8Step 1: Enter the Role Details


Provide Basic details of the role-

1. Role Name*:  Enter a name for your role.

2. Search Keywords: You can enter keywords to tag your role for filters.

3. Description*: Provide a brief description of  the role,

4. Add to Collection: Add this Role to a pre-existing Collection.

Provide Role Owner details-

5. Role Owner*: Enter name of the individual who owns the Role and certification of role memberships. This is a required and important field. Enter your name if not sure.

6. IDM: Enter Identity Management system and version your Enterprise will use. To use IDHub engine use IDE Shim by default. Other IDM options are only presented if IDHub is integrated with other IDM systems.

Provide Approval Workflow details-

7. Approval Workflow*: Select the approval workflow for the application once requested b the user. Currently, IDHub provides 5 levels of approval workflow namely:

  • Auto approver (Auto approved + Fulfiller group for disconnected applications)
  • Manager Approver ( Beneficiary Manager Approval + Fulfiller group for disconnected applications)
  • Level 1 Approver ( Beneficiary Manager Approval + 1 additional approver + Fulfiller group for disconnected applications)
  • Level 2 Approver ( Beneficiary Manager Approval + 2 additional approver + Fulfiller group for disconnected applications)
  • Level 3 Approver  (Beneficiary Manager Approval + 3 additional approver + Fulfiller group for disconnected applications)

8. Certifiable:  You can enter tags that denote the industry or regulatory standards this application has to show compliance and adhere to.

9. Risk Level: Just like business owners, Role owners need to use an internal enterprise defined criteria to classify the Risk Level of their Role.  Typically in the industry the following are the 3 Risk Level classifications-

  • Low Risk
    • Role provides access to systems and data available for public consumption
    • Role provides access to systems that can be easily restored and data can be easily reproduced
    • Role provides access to to systems that are not-critical enterprise function and is mostly informational.
  • Moderate Risk
    • Role provides access to systems and data not for public consumption and is limited to internal use only
    • Role provides access to systems integrated to other systems in the network and is trusted and important for other system function.
    • Role provides access to systems that are important for enterprise function.
  • High Risk
    • Role provides access to systems and data that are highly confidential , restricted and/ or are protected by regulatory standards.
    • Role provides access to systems and data integrated to other systems in the network and is highly trusted and critical for other system function.
    • Role provides access to systems and data  critical for enterprise function.

10. Requestable: Switch this toggle button to on for it to be available for request in your end user catalog.

11. Next: Navigate to next page in the wizard.


In this section

Related content

Need more help?

Folks at IDHub are ready to support you.