and go to Setup > Administration > Connectivity > Import Profiles. Select System Active Directory corporate.com and click Start import. This will execute the import from AD to Data Warehouse, after successful import you can perform the same task for System category Global Directory. This task is required if you want to verify the update of the Reasons after the reconciliation has taken place.

  26. Log back into the portal as Robert Wolf. Go to Identities and search for and click Emily Black. Click the and select Recalculate to trigger a recalculation of the Identity.

  27. When calculation is completed, click the Reasons value for Active Directory Personal account.

    The status has now changed to: Actual Direct: Actual assignment [<timestamp>] because of the reconciliation import.

    Alternatively, you can decide to show the Onboard Employee process first and then go to Identities to show which assignments is assigned automatically.

Email notifications

You can click the papercut icon in the taskbar or notifications area to open the Papercut inbox all emails will be shown here. There will be three email notifications regarding the new employee:

  • Employee onboarded, Account created, Initial password information

Onboard Contractor (ILC01.03)

Contractors are people who will be working in the company for a limited period. Omada has a standard process used for onboarding a contractor.

As contractors are not sourced from the HR system, the identities are imported to the Warehouse from Enterprise Server via the auditing database.

  1. Log in to the Portal as Robert Wolf.

  2. To have access to the onboard contractor process, a user must be a manager.

  3. From Services, click Onboard contractor.

  4. In the Onboard contractor activity, enter a name and job title for the identity. The example uses Robert Malone, Trading Expert.

  5. In the Department drop-down, select Invest Chicago.

  6. By default, the First working day is set to today’s date.

  7. Select a date in Last working day. There is a customer setting which prevents to assign a future date higher than 180 days, which will be checked when you Submit.

  8. If the Request access checkbox is selected, an instance of the Request access process is started when the form is submitted. If you choose to select this checkbox then refer to the Access Request scenario for details about the request process.

  9. Email and Cell phone fields are not mandatory fields and can be left blank.

  10. Click Submit.

  11. Omada Identity will check for duplicate entries, click OK to continue.

  12. After submitting the request, you should receive a confirmation that it was successfully submitted.

  13. Go to My Data > My Contractors. Here, you can see a list of Contractors you are responsible for. The new contractor has been given a user ID that looks different to the other user IDs we have seen.The algorithm that calculates the UID is different for contractors and the UIDs start with X.

  14. Click on the new contractor to see the details.

  15. Collapse the Identity Details to see the Resource Assignments.

  16. The Compliance status is Implicitly Assigned due to an Assignment Policy. By clicking Reasons, you can see the Desired and Actual State including which policy is used.

Transfer Identity (ILC02.02)

info

Before executing the Transfer Identity process, make sure that the identity being transferred already has at least one direct assignment from a request process. In this demo script, we expect to have already requested access to Invest Department Documents, Pension Department Documents, and Internal Accounts Department Documents in the Document management application.

This section demonstrates transfer activities for an employee changing departments. In the example we use Tracy Scully, a Trader – Stocks in Invest Chicago:

  1. Double-click the HR System icon on the desktop. Click Modify Identity.

  2. Search for “helbon” (or replace with the uid of the identity you want to use).

  3. In the Job title drop-down, select Investment Advisor and in the Org. unit, select Invest New York.

  4. Click Save and OK in the confirmation dialog.

  5. Close the HR system.

  6. Log in to the Portal as System Administrator and go to Setup > Administration > Connectivity > Import Profiles.

  7. Select the import profile System category Global Banking Group HR System and click Start Import. The Import Progress will appear.

  8. Click Ok and Close when completed.

  9. Log in to the Portal as Robert Wolf.

  10. Open the Review Assignments for Identity leaving your department task . The purpose of this task is to remove any irrelevant access and transfer relevant access to the new department.

  11. Here the former manager can decide to Transfer, Remove, or Remove with grace for each assignment in the task. Only assignments requested based upon the employee’s previous context assignment (Org. Unit = Invest Chicago) or those without a context are shown.

  12. Select to remove the assignments Pension Department Documents and set Internal Accounts Department Documents to Remove with grace. You need to set a date in Expiration date for any assignments where the decision is Remove with grace. Set all others to Traders and Invest Department Documents to Transfer.

  13. Click Submit to complete the process.

  14. Log in to the Portal as Robert Scott.

  15. Open the Review Assignments for Identity transferring to your department task. The purpose of this task is to remove any irrelevant access and transfer relevant access to the new department.

  16. Here the new manager can decide to Transfer, Remove or Remove with grace for each assignment in the task. Only assignments requested based upon the employee’s previous context assignment (Org. Unit = Invest Chicago) or those without a context are shown.

  17. You can click History to see what the former manager answered. Those that were set to Remove with grace are not included.

  18. Select to remove the assignments Pension Department Documents. Set Transfer for the remaining assignments.

  19. You can add a comment if you wish.

  20. Click Submit to complete the process.

  21. Go to Identities and open Tracy Scully identity record.

  22. Notice that the valid to date for the Internal Accounts Department Documents is set to the Expiration date set in the transfer process. This is because we set the assignment to be removed after a grace period. After the grace period, the assignment will be removed.

  23. Notice that a new resource assignment for Write Documents has been assigned automatically due to the employee’s new job title – in the reason column you can click on Policy to see the name of the assignment policy.

Offboard Identity (ILC03.01)

This section of the demo shows the activities for offboarding an employee.

  1. Double-click the HR System icon on the desktop. Click Modify Identity.

  2. Search for emibla in the search field in the bottom of the form.

  3. Select the same job title and org. unit as in the transfer scenario.

  4. In Valid to, click Today, and then change the date to yesterday’s date. The date format is MM/DD/YYYY.

  5. Click Save and OK in the confirmation dialog.

  6. Log in to the Portal as System Administrator and go to Setup > Administration > Connectivity > Import Profiles.

  7. Select the import profile System category Global Banking Group HR Systemand click Start Import. Close the HR system and double-click the Import Export icon on the desktop.

  8. After the import is completed, log in to the portal as the manager Robert Wolf. Go to Identities and search for and open EMIBLA.

  9. Notice the assignments for the logical applications are all removed. The accounts for AD, LDAP, and the Mailbox are still available – we have set a post validity period on those resource types, so they are not removed when the identity is expired.

  10. You can maintain the post validity period in the portal as System Administrator under Setup > Master Data > Resource Management > Resource Types.

  11. Open Active Directory from the desktop go to below ou. Notice that Emily Black is disabled, after 90 days the account will be deleted.

Re-hire Identity (ILC01.02)

This scenario is used to demonstrate when an identity is returning to the organization after, for example, parental leave, the previous assignments are being allocated automatically again – if the employee returns to the same department and has same job title.

  1. Double-click the HR System icon on the desktop. Click Modify Identity.

  2. Search for emibla in the search field in the bottom of the form.

  3. Select the same job title and org. unit as in the transfer scenario.

  4. In Valid to, change the date to 12/31/9999.

  5. Click Save and OK in the confirmation dialog. Log in to the Portal as System Administrator and go to Setup > Administration > Connectivity configuration > Import Profiles.

  6. Select the import profile System category HR – Global Banking Group and click Start Import. The Import Progress will appear.

  7. Click Ok and Close when completed.

  8. After the import is completed, log in to the portal as the manager Robert Wolf. Go to Identities and search for and open EMIBLA.

  9. Notice that the employee has automatically been assigned her previous assignments.

Create Technical Identity (ILC01.04)

The Request technical identity process is available for system owners to request that a new technical identity is created for service accounts related to their system.

Highlights:

  • The active user can only select systems for which they are the owner.
  • Identity owner is prefilled with the identity of the active user.
  • Last name is prefilled with the system name when a system is selected.
  • The system calculates the Identity ID by using the pattern T<sequence number>, for example, T0012. You can configure the prefix (T) and the number of digits (4).

A new view called My technical identities is available from the My Data and from the Services menu.

Data administrators have a toolbar menu item in the Identity form to see related systems for a technical identity:

\

The Technical Identity Requests view is located under Setup > System operation > Requests.

From the Access request, an identity owner can select owned technical identities:

  1. Log in to the portal as Hanna Ulrich, owner of Active Directory and Exchange.

  2. Select Services > Request technical identity.

  3. In Systems, select Active Directory corporate.com, the rest of the properties are auto-populated and can be left with default values.

  4. Click Submit to create the technical identity.

  5. Go to My Data > My Technical Identities to display the new identity.\

  6. Use the Request Access scenario to assign accounts and resources to the identity.

Transfer Ownership (GOV02.04)

The feature is designed to run when a regular human identity is no longer with the company (terminated), after which the organization must transfer the objects that the no-longer employed human identity owned to another human identity.

The survey starts automatically, and the assignees are calculated based on the type of each of the owned objects.

The survey currently manages the following ownerships:

  • Technical identity - the system owner for the related system.
  • (Human) identity - the manager of the identity.
  • OrgUnit - the manager of the org.unit.
  • Resource - he manager of the resource owner.
  • Resource folder - the manager of the resource folder owner.
  • System - the manager of the system owner.
  • Constraints - the owner of constraints.

If the ownership of an object is under control of the Omada Identity management feature, and the owner is stated as an explicit owner that originates from the ODW, you cannot use the survey for removing the current ownership.

The assignee must appoint a new owner for the object. The new owner gets an approval task to accept the ownership. If the new owner does not accept the ownership, the ownership of the object is transferred to a member of the Data administrators’ group.

  1. First, we need to terminate an identity. Log in to the portal as System Administrator.

  2. Go to Setup > Master Data > Identities. Search for Nancy Francis and select the identity. Click the icon.

  3. From the dropdown menu, select Mass update. Search for and select Identity status.

  4. Click OK and set Identity Status to Terminated.

  5. Click Perform update and OK.

  6. Nancy Francis is now set to Terminated and a Transfer ownership survey is automatically launched based on an event definition.

  7. Log in to the portal as Nancy’s manager, Robert Wolf.

  8. Execute the task Propose new owner for the Transfer ownership survey.

  9. Robert Wolf is presented with a list of objects, for which Nancy Francis was assigned as owner.

  10. To avoid logging in as too many different owners, choose Emma Taylor as owner for all the objects.

  11. Click Submit.

  12. Log in to the portal as Emma Taylor, execute the task Proposed owner approval.

  13. Accept ownership of all objects and click Submit, the ownership will now be transferred to Emma Taylor.

  14. Go to My Data and display the new objects assigned to Emma Taylor. Look at My applications.

Emergency lockout (ISB01.01)

In some cases, it may be necessary to lock out one or more identities from using any type of system connected to Omada Identity, typically in case of a security breach or other system irregularities. Use the emergency lockout feature to handle such types of incidents.

Omada Identity includes a package named Emergency lockout. It contains two process templates for locking out identities and for revoking the lock of locked out identities:

  • Emergency lockout
  • Revoking emergency lockout

You can use and access both processes from the All Services menu, which you can find in Setup > Administration > More… > Services….

You can use the emergency lockout process to disable accounts for multiple identities. Members of the Managers user group and members of the Operation admins user group can start the process. You must specify two fields to complete the process.

  1. Log in to the portal as Robert Wolf. Go to Services > Emergency Lockout.

  2. Select Emily Black, provide a reason, and click Submit.

    The identity status value of the locked-out identities is then set to Locked.

  3. Go to Identities to verify that Emily Black is now set to Locked.

  4. Open Emily Black to see the resource assignments are disabled, and if you check in Active Directory User and Computers you will see her user account has been disabled.

Revoking emergency lockout (ISB01.02)

Use the emergency lockout process to re-enable accounts for multiple identities that have been set to Locked. Members of the Managers user group and members of the Operation admins user group can start the process. You must specify two fields to complete the process.

  1. Log in to the portal as Robert Wolf. Go to Services > Revoke Emergency Lockout.

  2. Select Emily Black and click OK. Notice you can only select identities which has previously been locked out.

  3. Provide a reason and click Submit.

  4. Go to Identities to verify that Emily Black is now set to Active.

  5. Open Emily Black to see the resource assignments are enabled again, and if you check in Active Directory User and Computers you will see her user account has been enabled again.

My lockout and revocations view

Access the My lockout and revocations view from My data > Manage. This view contains an entry for each lockout and revocation that the active user has made.

The Type column displays either Lockout or Revocation, depending on the type of process that the user has run for that specific identity.

Delegate Access (AM02.03)

The Delegate access process allows identities to delegate their access to someone else for a limited period, such as vacations and leaves of absence. It is typically used by managers/owners to delegate their approval responsibility.

This ensures that duties can be performed by someone else, and at the same time provide an audit trail to document who had access to what at any given time.

note

It is a prerequisite that the relevant resource types are allowed to be delegated. Verify that via Setup > Master Data > Resource Management > Resource Types. Only the Omada Identity roles has been set to allow delegation.

  1. Log in to the Portal as Robert Wolf.

  2. Click Delegate access.

  3. The user delegating access needs to fill in the following information:

    • Delegation reason – a comment that describes the reason for delegating the access rights.
    • Delegates – the identities to delegate to.
      • Select George Dunne.
    • Access to delegate – the access to delegate to the delegates.
      • Select Org. Unit Manager. This is the only resource assignment which Robert Wolf can delegate.
    • Activation date – the date the delegation becomes active.
      • Set the Activation date to today.
    • Expires on – the end date of the delegation. After this, the access is removed from the delegate(s).
      • Set the Expires on to a week from now.
  4. Click Submit.

  5. Log in to the Portal as System Administrator. Go to Setup > Identities and search for and open Emma Taylor. Collapse Identity Details and click Reasons next to the resource assignment for Organizational Org Unit Manager.

Notice the additional assignment which was delegated by Robert Wolf.

Signup Identity (ILC01.05)

The Signup Identity scenario is about providing an external facing portal for customers, business partners, and other audiences who are not part of the company’s own organization – to allow them to self-register for access to IT services.

The CIAM portal can use an external Identity Provider (IdP) for authentication using SAML or OpenID Connect, amongst others Azure AD, Azure AD B2C, PINGFederate, and Identity Server are supported.

For the demo, we have decided to install and use the open-source solution Identity Server, to not have any dependencies regarding licenses and connectivity to external IdP’s.

Register (Signup) Identity

  1. Launch Chrome from the task bar in Windows.

  2. Chrome will automatically open the below frontpage of the CIAM portal.

  3. Click Use email to register a new Identity.

  4. Type in an email address who have not used before from the range mentioned in the Preparations section and assign a password (i.e. Omada1234!).

  5. Click Next.

  6. Fill out as a minimum the required fields and click Next.

  7. . Select at least one topic and decide regarding receiving newsletter.

  8. Click Next.

  9. You are presented with a summary – read and accept the Terms and conditions.

  10. Click Register.

  11. Confirmation is returned. Click Close which will return you to the frontpage. Close the browser.

  12. Open the inbox to verify the registration email is received – open Papercut SMTP from the taskbar.

  13. Open the account activation email.

  14. Click the link to activate the account. Log in to the portal - it redirects you to the Identity Server and asks you to authenticate with your username (email) and password (Omada1234!).

  15. After logging in, you are redirected to the CIAM Portal.

Maintain Profile (ILC02.07)

After you have successfully completed the sign up process, you are able to perform the Maintain Profile scenario:

  1. Log in to the CIAM portal.

  2. Select Edit information. You can now maintain most of the properties of the identity (which properties can be maintained are controlled in ES Portal).

  3. Modify the last name, scroll down, and add a new entry in mobile phone.

  4. Click Save changes. A confirmation will appear.

  5. Optionally, log into the Enterprise Server as Administrator. Go to Setup > Master Data > Identities and search for the identity for which the profile was updated. Verify it has taken effect also in the Enterprise Server.