Skip to content

General Menu

To get to the general menu, go to Settings > General.

General settings affect the entire system.

Path Display

An administrator can define the mapping of application paths throughout the business user interface.

To define the mapping of application paths, perform the following steps:

  1. Define the path in the administrative client.

  2. Check the Translate physical path to logical drive mapping wherever applicable checkbox if applicable.

  3. To exclude administrators, check the Exclude Administrators checkbox.

    Note

    If there is a preference to see the physical name of the administrator, rather than the logical name, the Exclude Administrators checkbox should be checked.

  4. To display the physical path, check the Allow physical path to be viewed checkbox.

    Note

    If the preference is to see only the logical path (to avoid confusion caused by the display of multiple names) this checkbox should remain unchecked.

  5. Select Save to save the selection, or Discard to discard it.

  6. After making and saving changes, delete the cache.

Overexposed Resources

Overexposed resources are resources accessed by groups with “too many” members. The system determines large groups based on basic parameters, and administrators can change those parameters. Everyone and Authenticated Users groups are included by default, but it is possible to further filter (define) overexposed resources by group.

To define overexposed resources, perform the following steps:

Go to Settings > General > Overexposed Resources

  1. Check the Groups containing at least ___% of user accounts checkbox to define groups by the percentage of user accounts. (This checkbox is checked by default.)

  2. Check the Groups containing at least ___ user accounts checkbox to define groups by the number of user accounts. (This checkbox is checked by default.)

  3. Check the Include Share permissions (on CIFS-based applications) checkbox to include those share permissions. (This checkbox is checked by default.)

  4. To exclude group accounts from the overexposed group, type the account name, or the first few characters of the account name, in the Exclude Group Account search box.

  5. Select Save to save the selection, or Discard to discard it.

  6. To remove a group from the list, select x next to the group name.

API Authentication

This screen enables administrators to view the API authentication.

The screen does not display the client secret, but it enables the users to copy the secret to the clipboard

To generate a new client secret, select Generate Secret.

Configuring the SMTP Account

File Access Manager SMTP Account is used for configuration of the connection to the organization email server to send notifications, reports, and reminders.

To configure the SMTP account:

  1. Open the SMTP Account configuration screen.

    Settings > General > SMTP Account

  2. Configure the account details.

    Server Host/IP

    The server host details

    Port

    For the SMTP service connection

    Username, Password

    Connection credentials

    From

    This is a unified From field from all Email responses.

    Timeout (MS)

    The timeout, in milliseconds

    SSL

    If SSL is required, check this box

    Recipient Email

    An email address to send the test email to, when selecting the test button.

    Note

    Use a non-SailPoint email address. Or, configure your own email during deployment.

  3. Select Send Test Email to test the configuration by sending a test email to your mailbox and verifying receipt.

  4. Select Save or Cancel to exit.