Onboarding and Offboarding
As new workers join a company, all too often the initial days are spent waiting for laptops and gaining the required access that they need to fulfil their jobs. This results in a loss of productivity for the business.
Similar challenges exist when an employee moves from one department to another. In this case, not only does new access need to be granted in a timely manner to avoid further loss in productivity, but the current access needs to be reviewed and unnecessary access needs to be revoked.
The timeliness of access being revoked for employees leaving the firm is of even greater importance since leaving access open poses a security risk.
- Integration with one or more source systems to automate the joiner, mover, and leaver process
- Role-based provisioning and birthright access to ensure that access is enabled in a timely, accurate and consistent manner
- Business rules engine to determine birthright access
- Connectors to automatically create, update, and delete objects in the target application
- Orphan management
- Role-based user administration portal
- Integration with ticketing systems such as ServiceNow and Freshservice
Integrate with one or more source systems to automate provisioning. For example, employees may come from the HR system whereas contractors may be defined in another.
Define business roles where applicable to consistently grant access across applications.
Define business rules from an easy-to-use no-code interface to define birthright access which can be based on roles or direct entitlements. Business rules can automate actions such as the assigning and removal of access, the changing of user attributes, initiation of workflows and execution of scripts.
Leverage out-of-the-box connectors or create new ones to integrate with your applications to automate user provisioning and de-provisioning and enable user onboarding and offboarding.
Integration with ITSM applications
Integrate with systems like ServiceNow and Freshservice as part of the user onboarding and offboarding process. Automatically create requests in these systems to prepare laptops and access which cannot otherwise be automated. Similarly, create requests to remove access that cannot be automatically revoked when users leave.
Detect anomalies in target applications by configuring regularly scheduled reconciliation tasks which compare data in the end application against the source data maintained by OpenIAM.
Detect and remediate accounts in applications which do not belong to current users.
User administration portal
Role-based portal for the service desk and administrator to manage day-to-day user support requests.
Managing identity can be complex. Let OpenIAM simplify how you manage all of your identities from a converged modern platform hosted on-premises or in the cloud.
For 15 years, OpenIAM has been helping mid to large enterprises globally improve security and end user satisfaction while lowering operational costs.