Managing Requestable Permission Types

This feature allows an Administrator to determine which permission types will be available to users who request access to specific application types.

Note: The list of available permission types for managed resources cannot be modified. If you add requestable permission types for a resource type, it will take affect only for non-managed resources i.e. only resources that take the manual fulfillment path.

To manage requestable resources:

  1. In the administrative client, navigate to Access Requests > Configuration > Manage Requestable Permission Types.

    The Manage Requestable Permission Types window displays.

  2. Select an application.

  3. Click Edit.

    The Edit Requestable Permission Types window displays.

  4. Select permission types from the Available (left) pane, and use the arrows to place them in the Chosen (right) pane.

    Note: You can also move the default Chosen permission types to the Available pane so that they are not displayed to users.

  5. Click Save.

  6. Expand the resource tree.

  7. Select a resource.

  8. Click Add.

    The selected resource is displayed in the right pane.

    Note: The right pane displays a Path column, which displays the full path of the selected resource, an Include Sub-Resources column with a checkbox to include (or not) the sub-resources of the selected resource, and an Action column with an option to remove the resource.

    Note: There is an option to add a label to easily identify the right resource to request.

  9. Select a business resource from the Available (left) pane, and use the arrows to move them to the right pane, where you can decide whether to include their sub-resources or remove them.

  10. Click Save.

    Note: If you select New to create a new requestable resource, any saved applications will no longer be available in the Application selection, but will be available for editing.

  11. Click Edit to edit the resources within the displayed applications or Delete to delete the application’s requestable business resources. When an application is deleted, all its business resources will be available for a user making an access request.