This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject
  • RSA.com
  • Home
  • Advisories
    • SecurID
    • SecurID Governance & Lifecycle
  • Documentation
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID App
      • SecurID Authenticator for macOS
      • SecurID SDK
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
    • Technology Partners
  • Downloads
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID Authenticator for macOS
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
  • Community
    • SecurID
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
    • SecurID Governance & Lifecycle
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Ideas & Suggestions
      • Community Support Articles
      • Community Support Forum
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Education
    • Blog
    • Browse Courses
      • SecurID
      • SecurID Governance & Lifecycle
    • Certification Program
    • New Product Readiness
    • Student Resources
Sign In Register Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 

SecurID® Governance & Lifecycle Blog

Subscribe to the official SecurID Governance & Lifecycle community blog for information about new product features, industry insights, best practices, and more.
  • SecurID Community
  • :
  • Products
  • :
  • SecurID Governance & Lifecycle
  • :
  • Blog
  • :
  • Violation Rules Summary report

Violation Rules Summary report

MHelmy
Moderator MHelmy Moderator
Moderator
11 1 400
  • Subscribe to RSS Feed
  • Mark as New
  • Mark as Read
  • Bookmark
  • Subscribe
  • Email to a Friend
  • Printer Friendly Page
  • Report Inappropriate Content
‎2019-03-21 08:23 PM

If your organization uses RSA Identity Governance & Lifecycle to detect and remediate access violations, chances are you have at least tens or hundreds of "User Access" or "Seggregation of Duties" rules configured if not more. After a while of creating rules in RSA Identity Governance & Lifecycle, it can be very hard to track and document the configuration of each rule in a convenient way.

 

The Import/Export metadata feature is great to use for backup/rollback of configuration but it is not human-readable and is near impossible to use on its own if you would like to have a quick overview such as which rules use which attributes.

 

For this reason I created this RSA Identity Governance & Lifecycle report which would help export all access violation rules' configuration in a convenient human-readable format to help track the overall configuration of your rules and make it easier to document them internally.

 

I tested this internally on 7.1.0 and 7.1.1. It consolidates both "User Access" and "Seggregation of Duties" rules in one report and even includes the new 7.1.1 SoD correlation filters if available. I would love to hear your feedback about this and hope this helps simplify a once tedious task

 

Attached are:

  • Report metadata export: Violation_Rules_Summary_Metadata.xml. You can import this in your system from Admin > Import/Export > Import.
  • Sample report outputs in pdf and xlsx: Violation_Rules_Summary.pdf and Violation_Rules_Summary.xlsx

 

Note: This is not a replacement for the Import/Export metadata feature. You cannot use this report to modify any rule configuration. It is only meant to export the configuration in a human-readable format.

Violation_Rules_Summary_Metadata.xml.zip
Labels
  • Features
Tags (23)
  • Tags:
  • access_violation
  • blog
  • blog post
  • chart
  • charts
  • Dashboard
  • Dashboards
  • Identity G&L
  • Identity Governance & Lifecycle
  • IG&L
  • IGL
  • Product Blog
  • Product Blog Post
  • Report
  • Reports
  • RSA Identity
  • RSA Identity G&L
  • RSA Identity Governance & Lifecycle
  • RSA Identity Governance and Lifecycle
  • RSA IGL
  • tech huddle
  • Webcast
  • webinar
11 Likes
Share
1 Comment

You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.

  • Comment
Latest Articles
  • Data Processors : Manipulating Account Data
  • Data Processors : Manipulating Identities
  • Data Processors : Basics
  • November SecurID Governance and Lifecycle Webinar Cancelled
  • SecurID Governance and Lifecycle October Webinar Recording now Available
  • SecurID Governance and Lifecycle webinar recording: Best Practices for Workflow Management
  • Friendly Reminder: Next Webinar- Introducing SecurID Governance and Lifecycle Cloud!
  • Next Webinar Coming Soon! Introducing SecurID Governance and Lifecycle Cloud!
  • Friendly Reminder: Workflow Health and Best Practices Webinar
  • Webinar Coming Soon: Best Practices in Workflow Management- 9/15/2021
Labels
  • Announcements 17
  • Features 29
  • Resources 4
  • Tutorials 12
  • Use Cases 5
  • Videos 90
  • Webinars 15
Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • Customer Success
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Provide Feedback
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.