Identity policies can define roles that are mutually exclusive and cannot be granted to the same user concurrently. For example, you can prevent a user manager who can grant raises from also being a salary approver.
To create an identity policy set that enforces segregation of duties, create an identity policy with the following settings:
Setting |
Value |
---|---|
Apply Once |
Not enabled |
Compliance |
Enabled |
Policy Condition |
Use the "in <administrative-intersection-constraint>" option to define a set of conditions that violate a business policy. If a user meets all of the conditions, CA Identity Manager takes the actions in the Action on Apply Policy field. For example, set the policy condition as follows: intersection (who are members of <some_role>) and who are members of <some_other_role> ) |
Action on Apply Policy |
The actions that CA Identity Manager should take when the policy condition applies--for example:
|
The following figure illustrates the identity policy in this example.
Copyright © 2015 CA Technologies.
All rights reserved.
|
|