Introduction to ObserveID
In ObserveID, with identity intelligence, automation, and governance at hand, you can automatically provision access to resources, manage entitlements, collect and analyze user behavior in real-time, and derive intelligence to mitigate risks of access control nature across all systems in the corporate infrastructure, whether it is on-premises, hybrid, or multi-cloud.
This user document is intended for employees of the organization and for the IT operations department that oversees access control and identity management. It might also be helpful for DevOps professionals and other specialists in infrastructure resource management, monitoring, and utilization.
In this document, you will find the following information:
|
In this document |
Refer to |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
|
Block Access |
Assumptions and Limitations
This document describes the system under the assumption that all integrations have already been established. This includes successful connections to each integration, completion of the initial data import, and the initial loading of identities. Additionally, the system must be appropriately configured and ready for use. If these steps have not been completed, please refer to the Administrator Guide and Connector Guide for instructions on setting up the system and its integrations.
