{"id":536,"date":"2018-03-21T12:21:16","date_gmt":"2018-03-21T07:51:16","guid":{"rendered":"http:\/\/www.enhisecure.com\/isecureblog\/?p=536"},"modified":"2019-05-21T13:50:39","modified_gmt":"2019-05-21T09:20:39","slug":"exchange-mailbox-reassignment-identityiq","status":"publish","type":"post","link":"https:\/\/www.enhisecure.com\/isecureblog\/2018\/03\/21\/exchange-mailbox-reassignment-identityiq\/","title":{"rendered":"Reassignment of Employee mailbox to manager via Sailpoint&#8217;s Identity IQ"},"content":{"rendered":"<p>Email is the most powerful tool for enterprise level communication as it provides accountability and reliability in communication. To an organization, the emails that are received by the employees are a valuable resource. When an employee resigns or is terminated from the company, the organization might still need access to his\/her mailbox. This is especially significant in sales, support and administration activities as it can impact the organization either directly or indirectly. This scenario can be addressed by allowing an authority within the organization to access the de-provisioned mailbox and is an important challenge within identity and access management. The risks and compliance guidelines associated with this approach are also factors that need to be considered.<\/p>\n<p style=\"text-align: left\"><a href=\"https:\/\/www.sailpoint.com\/\">Sailpoint<\/a>\u2019s <a href=\"https:\/\/www.sailpoint.com\/identity-management-software-identityiq\/\">IdentityIQ<\/a>\u00a0is shipped with a connector for <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/identity\/ad-ds\/active-directory-domain-services\/\">Active Directory<\/a>. This connector supports management of users, groups and mailboxes on <a href=\"https:\/\/products.office.com\/en-in\/exchange\/microsoft-exchange-server-2016\/\">Exchange<\/a> server. However, for modifying the mailbox permissions, native rules need to be configured in order to execute the corresponding <a href=\"https:\/\/docs.microsoft.com\/en-us\/powershell\/\">PowerShell<\/a>\u00a0scripts.<\/p>\n<p style=\"text-align: left\">The following presentation introduces a scenario where handling mailbox permissions would be required. After an overview of native rules, the implementation of this use case is also discussed.<\/p>\n<p><iframe loading=\"lazy\" title=\"ENH iSecure: Reassignment of Employee mailbox to manager via Sailpoint&#039;s Identity IQ\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/SioPQUxrKh8?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p style=\"text-align: left\">The following demo focuses on granting Exchange mailbox permissions via IdentityIQ and verifying that the changes are reflected on the mail server.<\/p>\n<p><iframe loading=\"lazy\" title=\"ENH iSecure: Demo: Reassignment of Employee mailbox to manager via Sailpoint&#039;s Identity IQ\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/fkT0bxAHq5g?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Email is the most powerful tool for enterprise level communication as it provides accountability and reliability in communication. To an organization, the emails that are received by the employees are a valuable resource. When an employee resigns or is terminated from the company, the organization might still need access to his\/her mailbox. This is especially [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8,14,16],"tags":[79,10,29,11],"class_list":["post-536","post","type-post","status-publish","format-standard","hentry","category-identity-governance","category-sailpoint","category-technology","tag-best-practices","tag-identity-iq","tag-iiq","tag-sailpoint"],"_links":{"self":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/536","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/comments?post=536"}],"version-history":[{"count":10,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/536\/revisions"}],"predecessor-version":[{"id":588,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/536\/revisions\/588"}],"wp:attachment":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/media?parent=536"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/categories?post=536"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/tags?post=536"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}