Reports run through Hitachi ID Identity Manager, interactively or on a schedule, can be fed back to the request subsystem. This makes analytics actionable, since report output automatically triggers requests for remediation:
- Request forms are marked as eligible for being invoked from reports.
- A suitably permissioned user runs a report interactively and inspects the output.
- The user then selects a request form and maps columns in the report to fields in the form.
- Some fields may be set to constant values, rather than report columns.
- The report is then re-run, immediately or on a scheduled or recurring basis.
- Identity Manager submits a new remediation request for every row of report output.
- Identity Manager tracks request submission, to suppress duplicate requests to remediate the same thing. For example, if the report was "list inactive accounts" and the request was "disable account," Identity Manager will only disable newly discovered inactive accounts rather than attempting to repeatedly disable the same accounts, on subsequent runs.
Configuration of a report to stream its output to a request form is illustrated in Figure [link].
Generating and resolving audit cases
Identity Manager supports automatic generation of audit cases, when its automated analytics processes identify policy violations or new instances of elevated risk.
- "Cases" are just requests in the workflow queue, though not requests for access.
- They are generated by a report, whose output is fed back into the request system automatically (one-time or on a scheduled run).
- The report infrastructure checks for duplicates and will not re-submit the same case within N days of first submitting a given request.
- Cases are automatically 'approved' and routed to the appropriate controls owner to 'implement.'
- Implementers accept a case (since more than one person might be invited to work on the same case/request) and mark them as closed when they complete their investigation and/or remediation.
In some cases, it is possible to automatically remediate audit
cases, without human intervention. For example, on some applications
it is reasonable to disable the right of unused (dormant) accounts
to login. Where automated remediation is possible, the configured
request type is one for remediation, not for review.