• Votes

    2

    Add connection failoverPartner configuration to JDBC collector

    Customer provided this JDBC connection string for an Application collector. jdbc:sqlserver://LENVSSDS10;databaseName=GetAccess;failoverPartner=COLVSSDS10 At any given ...

  • Votes

    4

    Add query capability to the CSV collector

    Add query capability to the CSV collector In an Application collector with a CSV source file, adding a query statement capability (SQL SELECT) against the CSV data would ...

  • Planned

    11

    Data Purge Utility needs to become an automatic process

    The Data Purge Utility needs to become an automatic process. Increasingly, Application Administrators are not permitted server access. Provide Purge Utility parameter ...

  • Votes

    7

    Request for time limited access and for access in the future

    When requesting access it is sometime needed to be able to limit the request to a specific time period already at access time. It is similar to the possibility in ...

  • Planned

    4

    IG: Compare the IdM expected status with the actual status in the ...

    IG customers with an IdM solution (independent of vendor) do heavily rely on the status of users and permissions in their IdM system. The status of the IdM system is ...

  • Votes

    5

    Separation of IG application from web front-end

    Today the web-frontend TOMCAT and the Identity Governance application has to be placed on the same server. Many customers see this as a security risk, since the IG ...

  • Planned

    5

    Manager employee relationship review

    Before reviewing employees access rights many companies would like to have a review of the manager/employee relationship. Make it possible to have Identity review, ...

  • Votes

    6

    Need for grouping AD permissions into application specific groups

    AD is used as the authorization and authentication source for many applications via federation. A typical setup is that a number of security groups are created in AD to ...

  • Planned

    5

    Same information about Identities etc. by approving an access request ...

    When approving an access request the information about e.g. identities is somewhat limited in comparison to the same information one can get at reviews. Give the same ...

  • Votes

    2

    Add fulfilment connector to Active directory and FIM/MIM.

    This would enable the enhancement of MS centric environments with more complete Identity governance and also allow better request/approve functionality. Additionally a ...

  • Votes

    8

    Handling "Orphan Reviews"

    If a reviewer is no longer valid while a review is in flight, the system should escalate the "orphaned review" to the original reviewer's supervisor and up the chain.