Introduction to ObserveID

In ObserveID, with identity intelligence, automation, and governance at hand, you can automatically provision access to resources, manage entitlements, collect and analyze user behavior in real-time, and derive intelligence to mitigate risks of access control nature across all systems in the corporate infrastructure, whether it is on-premises, hybrid, or multi-cloud.

This user document is intended for employees of the organization and for the IT operations department that oversees access control and identity management. It might also be helpful for DevOps professionals and other specialists in infrastructure resource management, monitoring, and utilization.

In this document, you will find the following information:

In this document

Refer to

  • How to manage your data:
    • Login and MFA,
    • Dashboard,
    • My Access

Getting Started

  • Description of available workflows

Manage Workflows

  • How to run a workflow to:
    • request access;
    • create accounts;
    • add \ remove entitlements to\from existing accounts;
    • unlock \ lock the privilege access;
    • change the password;
    • delete accounts

Manage Accounts

  • Provision initial access to new identities

Onboard Identities

  • Description of provisioning access with roles:
    • Birthright Roles,
    • IT Roles

Control access with Roles

  • Description of Identity Data
    • properties,
    • accounts,
    • assigned access,
    • detected access,
    • history records

Understand Identity

  • Management of integration data and access detection data

Analyze Integration Data

  • Description of Workgroups

Manage Workgroups

  • How to run a workflow to:
    • create a role,
    • update a role,
    • delete a role

Manage Roles

  • Description of Integration Data

Manage Integrations

  • Description of administrative tasks

Run Tasks

  • Description of the lifecycle of an identity:
    • onboarding,
    • offboarding,
    • reinstatement,
    • HR Source check,
    • identity update

Administer Identities

  • How to block unneeded access to target systems and get reports on what access attempts have been blocked

Block Access

Assumptions and Limitations

This document describes the system under the assumption that all integrations have already been established. This includes successful connections to each integration, completion of the initial data import, and the initial loading of identities. Additionally, the system must be appropriately configured and ready for use. If these steps have not been completed, please refer to the Administrator Guide and Connector Guide for instructions on setting up the system and its integrations.