About the IRC object model

The Publishable Object Schema of the publishing framework contains the xml information about the data (objects) in IRC that is publishable. Publishable means that this is the only data that is allowed to be published from IRC to a Publishing Target or vice versa. Refer to the xml content below for details.

This version of the publishing framework allows publishing the following IRC objects.

IRC object Description
Rule book

A rule book is a collection of rules. Rule books are an easy and efficient way of organizing and managing rules.

When the Publishing Framework Web Service is invoked, the rule book is exposed as collection of objects. The following attributes will be exposed for the Rule Book.

  • Rule Book ID (INT) * – Unique identifier for Rule Book in IRC
  • Rule Book Name (STRING)
  • Rule Book Description (STRING)
  • Business Process Owner (CSV) - The BPO is the functional owner of the rule book
  • Rule Book Owner (CSV) - Rule book owner
  • Supporting Documentation (CSV) - contextual links to allow the user to reference additional documentation
  • * - Key Attribute
  • CSV – If the attribute has multiple values then it will be returned in a comma separated format.
Rule

A rule contains the business conditions against which the security/process data for a given application is evaluated for violations.

When the publishing framework web service is invoked, the rule is exposed as collection of objects. The following attributes will be exposed for the Rule.

  • Category (STRING)
  • Rule Name (STRING)
  • Rule ID (INT)*
  • Creator (STRING)
  • Parent ID (INT)
  • Rule Description (STRING)
  • Rule Format (STRING)
  • Rule Control Number (STRING)
  • Rule Priority (STRING)
  • Rule Documentation (STRING)
  • Rule Control Objective (STRING)
  • Rule Owner (CSV)
  • Supporting Documentation (CSV)
  • * - Key Attribute
  • CSV – If the attribute has multiple values then it will be returned in a comma separated format.
Compensating Control

A compensating control is a list of instructions, procedures or agreements that support the existence of a rule violation. In certain situations, rule violations may be warranted, as long as the reasons for these are clearly documented. A compensating control can be used for the following:

  • Documenting reasons for the existence of the violation,
  • Documenting the steps taken by the company to mitigate the risks which the violation could induce.

You can build a library of such compensating controls. Each individual control can be associated with one or more rules.

When the publishing framework web service is invoked the compensating controls are exposed as collection of objects. The following attributes will be exposed for Compensating Controls.

  • Compensating Control Name (STRING)
  • Compensating Control ID * (INT)
  • Compensating Control Description (STRING)
  • Creator (STRING)
  • Last Updated By (STRING)
  • Control Text (STRING)
  • Contextual Links (STRING)
  • Valid From (DATE TIME)
  • Expiry Date (DATE TIME)
  • Status (STRING)
  • Assigned to Rules (CSV)
  • * - Key Attribute
  • CSV – If the attribute has multiple values then it will be returned in a comma separated format.
Application

IRC Adapters provide access into enterprise applications for analysis and maintenance of privileges. Adapters provide the link between IRC and specific applications. Their basic function is to extract and provide information from applications to IRC for analysis. Specific features may vary slightly from adapter to adapter.

Adapters are referred as Application in IRC.

When the publishing framework web service is invoked, the Application is exposed as collection of objects. The following attributes will be exposed for the Application.

  • Application Name (STRING)
  • Application ID (INT)*
  • Application Description (STRING)
  • * - Key Attribute
Analysis

After extracting ERP data, you can perform an analysis to analyze (test) the extracted data against your organizational rules defined in IRC.

When the publishing framework web service is invoked, the Analysis is exposed as collection of objects. The following attributes will be exposed for the Analysis.

  • Analysis Name (STRING)
  • Analysis ID (INT)*
  • Start Time (DATE TIME)
  • End Time (DATE TIME)
  • * - Key Attribute
Report

Reports enable you to view violations or exceptions flagged during analysis. Reports also provides other information such as details of ERP users, rules, roles or responsibilities and also allows you to take corrective action. Through reports you can drill down to details of a connection used. These attributes are available in the reports.

  • Report ID (INT)*
  • Report Name (STRING)
  • Report Description (STRING)
  • Report Category (STRING)