Show TOC

Procedure documentationUser Level Access Risk Analysis Locate this document in the navigation structure

 

You can create a report displaying the user-level access risk analysis for your organization.

Procedure

  1. Choose   Access Management   Access Risk Analysis   User Level  .

    The Risk Analysis: User Level screen appears.

  2. Specify the analysis criteria.

    Do the following:

    1. Choose the object type using the first dropdown list, from among the following:

      • System

      • Custom Group

      • Include Users

      • Include Role Assignment

      • Org Level

      • Org Rule

      • User ID

      • Org Unit

      • Org Value

      • Risk by Process

      • Access Risk ID

      • Risk Level

      • Rule Set

      • User

      • User Group

      • User Type

      • Validity Date

    2. Choose the operator using the second dropdown list, from among the following:

      • is

      • is not

      • starts with

      • contains

      • is between

      • Multiple Selections

    3. Enter or select the value in the third field.

    4. Optionally, add a line to the analysis criteria by choosing the plus (+) pushbutton and specifying the appropriate fields. Alternatively, remove a line from the analysis criteria by choosing the corresponding minus (-) pushbutton.

  3. Specify the report options.

    Do the following:

    1. In the Format section, select the format type and view.

      You can choose from among the following format types:

      • Summary

      • Detail

      • Management View

      • Executive View

      You can choose from among the following views:

      • Technical View

      • Business View

  4. In the Type section, select the report type from among the following:

    • Access Risk Analysis—Select Action Level, Permission Level, Critical Action, Critical Permission, and Critical Role/Profile.

    • Access Risk Assessment

    • Mitigating Analysis—Choose either Mitigating Controls or Invalid Mitigating Controls.

  5. In the Additional Criteria section, select any additional reporting criteria.

  6. Optionally, save the analysis criteria as a variant by typing a name in the Save Variant as field and choosing Save.

  7. Choose Run in Foreground or Run in Background.

    If you choose Run in Background, the Background Scheduler dialog appears. Enter the scheduler details and choose OK. The job number appears on the User Level screen.

    To view the job, navigate to    Access Management   Scheduling   Background Jobs  .

    If you choose Run in Foreground, confirm that you want to run the analysis immediately by choosing OK. The analysis results appear in a new window.