Management of account defaults on a service

We can define default values for account attributes either on a service or on a service type. In previous versions of IBM Security Identity Manager, account defaults were specified with provisioning policy. Account defaults differ from a provisioning policy. Account defaults do not define the set of users who are allowed to have accounts or what attribute values are compliant. Defaults define the default values for a new account. The change of account default configuration does not affect the compliance status of user accounts. A service might be granted for a subset of users (for example, users who belong to specific organization roles). In this case, these global account defaults might be duplicated in multiple provisioning policies that are specific for each role. By using account defaults, you avoid duplicated configurations. The following list highlights the differences between the use of account defaults and provisioning policies:

Here is an example to illustrate the differences. In this example, to define default values and compliance around the "Local Groups" attribute of WinLocal accounts. In one case, Case A, we define the default value as a provisioning parameter. In the other case, Case B, we define the default value as an account default.

In both cases, its clear that Print Operators is an allowed value for the attribute. It is also true that in both cases the default value for the attribute is Guests. The difference is that defining the value of Guests as a provisioning parameter in Case A makes Guests an allowed value. An account with Local Groups = Guests is compliant. In Case B, an account with Local Groups = Guests is not compliant because account default values do not have any implications on compliance. Consider the following tips for using Account Defaults instead of Provisioning Policy:

Parent topic: Services administration