Identity Cloud service instance management
This page presents a RACI matrix of the roles and responsibilities of different parties.
Legend
Key | Definition | Explanation |
---|---|---|
R | Responsible | Those who do the work to achieve the task. |
A | Accountable | The one ultimately answerable for the correct and thorough completion of the deliverable or task, and the one who delegates the work to those Responsible. |
C | Consulted | Those whose opinions are sought, typically subject matter experts; and with whom there is two-way communication. |
I | Informed | Those who are kept up-to-date on progress, often only on completion of the task or deliverable; and with whom there is just one-way communication. |
Responsibility assignment matrix
Function | Customer operations | Customer managed DNS (operations) | Customer managed PKI digital certificates (operations) | Customer transition team | Ubisecure Sales Engineering | Ubisecure Support | Ubisecure Operations | Ubisecure DevOps |
---|---|---|---|---|---|---|---|---|
Customer information
| R / C | R | A | I | I | C - Special requirements or questions | ||
Customer information
| R / C | R - Customer managed DNS | R | A | I | R - Ubisecure managed DNS | C - Special requirements or questions | |
Digital certificate management
| A - Customer managed DNS | R - Customer managed DNS | A / C | C | C | R - Ubisecure managed DNS I | C | |
Digital certificate deployment to the Identity Cloud service instance
| A | C | A | C | R | C | ||
Ubisecure provided information
| I | I | A | I | R | |||
Cost allocation codes
| I | I | A | I | R | |||
Authorized network source address changes implementation to the Identity Cloud service instance | I | I | I | R | ||||
Service instance provisioning
| I | I | A | I | R | C | ||
Control Desk and custom configuration database initialization
| I | I | (C) | I | R | C | ||
Custom configuration (in the custom CMDB)
| I (R) | R | C | C | C - Special requirements or questions | |||
Control Desk operation
Requesting Control Desk user management actions | R | R | C | C | ||||
Service instance logs access
| R | R | C | |||||
Application integrations | I (R) | R | C | C | C - Automation support | |||
Identity Cloud monitoring and alarms | I | I | I / R | A / R | C | |||
Customer application monitoring and alarms | A / R | C | I | I | I | |||
Maintenance window scheduling | R - Customer planned maintenance I | I | (I) | I | R - Ubisecure planned maintenance I |