IIQAssociate Study Guide
IIQAssociate Study Guide
Tasks are batch jobs that act on objects (no user interaction)
Business processes are repeatable sets of executable steps that act on objects (often interact
with users)
Rapid Setup: First available in 8.1. Allows a broad team to participate in deployment, common
scenarios configured.
Once hbm.xml files have been modified, /WEB-INF/bin/iiq schema will create the db scripts in
/WEB-INF/database
If the DB table already exists and you would like to add more attributes, instead of running the
“schema” command in the iiq console, run the “extendedSchema”:
● Modify the hbm file
● WEB-INF/bin/iiq extendedSchema
● New ddl files will exist in WEB-INF/database
● Use ddl to update the existing db
Identity Cube: All information we have about the identity (accounts, attributes, access, policy
violations, risk scores). Information on cube can be:
● Discovered
● Requested
● Assigned
● Calculated
Account Schema: Represents the application account, and defines which attributes are read. It
is required for each application.
Identity Attributes: Used to drive processes in IIQ. There are standard attributes that are
searchable, and extended attributes (as many as you want) defined by user
Standard Attribute List:
● Administrator (only applies to service account / bot)
● Display Name
● Email
● First Name
● Inactive
● Last Name
● Manager
● Software Version (only applies to service account / bot)
● Type
Identity Datatype:
● Supports one to many identity relationship
● Identity can only have 5 other identities as attributes (manager is 1, so 4 others)
Manager correlation defines which application attribute maps to user’s manager (can be
specified either in the app definition or rapid setup)
Refresh Task Best Practice: Have multiple identity refresh tasks which allows you to execute
various options as needed in a just-in-time manner
Scoping: Dividing data into logical groups and granting access based on those groups.
Controls the object user can see and act on.
Workgroup: Group of identities treated as a single IIQ identity. Can assign both capabilities and
scopes.
Populations: Identity search that finds a common set of attributes. Example population could
be Managers in North America (looks at both position attribute and location). Can be used to
filter for tasks, certifications, reports, etc
You can Intelligence >> Advanced Analytics >> Search for identities and save the result as a
population
Creating Groups:
● Set name
● Enabled / Disabled
● Scope
● Owner Rule
“Refresh Groups” task creates sub groups for each value found (i.e. if group factory is location,
sub groups may be Boston, Austin, and Richmond)
Once “Refresh Group” ran, group list is static and needs to be ran again to refresh. Group
membership is identified when the group is used (dynamically).
Both groups and populations only store the criteria, and determine membership dynamically
An account attribute’s type can be the type of group in the group schema
Requestable Best Practice: Infrastructure apps (AD, LDAP, DB servers) with lots of
entitlements not requestable. Business Apps with fewer entitlements requestable.
If account doesn’t match authoritative app, identity cube is created as a non-authoritative cube.
Rapid setup provides convenient ui, 1 application attribute matches to 1 identity attribute
Uncorrelated Accounts: Can manually correlate them and the correlation is permanently
maintained (and “merge” identities)
Admin Console:
● Tasks: Stack trace, terminate, status
● Environment: Statistics, status of apps, status of extensions
● Provisioning: Status of writing to other systems
Logging Options:
● Standard Out (System.out.println()) - never use in prod
● Java application logging (log4j)
● Email redirection
● Audit configuration
● Syslog logging
WEB-INF/classes/log4j2.properties you can specify log levels, and turn individual logs on and
off
Email Logging: Forced redirection emails to a file. Useful for testing purposes
Auditing: Appears in the audit log (Advanced Search). Gear >> Global Settings >> Audit
Configuration to change settings
Syslog: Logs errors that occur. Gear >> Global Settings >> IIQ Configuration >> Miscellaneous
to configure syslog deletion
Debug Pages:
● Only available to sysadmin
● Hidden url
● Can view, edit, create, delete objects
● Memory usage / garbage collection
Policy Definition: Access related business policies of enterprise. Prevent users from violating
policies, and detect existing violations.
● Detective: Find existing policy violations and have a revocation / allow it. Identity refresh
detect violations
● Preventative: In LCM process, discover a policy violation will occur and alert the
requester / approver
Certifications: Helps maintain compliance. Provides a review of access employees have. Often
there are legal/business requirements for regular certifications
Certification Lifecycle:
1. Generation
2. Staging (Optional)
3. Active
4. Challenge (Optional)
5. Revocation (Optional)
Certification Triggers:
● Manual
● Scheduled
● Data changed (triggering certification)
Often, a business role has a required IT role(s). So the business role is assigned, and then on
the back end the IT role also becomes assigned (and IT role has required entitlements, so the
entitlements become provisioned).
Permitted Roles are IT roles that can be requested once you have the business role.
On the identity refresh task, assignment rules and detection is processed. Provision
assignments / disable deprovisioning can also be selected.
Birthright roles are always single tier - do not need to be rapid setup (can use assignment rules
directly on role).
Provisioning Fulfillment:
● Direct connectors
● 3rd party integration
● Manually assigned work items
Provisioning Process:
● Expansion (what is being requested roles / entitlements)
● Filtering (what do you already have)
● Channel selection (direct write / manual work item)
Provisioning can be dependent (maybe you need AD account prior to account on this system)
Provisioning Transaction Page: Override automated transaction and make manual work item
instead, retry to force next attempt for retry-enabled apps
Global Settings >> IIQ Config >> Miscellaneous to configure how long to keep provisioning
transactions
WokflowCase: Object created whenever a workflow is kicked off. Contains the details for
running a workflow process. It is deleted upon the workflows completion however
WorkItem: Created by workflow to obtain input from a person (approval, policy violation, manual
provisioning, request for data, access review…)
LifeCycle Events: Normal activities which occur during the course of employment
(joiner/mover/leaver)
Prior to doing the rapid setup joiner, need to have defined the applications and birthright roles
you want assigned. Then, set up actions on a per application basis
Usually you only have new accounts in authoritative apps capable of kicking off joiner
You can set up lifecycle events for very niche things through the UI, i.e. if employee department
changes from “x” to anything else, do this
Lifecycle Events can be tracked in “Track My Requests”
Advanced Analytics >> Lifecycle Events will also display what occurred in the lifecycle event
There are default workflows for requesting access (LCM Provisioning, LCM Manage Passwords)
that can be modified and have logic added
Quicklink Populations: Flexible method to control who can request what. Who can request
access? Who can they request access for? What can be requested?
There are configurations for what specific quicklinks populations have access to (manage user
access, manage accounts, etc)
Only requestable entitlements, assignable roles, and permissible roles can be requested for
Population Statistics: If the requester can see population statistics, they can filter for things
like region. I.e. Region = North America, I see 20% of users in this region have the Accounting
entitlements
By default, just the object owner approves access, but that can be customized (i.e. maybe
object owner and manager need to approve).
Attachments
● Who can access? Requester, requestee, approver, sysadmin
● Configurable: File type, is attachment required
● Limits: 20 MB size, single user request, 10 attachments per request
A sunrise and sunset date can be added, for the role to be activated on one date, and disabled
on another. (Global Settings >> IdentityIQ COnfig >> Roles)
IdentityAI: Advice for approvers. Will recommend access is approved or not, and provide a
justification why.
Manage Accounts, Manage Passwords, Create/Edit/View Identity can all only act on one
requestee at a time
In Global Settings >> Lifecycle Manager you can configure which applications accept account
only requests. Then, you can request an account for people with those accounts.
Identity Attributes can be edited, but only if the identity attribute is configured to not be
“permanent”
Target Mappings: Makes Attribute Synchronization easy. On the identity attribute, just like there
is source mappings, you can also set up target mappings to “provision downstream”. When
Identity Refresh with “Synchronize Attributes” is ran, it is provisioned to the target.
Password Interceptor: Client runs on other apps, and if password changes, it captures it and
sends it to IIQ to sync it to other apps (Business Process in IIQ to specify)
Unexpected/undesired native changes (changes in data at app level) can trigger certifications or
emails. Configure applications to look out for native changes, and then kick off a native change
lifecycle event.
Identity Refresh with “Process Events” will trigger Native Change lifecycle events. (Best
Practice: aggregate all accounts w/o native change detection, then turn on).
Account Group Management in LCM can allow for workflows to be kicked off when something in
Entitlement Catalog changes (i.e. I update the description, update it at the app too).
Create Group: At the application, when you set up a “Create Group” provisioning policy, if
someone makes a group for that app in the entitlement catalog it will write the group to the
application.
Batch Requests: Mass updates to identities / whatever via a file being updated (enable,
disable, update, add, remove, etc)
You can terminate an employee through IIQ (immediate or delayed) -> can do a termination
request via lcm
Load balancer has Session Affinity / Sticky Sessions for the UI servers.
Task and Request service definitions define which hosts are UI and which are task (only task
processes request and task)
3ms latency needed from app server to db (do not push db across WAN).