Skip navigation
All Places > Products > RSA Identity Governance & Lifecycle > Blog > 2020 > February
2020

In earlier releases of RSA Identity Governance and Lifecycle, a feature to limit the expiration date chosen during rule remediation was made available under the Rules->Configuration menu.  Similar functionality has been introduced in the RSA Identity Governance and Lifecycle 7.2 release for reviews so review administrators can set the maximum number of days access can be maintained with an expiration date.  The settings can be changed under the Reviews->Configuration and Rules->Configuration menus.  The same setting is exposed in both places allowing administrators to specify the default number of days for exception access and also the maximum number of days.

 

 

Once configured, reviewers will be limited in the calendar control available to select expiration dates.  The default date will be selected based on the configuration and the user interface will not allow selections beyond the maximum number of days.

 

For additional information on this update – please check out this additional context:

In earlier release of RSA Identity Governance and LIfecycle, the Generic REST connector was introduced and is being used by many customers.  In the RSA Identity Governance and Lifecycle 7.2 release, we have introduced the matching connectors to allow you to collect entitlements, accounts, and identities from endpoints using REST API calls.  REST is becoming a standard way to interact with systems returning data in a well defined structure (JSON).  One of the key advantages is that if endpoints change implementations, you don't need an entirely new collector but instead simply adjust the REST API calls configured slightly.

 

To get started, create a new collector and select Generic REST as the data source type:

 

 

The following video dives deeper into what to consider when creating a collector and how to handle things like pagination, authentication, and how to debug the configuration.  A REST client like Postman is recommended to determine the right apis to call and how to parse the responses:

In the RSA Identity Governance and Lifecycle 7.2 release, we have introduced a new component that can be used on dashboards to display a single value "fact".  Dashboard Facts are a convenient way to provide high level information on a dashboard with click through support to dive into the details.  Combined with other dashboard components you can build very powerful dashboards targeted to specific users or roles.

 

To create a dashboard fact, you will need to decide on the fact you want to show.  For example, maybe I want to know how many applications have been onboarded into RSA Identity Governance and Lifecycle.  Dashboard facts can appear on any type of dashboard (Welcome, Object, or Topic level).  Along with the fact you will want some visualizations like a name, a colour for the fact, and some descriptive text to explain why anyone cares about the fact (or to give the context for the fact).  When creating a fact, the most important thing to keep in mind is what is the fact meant to convey.  For example, if I show a number of 100 is that a good thing or a bad thing someone may want to drill into more.  For this reason, keep your facts concise.  In addition to the fact itself, you can configure an url that allows the fact to be clicked on to get more details.  This is especially useful to provide a high level dashboard that links to a lot more content like a report or a detail screen within the product.

 

 

It is highly recommended you start with thinking about the fact you want to present and is there an efficient way to get the value to display.  Performance is the key as the query will be run everytime the dashboard is displayed.  RSA recommends using values that are not calculated at runtime.  For example, use counts for objects that are gathered daily and stored in the public view PV_TELEMETRY_DATA  rather than a query that does an actual count every time the query is executed.

 

To showcase this new feature and help system administrators, the 7.2 release includes a new dashboard available out of the box called 'System Admin' Dashboard.  Facts like the number of admin errors are shown on this dashboard with click through support to take the end user to the actual admin errors.

 

For additional information on this update – please check out this additional context:

Two new review analysis have been introduced in the RSA Identity Governance and Lifecycle 7.2 release:

 

 

 

 Never Reviewed

This new category finds any access that has not been reviewed by any reviewer in any review.  This helps reviewers to identify items that have never been reviewed in their list and take appropriate actions.  Other review items will likely have similar review actions to previous reviews unless a user's role or status has changed.

 

 Expiring Soon

Exceptional access given for access raised as a violation will be flagged by this category if the expiration date is within 30 days (default) from the time of the review generation.  The default value can be overridden by navigating to Admin->System->Settings.  This allows reviewers to review the access and make a decision before the access expires and goes through another round of remediation.

 

These new categories can be configured from the Analysis & Guidance page of the review definition along with the other existing categories:

 

For additional information on this update – please check out this additional context:

Sean Miller

New Feature: IMAP Support

Posted by Sean Miller Employee Feb 11, 2020

Email protocols have evolved and to remain modern and provide secure solutions theRSA Identity Governance and Lifecycle 7.2 release now includes IMAP/IMAPS as a supported protocol for receiving inbound emails.  This can be configured on the Admin->Email->Settings page.

 

 

IMAP is recommended to use for the inbound server protocol rather than POP3 and many organizations are now requiring the use of this protocol.

In the RSA Identity Governance and Lifecycle 7.2 release the user interface is cleaner, more consistent, and provides a more cohesive experience.  We have moved to a style guide based reusable component framework.

 

This release includes redesigned UI components and features such as:

  • Dialogs
  • Buttons
  • Tables
  • Charts
  • Links
  • Card based component layout
  • New icon set for high resolution displays

 

Color Palette and Fonts

A palette of named colors for styling components is used now rather than hex codes used in multiple places.  This means one css file controls all color palettes making it consistent across all the UI components in the application.  

The default font has now been set to "Open Sans" and a consistent font sized used based on the context (Title: 20px, Heading: 16px, SubHeading: 12px ....).


Buttons

Buttons are now shown as primary, secondary, and tertiary buttons to help highlight the primary action, secondary action, and other actions that a user might be interested in.  Some buttons are now associated with action icons providing a visual cue to help with accessibility.

 

Icons

A new icon set for higher resolution has been provided.  This improves the scalability leading to faster performance and browser loading, avoids pixelation on larger displays, and avoids image redundancy.

 

Similarly, loading icons have been replaced by a standard spinner icon that is more scalable.

 

Notification Panel

The notification panel accessible from the top right of the main menu now has a cleaner user interface incorporating card based component layout with notifications grouped by date.

 

Progress Bar

Progress bards have been redesigned to look cleaner and render better in browsers.  Several browsers experienced clipping issues and the component was not performant.

 

Dialogs

The layout of dialogs has been changed so the header background color to a primary color (blue), new button design is used for primary and secondary actions, and links are highlighted in blue. 

 

Tabs and Breadcrumbs

Tabs are now shown as a minimalist component where the selected tab is denoted by an underline.  Earlier iterations were much busier, required rendering time in browsers, and proved to be distracting in user interaction testing.

The title of the page is shown now above the breadcrumb, highlighted in blue.  The breadcrumb shows a detailed path and allows the user to navigate to any page present in the path (earlier versions just allowed navigation back to the home page).

 

Tables

Tables have been redesigned with a modern them and includes a redesigned pagination component that is consistent across the application.  The go to page functionality has been separated out by aligning it to the bottom right of the table.

Table filtering has changed so the active filter is blue and other available filters are white.  Disabled filters are shown with a gray background.  Grouping and searching fields have also been made more consistent and clean in this release.

 

Links

Links are not represented in a blue color and appear red when hovered over with an underlined font.

 

Charts

Charts now have a modern theme and layout with improved animations.  A standard color palette is used and new options have been added to download charts in the desired user format.

 

Form Elements

The active field is now more evident in forms using a blue border to highlight text box and text area controls.

 

What's New Page

The what's new page has been redesigned to showcase key features in the top card based slider.  Other features are also shown on this page in standard cards below the slider.  The features here are controlled by entries in the strings.properties and additional text/highlights can be added in customerstrings.properties for customer environment's.

 

These are just some of the exciting changes we have made in the user interface this release.

The topic of 'System Data and Diagnostics' is not new news.  We announced these capabilities in 7.1.1 in this blog.  However, in the RSA Identity Governance and Lifecycle 7.2 release we have added additional data points and functionality.

 

It is important to understand the 'System Data and Diagnostics' feature is made up of two key parts:

  • Gathering
  • Sharing

 

All configuration for this feature is done on the Admin->Diagnostics->System Data and Diagnostics page.

 

 

Gathering

This is a scheduled task that runs daily to calculate and store off data points.  Once stored, these data points can queried using the public view PV_TELEMETRY_DATA.  These are extremely useful to show the state of the system, show trends over time (like application onboarding), show return on investment (decreasing trend of rule violations), and highlight gaps (number of orphaned accounts).

 

A key value add of having the gathered data is that it is static data perfect for reports and dashboards instead of real time potentially expensive count queries.

 

Data is gathered from yesterday and beyond to avoid incomplete data for today since the time the gathering runs versus collections and other activities may vary

Sharing

In additional to gathering the data points, it is recommended you configure the system to also share this data with RSA.  This document describes in detail what is collected and shared here.  It is important to note that there is no personal data shared like user information and with the exception of the customer name, there is no other identifying information gathered.  By providing the data to RSA, this helps RSA understand how customers are using the product and where we should be investing, what areas are not being used which helps us make deprecation decisions, and understand the size of deployments and identify opportunities where RSA can have conversations to help our customers.  Lastly, this also helps RSA identify key customers to participate in beta programs or design partnering based on their use of the product.

 

To share the data, the IGL server needs to be able to access the web site - https://cms.netwitness.com/telemetry

 

For additional information on this update – please check out this additional context:

In the RSA Identity Governance and Lifecycle 7.2 release, we have enhanced the unauthorized change detection feature processing:

  • Filter by Accounts
  • Filter by Users
  • Filter by Groups
  • Detect Unauthorized Missing Access

 

Filter By (Accounts, Users, Groups)

When creating a new unauthorized change detection (UCD) rule, the rule will continue to apply to all accounts in the system by default.  To have the rule take action for specific accounts or exclude specific accounts click on the “All”.

Any UCD rule existing prior to this version will default to ALL accounts as that is the equivalent functionality in prior releases.  

Clicking on the “All” will produce a pop-up which is our standard filter screen where you can limit the accounts.

 

 

Detect Unauthorized Missing Access

The Unauthorized Change Detection rule previously was only capable of detecting any new access that was collected for a user which was not authorized.  This enhancement will detect when the selected access is removed from a collection for a user which was not authorized.

As seen in the UI there are two new check boxes.  The first ‘Detect New Access’ represents the old functionality and ‘Detect Missing Access’ represents the new functionality.  Any new rule will default so that detect missing access DISABLED as that is consistent with the default action of the rule in prior versions.  You must go and enable this check box by choice.

Any UCD rule that exists in a prior version will be migrated so that the detect missing access is also disabled keeping the execution of the rule consistent with prior versions.

 

 

For additional information on this update – please check out this additional context:

Sean Miller

New Feature: User Pictures

Posted by Sean Miller Employee Feb 11, 2020

User pictures have been introduced in the RSA Identity Governance and Lifecycle 7.2 release to help various RSA Identity and Governance actors make decisions when reviewing, approving, or remediating user's access.  An image can now be associated with a user and is displayed on the user detail screen and the user information popups throughout the product.  The image is also shown for the active user in the menu bar when logged in.

 

 

User pictures can be managed a few different ways be default:

  • Self - A user can modify their image on the user's detail screen
  • Direct reports - A supervisor can set the image for any user's they can edit.  Usually this equates to their direct reports but this can be controlled through security context configurations.
  • Administrator - Pictures can be directly uploaded through the Admin->User Interface->Files (Users) page.  The filename must match the userid of a user before it will be used.
  • Web Services - Pictures can also be uploaded using the setUserImage web service.  This web service requires a token for a user that can modify the specified user.  This is a useful way to manage images in bulk leveraging curl calls.  There is also a getUserImage web service that can be used to access the picture for a specific user

 

The security for who can edit the images can be controlled by granting the User:Edit Image, User:Edit Self Image, and User:Edit All Image entitlements to the desired users.

 

For additional information on this update – please check out this additional context:

RSA IGL Version: V7.1x & V7.2x

Modules: Governance 

Product Area: Account Reviews

Note: A summary of all RSA IGL recipes can be found here: (TBC)

Time to apply: ~2 hours

 

Summary:

Within Account Access and Ownership Reviews, the Maintain and Revoke buttons are mandatory and cannot be hidden or removed. When a reviewer selects Revoke against the account, this will result in a change request being generated to delete the account.

 

It is not always possible to delete accounts and it has been asked by multiple customers how the Revoke button behaviour can be changed to perform disablement of the account or even disablement and removal of access.

 

The attached document, created by RSA Professional Services, provides details on the out of the box components used and steps followed to create an Approval Workflow to:

  • Reject the automatically created Delete Account change request
  • Create a new change request to disable the account
  • Create a new change request to remove access (if required)

Filter Blog

By date: By tag: