2.15 Violation Details

Use the Violation Details page to view the details of the pending violations that are assigned to you and take action on them.

Details Tab

Use the Details tab of the Violation details page to view policy violation details, and view the causes of violations and take action on them.

Section Element Description
  Complete Click after taking action on all or some of the access details. Based on the actions taken and the conditions of the rules, the policy violation will either be closed (if there are no more violations) or re-opened (if some of the actions were left open or the risk accepted date has passed and the user still has the access) during subsequent identity audit scans.
Violation Details   Displays the details of the policy violation, such as the policy attributes, status, detection count, and the details of the user for which the violation is generated.
Access Details   Displays the cause of the violation, the rules within the policy that have been violated, the status and attributes of the violation, and comments, if any. In addition, the Attributes column displays details of the cause of the violation. You can place your mouse pointer on the information icon in the Rules Violated column to display a popup with details of the violated rule, such as rule name, description, and rule condition.
  Actions Select any one of the following options from the Actions menu:
  • Close as Fixed: Select to indicate that the cause has been fixed manually, either because it has been taken care of outside the system or the remediator has manually taken action to ensure that this access no longer exists for the user. The Provide Comments dialog box is displayed. Enter a comment, and click Submit.

  • Close as Risk Accepted: Select to indicate that the access is required by the user for a particular time period, and the user can have the access until that date. The Provide Comments dialog box is displayed. In the Expiration Date field, specify a date after which the violation will be re-opened if it still exists. In the Comments field, enter a comment, and click Submit.

  • Request for Remediation: Select to indicate that you want to revoke the access of the user because it is not required by the user, in order to mitigate the violation. The Provide Comments dialog box is displayed. Enter a comment, and click Submit.

  Remediate Click to indicate that you want to revoke the access of the user because it is not required by the user, in order to mitigate the violation. The Provide Comments dialog box is displayed. Enter a comment, and click Submit.
  Close Click and select any one of the following options:
  • Close as Fixed: Select to indicate that the cause has been fixed manually, either because it has been taken care of outside the system or the remediator has manually taken action to ensure that this access no longer exists for the user. The Provide Comments dialog box is displayed. Enter a comment, and click Submit.

  • Close as Risk Accepted: Select to indicate that the access is required by the user for a particular time period, and the user can have the access until that date. The Provide Comments dialog box is displayed. In the Expiration Date field, specify a date after which the violation will be re-opened if it still exists. In the Comments field, enter a comment, and click Submit.

Action History Tab

Use the Action History tab of the Violation details page to view all actions on the open policy till the current date.

Related Topics

Completing Policy Violations in Oracle Fusion Middleware Performing Self Service Tasks with Oracle Identity Governance