• Votes

    1

    Name/recipient data is not in Ascending order and Application name and ...

    In IG portal while going to Approvals in My Approvals tab. 1. Name/recipient data is not in Ascending order. If the data is in Ascending order it would be easy for ...

  • Votes

    2

    Request access for non human accounts (not tied to a human identity)

    When requesting access for a service account, which is not for a specific person's use, the account would not be for a specific person's identity. There should be a ...

  • Votes

    2

    Allow an access request approver to modify the access request

    Access request approvers may have a better understanding of what access the person should have and thus may need to modify the request. They may need to approve some of ...

  • Votes

    2

    Have a dependency between training and applications/permissions that ...

    Have a dependency between training and applications/permissions that can be requested. If someone does not have the training information in IG stating they qualify for ...

  • Votes

    2

    You can request access access for something you already have access to

    You can request access access for something you already have access to. You can also have multiple requests in at the same time, for the same thing. This is confusing ...

  • Votes

    2

    Have Workday collectors for Identity and Application information

    Have Workday collectors for Identity and Application information

  • Votes

    2

    Have automated Salesforce fulfillment built into the IG product

    Have automated Salesforce fulfillment built into the IG product

  • Votes

    2

    Have automated Workday fulfillment built into the IG product

    Have automated Workday fulfillment built into the IG product

  • Votes

    2

    IG Applications who should only have 1 permission assigned should ...

    IG Applications who should only have 1 permission assigned should automatically trigger the replacement of the original permission when the new permission to be assigned ...

  • Votes

    2

    Add additional email tokens to Identity Governance notifications

    For example, we see an advantage to being able to have a request notification have information like the user who the request is for, what application(s) the request is ...

  • Votes

    4

    Collection / publication triggered by scheduled review

    As a (review) adminstrator I want to be able to collect and publish an application source before and after a review. It is recommended to collect/publish before and after ...

  • Votes

    2

    ServiceNow Fulfillment with OAuth2.0 support (Rest version)

    The ServiceNow Fulfillment is currently designed to utilize SOAP endpoints. The available ServiceNow Fulfillment templates offer the possibility to configure Basic ...

  • Votes

    9

    Check on permissions in other technical roles on revoke of technical ...

    Currently IGA does not check other technical role contents on revoke. When you have two technical roles with (partly) overlapping permissions (which can happen with some ...

  • Votes

    8

    Ability to automatically assign additional (conditional) permissions

    A lot of applications have a structure like this: - Application account - Certain permission right - Certain default permissions that every user needs when they have a ...

  • Votes

    9

    Connector certificates in trust store

    Currently the certificates of applications need to be manually imported via the GUI. For our current customer we have multiple sort of "virtual" applications in AD and ...

  • Votes

    2

    Configupdate - add sanity checks for URL:s

    It would be nice if configupdate would do a sanity check on the URL:s entered so that they are well-formed, syntactically correct and maybe even throw in a DNS name check ...

  • Planned

    10

    Fulfillment notification to end user and others

    As a user I want to be notified when a requested permission is actually fulfilled by the system. There are use cases in which a service desk or manager requests ...

  • Votes

    1

    Granular Application Risk Evaluation

    IG 3.5 has only a single set of rules to determine application risk. There is, for instance, only a single configuration item for "number of permissions". However, ...

  • Votes

    1

    Business Role Analysis

    Enhancements to existing analysis capabilities: 1. find business roles and permissions having relationship numbers exceeding a certain threshold - separately for child- ...

  • Votes

    3

    Business Role Mining

    Large environments (tested with 80.000 users and > 200.000 permissions) require that mining can be started for smaller portions of data. Tech Role Mining already provides ...