-
Votes
1
Name/recipient data is not in Ascending order and Application name and ...
In IG portal while going to Approvals in My Approvals tab. 1. Name/recipient data is not in Ascending order. If the data is in Ascending order it would be easy for ...
Comments (1) | by: Karthik A. | over a year ago | Last activity over a year ago | Status changed over a year ago | Configuration
-
Votes
2
Request access for non human accounts (not tied to a human identity)
When requesting access for a service account, which is not for a specific person's use, the account would not be for a specific person's identity. There should be a ...
Comments (0) | by: Keith H. | over a year ago | Last activity over a year ago | Status changed over a year ago | Configuration
-
Votes
2
Allow an access request approver to modify the access request
Access request approvers may have a better understanding of what access the person should have and thus may need to modify the request. They may need to approve some of ...
Comments (0) | by: Keith H. | over a year ago | Last activity over a year ago | Status changed over a year ago | Configuration
-
Votes
2
Have a dependency between training and applications/permissions that ...
Have a dependency between training and applications/permissions that can be requested. If someone does not have the training information in IG stating they qualify for ...
Comments (0) | by: Keith H. | over a year ago | Last activity over a year ago | Status changed over a year ago | Configuration
-
Votes
2
You can request access access for something you already have access to
You can request access access for something you already have access to. You can also have multiple requests in at the same time, for the same thing. This is confusing ...
Comments (0) | by: Keith H. | over a year ago | Last activity over a year ago | Status changed over a year ago | Configuration
-
Votes
2
Have Workday collectors for Identity and Application information
Have Workday collectors for Identity and Application information
Comments (0) | by: Keith H. | over a year ago | Last activity over a year ago | Status changed over a year ago | Configuration
-
Votes
2
Have automated Salesforce fulfillment built into the IG product
Have automated Salesforce fulfillment built into the IG product
Comments (0) | by: Keith H. | over a year ago | Last activity over a year ago | Status changed over a year ago | Configuration
-
Votes
2
Have automated Workday fulfillment built into the IG product
Have automated Workday fulfillment built into the IG product
Comments (0) | by: Keith H. | over a year ago | Last activity over a year ago | Status changed over a year ago | Configuration
-
Votes
2
IG Applications who should only have 1 permission assigned should ...
IG Applications who should only have 1 permission assigned should automatically trigger the replacement of the original permission when the new permission to be assigned ...
Comments (0) | by: Keith H. | over a year ago | Last activity over a year ago | Status changed over a year ago | Configuration
-
Votes
2
Add additional email tokens to Identity Governance notifications
For example, we see an advantage to being able to have a request notification have information like the user who the request is for, what application(s) the request is ...
Comments (0) | by: Thomas S. | over a year ago | Last activity over a year ago | Status changed over a year ago | Configuration
-
Votes
4
Collection / publication triggered by scheduled review
As a (review) adminstrator I want to be able to collect and publish an application source before and after a review. It is recommended to collect/publish before and after ...
Comments (0) | by: S K. | over a year ago | Last activity over a year ago | Status changed over a year ago | Configuration
-
Votes
2
ServiceNow Fulfillment with OAuth2.0 support (Rest version)
The ServiceNow Fulfillment is currently designed to utilize SOAP endpoints. The available ServiceNow Fulfillment templates offer the possibility to configure Basic ...
Comments (0) | by: Robert-Jan v. | over a year ago | Last activity over a year ago | Status changed over a year ago | Configuration
-
Votes
9
Check on permissions in other technical roles on revoke of technical ...
Currently IGA does not check other technical role contents on revoke. When you have two technical roles with (partly) overlapping permissions (which can happen with some ...
Comments (0) | by: S K. | over a year ago | Last activity over a year ago | Status changed over a year ago | Configuration
-
Votes
8
Ability to automatically assign additional (conditional) permissions
A lot of applications have a structure like this: - Application account - Certain permission right - Certain default permissions that every user needs when they have a ...
Comments (0) | by: S K. | over a year ago | Last activity over a year ago | Status changed over a year ago | Configuration
-
Votes
9
Connector certificates in trust store
Currently the certificates of applications need to be manually imported via the GUI. For our current customer we have multiple sort of "virtual" applications in AD and ...
Comments (0) | by: S K. | over a year ago | Last activity over a year ago | Status changed over a year ago | Configuration
-
Votes
2
Configupdate - add sanity checks for URL:s
It would be nice if configupdate would do a sanity check on the URL:s entered so that they are well-formed, syntactically correct and maybe even throw in a DNS name check ...
Comments (0) | by: Anders B. | over a year ago | Last activity over a year ago | Status changed over a year ago | Configuration
-
Planned
10
Fulfillment notification to end user and others
As a user I want to be notified when a requested permission is actually fulfilled by the system. There are use cases in which a service desk or manager requests ...
Comments (4) | by: S K. | over a year ago | Last activity over a year ago | Status changed over a year ago | Configuration
-
Votes
1
Granular Application Risk Evaluation
IG 3.5 has only a single set of rules to determine application risk. There is, for instance, only a single configuration item for "number of permissions". However, ...
Comments (0) | by: Klaus S. | over a year ago | Last activity over a year ago | Status changed over a year ago | Configuration
-
Votes
1
Business Role Analysis
Enhancements to existing analysis capabilities: 1. find business roles and permissions having relationship numbers exceeding a certain threshold - separately for child- ...
Comments (0) | by: Klaus S. | over a year ago | Last activity over a year ago | Status changed over a year ago | Configuration
-
Votes
3
Business Role Mining
Large environments (tested with 80.000 users and > 200.000 permissions) require that mining can be started for smaller portions of data. Tech Role Mining already provides ...
Comments (0) | by: Klaus S. | over a year ago | Last activity over a year ago | Status changed over a year ago | Configuration