1.1 Identity Manager and You

Novell® Identity Manager is a system software product that your organization uses to securely manage the access needs of its user community. If you’re a member of that user community, you benefit from Identity Manager in a number of ways. For example, Identity Manager enables your organization to:

To bring these benefits directly to you and your team, the Identity Manager User Application provides a user interface that you can use from your Web browser.

1.1.1 Introducing the Identity Manager User Application

The Identity Manager User Application is your view into the information, resources, and capabilities of Identity Manager. Your system administrator determines the details of what you can see and do in the Identity Manager User Application. Typically, this includes:

  • Identity self-service, which enables you to:

    • Display organization charts

    • Report applications associated with a user if you are an administrator. (Requires the Provisioning Module for Identity Manager.)

    • Edit the information in your profile

    • Search a directory

    • Change your password, password challenge response, and password hint

    • Review your password policy status and password synchronization status

    • Create accounts for new users or groups (if you are authorized)

  • Requests and approvals, which enable you to:

    • Issue requests for resources

    • Check the approval of your resource requests

    • Work on tasks assigned to you for approving other resource requests

    • Perform requests and approvals as a proxy or delegate for someone else

    • Assign someone else to be your proxy or delegate (if you are authorized)

    • Manage all of these request and approval features for your team (if you are authorized)

    • Optionally provide a digital signature for each request or approval

    NOTE:Requests and approvals require the Provisioning Module for Identity Manager.

1.1.2 The Big Picture

Figure 1-1 The IDM User Application Provides the User Interface to Identity Manager

1.1.3 Typical Uses

Here are some examples of how people typically use the Identity Manager User Application within an organization.

Working with Identity Self-Service

  • Ella (an end user) recovers her forgotten password through the identity self-service features when logging in.

  • Erik (an end user) performs a search for all employees who speak German at his location.

  • Eduardo (an end user) browses the organization chart, finds Ella, and clicks the e-mail icon to send a message to her.

Working with Requests and Approvals

  • Ernie (an end user) browses a list of resources available to him, and requests access to the Siebel* system.

  • Amy (an approver) receives notification of an approval request via e-mail (which contains an URL). She clicks the link, is presented with an approval form, and approves it.

  • Ernie checks on the status of his previous request for Siebel access (which has now gone to a second person for approval). He sees that it is still in progress.

  • Amy is going on vacation, so she indicates that she is temporarily unavailable. No new approval tasks are assigned to her while she is unavailable.

  • Amy opens her approval task list, sees that there are too many for her to respond to in a timely manner, and reassigns several to co-workers.

  • Pat (an administrative assistant, acting as a proxy user for Amy) opens Amy’s task list and performs an approval task for her.

  • Max (a manager) views the task lists of people in his department. He knows that Amy is on vacation, so he reassigns tasks to others in his department.

  • Max initiates a request for a database account for someone in his department who reports directly to him.

  • Max assigns Dan to be an authorized delegate for Amy.

  • Dan (now a delegated approver) receives Amy’s tasks when she is unavailable.

  • Max engages an unpaid intern, who should not be entered into the HR system. The system administrator creates the user record for this intern and requests that he be given access to Notes, Active Directory*, and Oracle*.