Provisioning administration
This topic outlines the tasks that are part of the role of an administrator responsible for the HelloID Provisioning module.
Monitoring
Monitor HelloID using the built-in mechanisms:
Review evaluation, blocked actions, and reconciliation summary notifications; see Notification events
Review Provisioning Incidents via the Admin dashboard. See Troubleshooting Provisioning for resolution steps.
Review Merge suggestions for Persons in HelloID.
Review HelloID's provisioning activities via the
Provisioning dashboard:Persons > History
Business > Entitlements > History
Source > Snapshots
Target > Snapshots
Review Provisioning reports.
Monitor all connected systems: Source systems), Target systems, and other systems (such as Exchange) that are used in Provisioning actions and events.
Manage persons excluded from the business rules (see Business > Exclusions).
Monitor and manage accounts and entitlements outside of HelloID.
If Governance is available, you can use the Reconciliation feature for this. Check the Reconciliation reports. Resolve issues found in the target systems, and manage Exclusions.
Monitor the organization for changes that may affect the configuration of HelloID Provisioning.
The Quick Reference: Provisioning configuration helps you discover and regularly check the relevant details of your HelloID Provisioning configuration.
Troubleshooting
Troubleshoot Provisioning incidents and issues. See Troubleshooting Provisioning for resolution steps and additional resources.
For Active Directory errors, see: Troubleshoot an AD target system.
A number of frequently asked questions are answered in FAQ: Provisioning.
Help desk tasks/maintenance
- 1. Link an existing account to a person in HelloID
- 2. Preserve an account or permission membership
- 3. Update AD account attributes
- 4. New entitlement to be managed by HelloID
- 5. Organizational structure changes
1. | Link an existing account to a person in HelloID | ||||||
Accounts are linked with a person automatically if Correlation has been set up for the target system.
| |||||||
2. | Preserve an account or permission membership | ||||||
You may want an account or permission membership to be no longer managed by HelloID. For example, when a person is no longer entitled to the account or permission according to the business rules, and you do not want it to be deleted.
If Governance is available: The unmanaged entitlement will appear in - and can be excluded from - future Reconciliation reports. | |||||||
3. | Update AD account attributes | ||||||
When an employee’s personal information changes, for example, after a marriage or divorce, related user account attributes such as User Principal Name (UPN) and sAMAccountName must be updated accordingly.
| |||||||
4. | New entitlement to be managed by HelloID | ||||||
When a new entitlement (membership, folder, etc.) needs to be managed via the business rules:
| |||||||
5. | Organizational structure changes | ||||||
When the organizational structure changes (e.g., new departments or roles are introduced), this can affect the organization's authorization matrix. Organizational data, such as departments, roles, and user attributes, is often used in Conditions in Business rules. Update existing rules or create new ones as needed. Major organizational changes may impact more than just the business rules. In such cases, working with a HelloID consultant is recommended. TipIf you need help designing business rules, Tools4ever provides paid role mining sessions led by experienced HelloID consultants. This service is available only in select regions. |
Advanced configuration and scripting
The following administration tasks require a thorough understanding of HelloID and/or programming skills and will usually be handled by a HelloID expert.
- 1. Add a new source system
- 2. Add a new target system
- 3. Create or update post-action script
- 4. Target system (API) changes
1. | Add a new source system | |||
Adding a new source system is necessary when an HR system, roster system, or other software that contains source data is replaced or added.
| ||||
2. | Add a new target system | |||
Add a new target system to automatically grant or deny access to a new application, system, or physical workspace. For example, when key cards to enter a building or floor are introduced; on-premise Exchange is replaced with Microsoft 365; new employees need immediate access to Slack, GitHub or Atlassian products; the provisioning of accounts in Exact Online or TOPdesk must be automated. Other reasons to introduce a new target system are the need to reduce security risks and ensure compliance with regulations like GDPR, HIPAA, and ISO 27001. For example, when employees leave the organization, their SAP, ServiceNow, GitLab, or TopDesk account must be deactivated automatically.
| ||||
3. | Create or update post-action script | |||
Creating or updating post-action scripts is necessary when an account-related entitlement action in an Active Directory system should execute PowerShell code in [→Active Directory target systems].
| ||||
4. | Target system (API) changes | |||
Modify scripts in a PowerShell v2 system.
|