Reporting and Tracing Birthright Entitlement Assignments
Overview
Once birthright entitlements are configured in EmpowerID, administrators will often need to investigate and verify who has access to specific resources, how those assignments were made, and whether they are inherited or directly assigned. EmpowerID provides several tools and interfaces for tracing and reporting access assignments, whether you're looking at a resource, an actor (like a role), or a specific person.
This document guides students through the different tools available in EmpowerID for reporting and auditing entitlements, with practical examples for tracing access back to its origin.
Tracing Group Assignments from the Resource View
In the Classic Admin interface, begin by navigating to Identity Administration > Groups, and search for the group you want to inspect—e.g., Asset Management File Shares
. Open the group and go to the Advanced tab. Under RBAC, then RBAC Access to This Resource, select Resource Delegations to view which actors (such as Business Roles and Locations or Management Roles) have access to the group.
The Resource Delegations tab only displays direct assignments—it does not show inherited access. For example, if the group is directly assigned to the “Financial Advisor in Equities” business role, this will appear here. You may also see assignments to management roles, such as “Asset Management Basic Permissions.”
Viewing Resultant Access (Who Actually Has Access)
To see the individuals who are effective members of a group (including via inheritance), use the Resultant Access to This Resource link. This screen displays the final set of users who have access, based on all direct and inherited assignments.
Clicking View Assignment for a person will show how that access was granted. For example, a user may have received membership because their assigned role (e.g., “Fixed Income Analyst in Fixed Income”) is a child of a business role and location that was assigned the group. This lets you trace access all the way back to the root RBAC actor.
You can filter the results by access level (e.g., Member, All Access) or search for a specific person to determine whether and how they have access to the resource.