Request access
To use an account type, you must have access to it.
The account type must exist before you can request access.
Only access associated with entitlements of the ownership type Individual can be granted (request by users). An individual account must exist on the account type to obtain access. If no individual accounts exist on the account type and you request access, an individual account is automatically created. For example, you request access. Your preferred user ID is jdoe. You have no account on the account type or your account is a sponsored account. The system creates an individual account on the account type with the user ID jdoe1 for the requested access.
After you successfully requested access on the account type, you cannot request access for any other sponsored accounts. To obtain access for additional user IDs on sponsored accounts, request an individual account for the IDs first.
- On the IBM Security Identity Manager Home page, in My Access, click Request Access.
- From the Request Access page, you have two options to request access. Depending on how the system administrator customized the system, we might not have all these options available.
- A list of common access items is displayed for you to choose from. Click the name of the access you want to request.
- Click the Search link to search for an access.
- We can filter access items based upon the access types.
- Enter in the name or description of the access or leave the field blank to return all results, and click the Search button.
- From the Search results table, click the name of the access you want to request.
- Depending on how many user IDs with individual accounts you have on the account type:
- If you have no individual accounts on the account type, on the Request access user ID page:
- Accept the default user ID or enter a user ID for the access, if we are prompted for that information.
- If password editing is enabled for IBM Security Identity Manager, create a password for the access. If you specify a password, the password must conform to the password strength rules.
- Click Request Access to complete the request.
- If you have only one user ID, verify your access request on the Request Access Confirmation page.
- If password editing is enabled for IBM Security Identity Manager, create a password for the access. If you specify a password, the password must conform to the password strength rules.
- Enter a user ID for the access if we are prompted for that information.
- Click Request Access to complete the request.
- If you have more than one user ID, the Select User ID page is displayed.
- Click the user ID you want to use for this access.
- If password editing is enabled for IBM Security Identity Manager, create a password for the access. If you specify a password, the password must conform to the password strength rules.
- Click Request Access to complete the request.
- On the Request Submitted page, verify the request.
- To perform another task, click a link in the Related Tasks section.
We can
- View the status of the request.
- Request another access.
- Return to the IBM Security Identity Manager Home page to perform other operations.
Parent topic: Access