You are on page 1of 2

4/9/21 18:08 Introduction to Access Optimizer - IBM Documentation

IBM Security Identity Governance and Intelligence / Change version


5.2.0 /

IBM Security Identity Governance and Intelligence, Version 5.2

Introduction to Access Optimizer


Access Optimizer (AO) is a powerful and comprehensive tool
for risk analysis and role
mining in medium and big size companies.

IBM® Security Identity Governance and Intelligence Access Optimizer (AO) is


a powerful
and comprehensive tool for risk analysis and role mining
in medium and big size
companies.

Access Optimizer is
fully integrated with IBM Security Identity Governance and
Intelligence role
management facilities, to support continuous role development and
optimization as business processes evolve. New roles can be automatically
passed to a
role management workflow where the role is approved and
deployed to production.

The main advantages of the Access Optimizer engine


are:

– Innovative pre-mining analysis finalized to generate intuitive


business roles.
– Cost driven role mining with a rich set of parameters to tune
the role mining process,
minimizing the administrative cost of generated
roles.
– Interactive graphical optimization to visually optimize roles
with useful information to
facilitate coverage analysis of user-privilege
relations to identify potential side effects
of analysis changes.
– Role lifecycle support integrated with role management for role
deployment to
production.
– Comprehensive management of risk analysis focused on identifying
a certain type of
risk for the company to find the right solutions.

– Architecture and components

This section describes the main blocks of the AA architecture


and specifies the essential
peculiarities of each component module.
– The Access approach

Granting access to resources in a medium or big company


always creates vulnerability,
resulting in a bigger probability of
several types of risk.
– Role mining guidelines

This section provides some important role mining modeling


concepts; especially with
respect to some powerful configuration issues
that can drastically modify the meaning of
th lt t d d b th il bl l
https://www.ibm.com/docs/en/sig-and-i/5.2.0?topic=administrators-access-optimizer i i l ith 1/2
4/9/21 18:08 Introduction to Access Optimizer - IBM Documentation
the result set produced
by the available role mining algorithms.
– Maps

The visual map of roles and risks is described.


– Access analytics: Guide to modeling

Access analytics is a role engineering tool combining the


concept of risk analysis with the
role mining process.
– Manage

– Configure

– Monitor

– Tools

– Settings

Parent topic:
Administrators

https://www.ibm.com/docs/en/sig-and-i/5.2.0?topic=administrators-access-optimizer 2/2

You might also like