US English (US)
FR French
DE German
PL Polish
SE Swedish
FI Finnish

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

English (US)
US English (US)
FR French
DE German
PL Polish
SE Swedish
FI Finnish
  • Log in
  • Home
  • Identity Governance and Administration (IGA)
  • IGA solution library
  • Instructions & guidelines
  • Configure authentication

Configure: Whistleblower Access configuration

Learn how to configure Whistleblower

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Service Management
    Matrix42 Professional Solution Matrix42 Core Solution Enterprise Service Management Matrix42 Intelligence
  • Identity Governance and Administration (IGA)
    IGA overview IGA solution library
  • Platform
    ESM ESS2 ESS Efecte Chat for Service Management Integrations Add-ons
  • Release Notes for M42 Professional, IGA, Conversational AI
    2026.1 2025.3 2025.2 2025.1 2024.2 2024.1 2023.4 2023.3 2023.2 2023.1 2022.4 2022.3 Release Information and Policies
  • Other Material
    Terms & Documentation Guidelines Accessibility Statements
  • Services
+ More
    • Service Management

    • Identity Governance and Administration (IGA)

    • Platform

    • Release Notes for M42 Professional, IGA, Conversational AI

    • Other Material

    • Services

Configure: Whistleblower Access configuration

Learn how to configure Whistleblower

 This article describes how to configure Whistleblower. More info about Whistleblower solution can be found from here. 

 

0. Whistleblower Prerequisites

  • ESA is in use and configured

     
  • Needs work from Cloud OPS. Cloud OPS need to know the correct tenant name before they can do their part (is something like whistleblower.customer.com)
    • CloudOps engineer runs automatic scripts to enable ESA authentication components to the customer environment.
    • CloudOps configures the ESA to one (1) ESS-site.  
    • The Cloud Operations team sends a notification to the consultant, that the cloud setup is done and ready to be used

       
  • Consult needs access to customer's server

     
  • Before work can begin, customers must update their DNS based on Efecte Clouds given information
 
 

1. ESA configuration Step-by-Step

  1. Go to ESA Administration console eg. https://customer.efectecloud.com/auth/admin

     
  2. Access Whistleblower Realm from top left corner 



     
  3. Newly created 'whistleblower' configuration will have Shibboleth client configured. Make sure, that mapper "com:efecte:ess:user" is defined there with type SAML Efecte ESS user mapper - Whistleblower realm:



     
  4. Disable ESM Access from WB users. You will have to set this as DISABLE from ESA shibboleth mappers to disable access to ESM.

   

 

  1. ESA Checkpoint: Copy URL from Client without /shibboleth and try to access to the ESS portal. Login screen should be now working, but portal is still empty. 


Efecte Whistleblower Login window
ESA URL copying
Example: here Baseline is the normal realm and Whistle the new Whistleblower realm
 

Check whistleblower javascript user mapper

Check whistleblower javascript user mapper (*ess-whistleblower-user-mapper-saml.js) and modify distinguishedname if needed to correct dn format, for example this works:
"distinguishedName": "CN=" + user.username + ",OU=users,DC=whistleblower",
See this guidance for changing mappers and taking changes into use: https://docs.efecte.com/internal-configuration-instructions/1812412-esa-custom-javascript-mappers
 
 

2. ESS configuration Step-by-Step 

Info

There is no additional Whistleblower tenant created in ESS. Actually ESS handles Whistleblower as a regular tenant. In order to configure service offerings for whistleblower it's just a matter of logging-in as a normal ESS admin to regular tenant.

 

 

  1. Go to ESS Admin site eg. https://customer.efectecloud.com/scc/admin

     
  2. Select Sites tab and create new site. Add Organization Units value DC=whistleblower . It's special value which will be user for distinguishing users logging-in with ESA. 

Import Whistleblower solution offer Report Misconduct to ESS report_misconduct_ess_services.yaml

Services from file selection

 

Publish Report misconduct offering to the single Whistleblower site


 

Copy Whistleblower connector to customer environment integration hub container connector-efecteWBR.xml

Create support channel from Support channels tab and update the status mappings



 

Assign the support channel to the Whistleblower service offering Report misconduct

If Services are not visible for a Whistleblower user, make sure that those are not protected with any Roles


 

ESS Checkpoint: Log into ESS using the anonymous login. User can see only Report misconduct service, nothing else. 

ESS Whistleblower site
 
 

3. ESM configuration Step-by-Step 

  1. Go to ESM as an root-level user eg. https://customer.efectecloud.com/itsm

     
  2. Open the Efecte Administration area (a cogwheel symbol)

     
  3. Select Templates tab and Organization

     
  4. Choose Import option from the Template dropdown 


     
  5. Import Whistleblower templates (Whistleblower and Whistleblower
    bundle):  whistleblower_templateset.xml
    • Check template references
    • Check language support (if other than english)

       
  6. Create a folder called “Whistleblower reports” (code: whistleblower_reports) under the Organization-module
    • Check that allowed templates are Whistleblower report and Whistleblower report bundle.
    • Check that only Whistleblower reviewers have access to this folder


       
  7. Create subfolder under Personnel -folder in Organization -module called Anonymous persons (code: anonymous_persons)
    • Check that the Person -template is selected as allowed templates to the folder.
    • Check that only Whistleblower reviewers have access to this folder


       
  8. Create role Whistleblower Reviewer
    • Assign 3 Users
    • Assign 3 licenses


       
  9. Import workflow Whistleblower_report_workflow.xml
    • Set alert recipients to workflow based on customer feedback
    • Configure 6 Set value nodes, that are setting "Assigned to” persons based on the Type of misconduct set in ESS.
    • Save and Publish workflow


       
  10. Import listeners wb_person_listener  and wbr_bundle_listener.xml


     
  11. In the platform settings add property: anonymise.whistleblower_report. To values, add at least following codes: RequestedFor, misconduct_date, misconduct_description, misconduct_location, AdditionalInformation, misconduct_contact support_person, RequestAttachments, external_comments, internal_comments, resolution, misconduct_review_comments, OrderedBy.


     
  12. Remove selection from the checkbox “Record changes of data cards” of the Whistleblower report template. And Select the option “Log data card views” for the Whistleblower report template.



     
  13. Create three reports for the Whistleblower Reviewer -role.

    1. First created report is to follow created issues:
      - Name: New Whistleblower reports
      - Settings: Visible “Whistleblower report” data cards
      - Conditions: Status is “01 - New”

       
    2. Second report shall have following settings
      - Name: Whistleblower reports by Status
      - Settings: Visible "Whistleblower report" data cards
      - Graphical Bar chart, group by “Status”


       
    3. Third report shall have following settings
      - Name: Whistleblower reports by Type
      - Settings: All "Whistleblower report" data cards
      - Graphical Pie chart, group by “Type of misconduct”


       
  14. Create a dashboard where three above listed reports are placed.



     
  15. ESM Checkpoint: Log in as Misconduct issue handlers and check that the user will see only misconduct issues. Also other ESM users have no access to see misconduct issues. Root user sees all data cards that are recorded to a single ESM
 
 

4. Mandatory Implementation test run

Implementation test run shall cover following steps

  • Logging in works using the anonymous login
  • Create Whistleblower report
  • Check that alert functionalities in the ESM workflow works
  • Send comment to misconduct issue reporter
  • Response to comment in the ESS as anonymous user
  • Close the issue in ESM and set resolution
  • Log in to ESS and checks that resolution is visible for misconduct issue reporter
  • Try to log in ESM using the anonymous login, cannot access
  • Check that nothing else is not shown in the ESS as anonymous user than Whistleblower report
 
 

Additional: Inactive users removal

Whistleblower functionality has a built-in capabilities of removing inactive users. It calculates the number of days from each User's last login time, and if it exceeds threshold value - the User is removed.

By default, that process runs a check every 8 hours, and checks for a period of maximum inactive days = 90.

If there is a need to override these settings, it's possible to do so, in ESA's /opt/keycloak/conf/keycloak.conf configuration file.
 

What needs to be added, is under <subsystem xmlns="urn:jboss:domain:keycloak-server:1.1"> following section:

# How long should the inactive whistleblower users be kept in Keycloak database before being removed from it
max-inactive-users-keep-days=90
 
# How often should the inactive user cleanup process start (in seconds, default = 8h)
inactive-users-cleanup-interval=28800

 

Don't forget to restart the ESA container afterwards!

 
 

Additional: Cookies Policy agreement

When 'whistleblower' page is first shown - it prompts user for his/her agreement on Efecte Cookie policy. User can agree or decline.


 

It is possible to edit the message which is presented to the User, from ESA admin view, like on the following screenshots (make sure, proper realm is first selected from ESA selector):

 

 

 
 

 

configuration whistleblower configure rights report abuse set up

Was this article helpful?

Yes
No
Give feedback about this article

Table of Contents

Related Articles

  • Configure: ESA - Guest Access configuration

Copyright 2026 – Matrix42 Professional.

Matrix42 homepage


Knowledge Base Software powered by Helpjuice

0
0
Expand