"To be prepared is half the victory." - Miguel de Cervantes
Certifying user access is an essential component of good identity governance. Careful planning before you launch a certification will help ensure that your certification is accurate, manageable, and effective.
Here are some best practices for planning a successful certification campaign.
Starting your certification campaign with data that is clean, free of errors, well-organized, and easy for users to understand is one of the most important things you can do to ensure that your certification runs smoothly, without confusion or errors.
Here are some general best practices for getting your data into its best condition before you begin. Each of the recommendations in this section is described in more detail in the Best practices: Avoiding "certification fatigue" document. That document has other pointers on making your certifications user-friendly for your reviewers, so it's a good idea to review that document as well, as you plan your campaign.
Most people are familiar with the phrase "garbage in, garbage out." Before launching a certification campaign, it's important to clean up or get rid of any unnecessary "garbage" in the data that will be reviewed. Working with clean data means your certification will target the right users and the right access. Get tips on cleansing data.
Access reviewers may be looking at lists of hundreds or thousands of individual roles or entitlements in the UI. Too often, reviewers don’t fully understand the access and entitlements they are asked to approve. Consistent, meaningful names for roles and entitlements help these users quickly grasp important information about the access under review. Find quick tips on naming conventions for roles and entitlements.
Because roles can include many entitlements, a good role model can help reduce the number of individual access items a reviewer needs to process. You can include user-friendly descriptions with your roles to help reviewers understand what access is appropriate for and granted by the role. Read about best practices for building roles.
It’s a given that some access carries higher risk than others. Elevated administrator privileges and access to sensitive financial or personal data are common examples of high-risk access. This is the type of access you want to be very sure your reviewers pay particular attention to - but how do you protect against high-risk access getting overlooked in a long list of access items?
Flagging high-risk access is a simple way to alert reviewers to which access items need an especially close look. You may also want to plan to certify high-risk access more frequently than lower-risk access.
Learn how to flag high-risk access in IdentityIQ with Classifications.
Most organizations have some kind of “birthright” access – access that every employee has simply by virtue of being an employee. An email address with an account on the company’s email system, a login to the payroll application, or a standard Active Directory account are all examples of common birthright access.
You may want to exclude birthright access from certification, or simply certify birthright access less frequently than other access. In IdentityIQ, you can use classifications or extended attributes to flag birthright access. Then you can use filters or rules to exclude this access from any given certification.
Learn more about birthright access.
Certifications progress through phases as they move through their lifecycle. Some phases are part of every certification, while others are optional and can be configured and used according to your specific needs. Understanding the purpose of each phase, and which activities can take place within each, can help you decide on the best configuration for each of your certification campaigns.
Some things you might consider using phases for in your certification include:
The certification phases in IdentityIQ are described briefly below. For more detailed information, see the 8.1 IdentityIQ certification access review guide, and the Lifecycle of a certification technical white paper.
• Staging — use this optional phase to test or validate a certification before sending it to reviewers. The staging phase lets you create and preview a certification and its associated access reviews. You can review how the certification and access reviews will look to your users with the current configuration options, before the certification is activated. If the certification does not fit your needs or appear as you expected, you can cancel it and redefine it as needed. If the certification is accurate, you can activate it. Using a staging period for each newly-configured certification is a recommended best practice.
• Active — the active phase is the review period when the reviews are performed. During this phase, reviewers make their decisions about access; changes can be made to these decisions as frequently as required, until the access period expires (or until the reviewer signs off on the review, or until the entire certification is closed). The active period lasts either for a scheduled amount of time, or until all the access reviews for the certification have been signed off.
• Challenge — this optional phase is used if you want to let users challenge any revocation decisions that will revoke roles, entitlements, or account group access. With a challenge phase, users are notified if an access reviewer has decided to revoke any of their access, offering them an opportunity to make their case for why they need to retain that access before it gets revoked. You can set up a variety of automated emails for the challenge period, including ones that can give users instructions on how to challenge decisions, and ones that give reviewers information on what to do in case of challenges. You also set a specific duration for the challenge period, to limit the window during which users can challenge decisions.
• Revocation — this optional phase sets a specific time period for when the work of revoking access is performed and completed. An important thing to understand about the revocation phase is that when you enable the revocation phase, revocation activity is monitored in IdentityIQ to ensure that inappropriate access to roles and entitlements is revoked in a timely manner. Revocation activity can still take place if you don't enable this phase; however in this case the revocation work won't be monitored automatically in IdentityIQ. You can view detailed revocation information by clicking the “information” icon in the access review, then clicking the Details button on the information dialog.
• End – The end period indicates when the certification is complete. If you didn't enable a revocation phase, revocations can be done during the end period. Note that certifications are not closed until all the access reviews have been signed off or an auto-close setting was specified
Hi,
Can we create a quick link for certification ?
Regards,
Kavya Salian