Object in CA IdentityMinder compared to objects in CA GovernanceMinder
When looking at CA GovernanceMinder and the CA IAM Connector Server and how they handle linked objects, there are some differences. Because of these differences, we must map associations between the two systems so that both CA GovernanceMinder and the CA IAM Connector Server understand the relationships between objects. In CA GovernanceMinder, two objects are linked without dealing with how they are linked. In the CA IAM Connector Server, two objects are linked through an attribute. For example, in CA GovernanceMinder, an Active Directory account and a resource that represents a group can be linked. In the CA IAM Connector Server, the account is connected to the group through an attribute named "groupMembership". Without telling the CA IAM Connector Server which attribute to use, you cannot connect the group to the account.
The Issue
When mapping associations (which become links in CA GovernanceMinder) you must reduce the definition of the link from containing three values (from what object, to what object, and through which attribute) to only two values (from which object to which object). This reduction happens during import from the CA IAM Connector Server to CA GovernanceMinder, but an issue arises when building the three-value definition out of two values when exporting back to the CA IAM Connector Server. Once you map an association, you provide both the attribute and the object name in the endpoint. When you export a link, the connector then knows which resource is linked to the account. All three values are now available for CA GovernanceMinder to export.
Once mapped, the CA GovernanceMinder resource refers to both the mapped object in (AD group) and the attribute (groupMembership). If an account can be connected to the same object by different attributes, the account must be defined as multiple resources in CA GovernanceMinder. Each resource then represents an object linked by a specific attribute. These multiple resource definitions allow the export to identify which attribute the user referred to when connecting a resource to the account.
This issue affects roles too. An endpoint object can be mapped to a role in CA GovernanceMinder, but it is still connected to the account using an attribute. Also, a resource is connected to both the account and the role, but it could be connected to each through different attributes.
Note: A resource with no association is not understood between the two systems.
Example
For example, Unix has an account connected to Unix groups using either the "primary group" attribute or the "group membership" attribute. If there is only one resource in CA GovernanceMinder named "Unix group" when it is mapped to an account, CA GovernanceMinder does not know whether to use the primary group or the group membership attribute when exporting to the CA IAM Connector Server. Therefore, you map two associations, each to a different resource. For example, if the Unix endpoint has group "A", then you map two resources, one representing "A", "primary group" and the other representing "A", "group membership". Then CA GovernanceMinder reads the associations and understands which attribute was referred to when it exports the data.
Working with Associations
After defining how endpoint objects are linked, you map them to CA GovernanceMinder objects by giving names to the CA GovernanceMinder roles and resources. Initially, an object on the endpoint is marked as a resource and CA GovernanceMinder offers to name the resource using the name of the object. After an object is mapped to a resource, if that object is used in other associations, the existing resource or role definition must be used. However, if you have more than one association between two exact objects linked by different attributes, you cannot use the same resource or role definition for both associations, and the endpoint object must be mapped to a new resource or role in CA GovernanceMinder.
Because each resource is mapped to an object on the endpoint, attributes can be mapped from the endpoint object to the resource. For example, a resource representing an AD group can have an attribute containing the group description. This option is not currently applicable to roles, as they cannot have custom attributes in CA GovernanceMinder.
Associations that do not start from an account are only possible in a deep use case. A deep use case is only available with the CA IAM Connector Server. If a deep use case is used, the mapping must have an account connected to a role and a role connected to a resource. The association between the account and the resource directly should also be defined, though not enforced.
Custom Association Attributes (Link Attributes)
An association itself can have attributes in the form of link attributes. Link attributes define that the link between two objects has a risk, so there is a risk attribute with a value. For example, you have an association between an SAP account and a role. A role is an object that can be mapped to a resource. Different accounts can have the same role. However, each account is linked to the role for a restricted time period. The association itself has attributes that contain the start and end dates for the restricted time period.
Copyright © 2014 CA.
All rights reserved.
|
|