Manage Access Guardrails in Oracle Access Governance
Manage and enforce security constraints or conditions in Oracle Access Governance using the Access Guardrails feature to ensure only authorized and compliant identities can gain access to specific permissions.
Navigate to Access Guardrails
Access Guardrails are defined from the Access Controls section of the Oracle Access Governance Console. Follow the steps to go to the Access Guardrails page.
Create an Access Guardrail
To create a new access guardrail, click the Create an access guardrail button. The Create a new access guardrail page is displayed.
Add Details
In the Add Details task, you can enter general settings about your access guardrail. You are also able to add user friendly tags that can be used in a search for this access guardrail.
Define Rules for Access Guardrails
In the Define rule task, define one or more conditions that an identity must pass in order to gain access.
Action on Failure of Access Guardrail Conditions
In this Action on Failure task, you need to define the action or operation that Oracle Access Governance must perform when an Access Guardrail violation is triggered. You can choose to block the access immediately or allow a grace period for a few days to meets the mandatory requirements mentioned in the conditions.
-
In the What should happen when the access guardrail
fails? field, choose one of the following depending on the
access-risk level.
Option Description High risk - Block the access immediately For new access requests, the request would not be raised and the violation is triggered with status - Blocked. For existing accesses (if chosen in the previous task), the access would be removed along with the Blocked status violation. Low Risk - Accept the risk for a number of days For new or existing accesses, if approved, the access would be granted or retained conditionally for a defined of number of days to complete the mandatory requirements. The violation is raised with the status - Snoozed. - For Low Risk - Accept the risk for a number of days option, enter the number of days (less than or equal to 90) for which you want to retain access.
- Select the Include the identity’s manager in notifications check box to include identity's manager in the notification on access guardrail violation.
- Click Next.
- (Optional)
You may select one of the additional actions:
- Cancel: To cancel the current process
- Back: To go back to the previous step.
Add Primary and Additional Owners
When setting up the first Orchestrated System for your service instance, you can assign owners only after you enable the identities from the Manage Identities section.
- Select an Oracle Access Governance active user as the primary owner in the Who is the primary owner? field.
- Select one or more additional owners in the Who else owns it? list. You can add up to 20 additional owners for the resource.
Review and Submit
In the Review and submit task, review the access guardrail details and create the access guardrail.
Test for Identity
You can verify the defined conditions against an identity while creating an access guardrail or post its creation through Actions menu.
Enforce Access Guardrails in Oracle Access Governance
After creating an access guardrail, you'll need to associate it with one or more access bundle for a system. Alternatively, you can associate an access guardrail with an identity collection, ensuring that only authorized and compliant identities, meeting predefined criteria, are members of an Identity Collection.
Search Access Guardrails and View Details
You can use our search capabilities to get specific and relevant results. You can use a basic keyword search for anything that you want to locate, scope your search using the suggested filters.
Actions icon and select View details.Edit an Access Guardrail
You can edit an access guardrail to include additional conditions, change enforcement criteria, change failure actions, or update general details. If you have selected enforcement criteria as New access requests and existing access, then the existing accesses will be reassessed based on the modified details.
View Access Guardrail Violations Report
Generate a report on access guardrail violations by selecting the View access guardrail report button. You can generate a report based on the date range, access guardrail name, violation status, or remediation status.
- By Date Range: Use From and To fields to select dates.
- By access guardrail name: View the report for a specific access guardrail.
- By Violation Status: Violations are either opened, with the request status still marked as blocked, or closed, where a previous violation has now been resolved.
-
By Violation Remediation: Violation resolution status can be:
- Cleared: A previous violation has now been resolved and closed.
- Blocked: A violation still exists and access request status is blocked.
- Snoozed: A violation that exists for low-risk access guardrails. The approver can accept the risk and approve the access for the defined number of days.
Delete an Access Guardrail
ou can delete an access guardrail and remove its association from an access bundle. Once deleted, the access guardrail check will no longer be enforced. Additionally, any open or blocked violations related to the access guardrail will also be removed.
- Go to the Access Guardrails page.
-
For a guardrail that you wish to delete, select the
Actions icon, and then select Delete.
- On the Confirmation pop up dialog, select Delete.
navigation menu icon, and select