Access Requests and Self-Service
Gone are the days where an email to your Admin for access to a system is an acceptable way to keep track of access and requests. Today, we preach integrating with ITSM for Access Requests, and automating that process to run in tandem with your IGA system.
This allows for functionality like:
Self-Service Requests for Access: Users should be able to use the same ticketing software for helpdesk calls for Access Requests. We integrate our IGA solutions with existing Ticketing and Helpdesk Software to provide that and automate that fulfillment and approval process in the same breath.
Access Approval Flows: With an Access Request in the queue, rules based on the type of access requested kick in. A solid IGA system should be built to kick of Approval processes from necessary parties like managers and directors automatically once the request is in, or automatically grant access if a user meets predefined criteria.
Attestation and Access Reviews: It is important to periodically attest user access across your environment. This is how you prevent privilege creep, and thereby prevent costly mistakes from user access to resources irrelevant to an associate’s job function. This process can be delegated to user managers, team leads, and more based on your organization’s structure and can be set up and administered through an IGA system.
Threat Scoring and Artificial Intelligence: By assigning threat scores to different roles, attributes, and other privilege types, an IGA system can keep a record of a user identity and its threat potential to your organization. In addition to pre-configured actions for attesting accounts with high threat/ for removing access for those accounts once a threshold is reached, AI allows for the system to learn and suggest actions that the system should take to mitigate the threat based on past actions and data. A Modern IGA system thinks for itself and provides feedback to its administrator.