• Download a trial
  • Sales
  • Support
  • Login
logo
  • Home
  • Products
  • Solutions
  • Partners
  • About Us
  • Consulting
  • Resources
Request a Quote
  • Workforce Identity
  • Customer Identity
  • Comparison
  • Subscriptions

All Features

Overview of all features in Workforce Identity

User Onboarding and Offboarding

Automate joiner, mover, leaver processes

Access Request

Access requests with multi-step approvals

User Access Reviews

Save time with user access reviews

Self-Service Portal

Self-service portal for all end user activities

Segregation of Duties

Detect and remediate SoD violations

Password Management

Enforce password policies and enable synchronization

Single Sign-On (SSO)

Enable SSO using standards - SAML, oAuth, OIDC

Authentication and MFA

Improve security with adaptive authentication and MFA

3rd Party IdP Integration

Integrate with your existing identity provider

Integration API

Use the REST API to add identity into your applications

Connector Library

Integrate on-premise and SaaS applications

Modern Architecture

Microservice architecture that supports deployment using RPM, Kubernetes or OpenShift

Workforce Identity Concepts

All Features

Overview of all features in Customer IAM

Authentication and MFA

Improve security with adaptive authentication and MFA 

Single Sign-On (SSO)

Enable SSO using standards - SAML, oAuth, OIDC

Password Management

Enforce password policies and enable synchronization

Modern Architecture

Microservice architecture that supports deployment using RPM, Kubernetes or OpenShift

Customer Identity Concepts

Community vs Enterprise

Summary of the differences between the Community and Enterprise editions

Subscription Benefits

Overview of the benefits provided by an OpenIAM subscription

  • Integrations
  • Verticals
  • Workforce Use Cases
  • CIAM Use Cases
  • Compliance

Active Directory

Manage identity in Active Directory

Azure (O365)

Manage identity in Office365

SAP

Manage identity in SAP S/4 Hana

SAP SuccessFactors

Manage identity in SAP SuccessFactors

Workday

Manage identity in Workday

Education

Manage identity for students, staff and alumni

User Access Requests

Empower end users and improve compliance with user access requests

Strong Authentication

Improve security with adaptive authentication and MFA

Single Sign-On (SSO)

Improve customer experience with SSO

NIS2

Achieve compliance with the EU directive for cybersecurity frameworks.

DORA

Comply with the Digital Operational Resilience Act for the EU.

HIPAA

For healthcare organizations seeking HIPAA compliance.

  • Partners

Current Partners

Our Current Partners

  • About Us

About OpenIAM

Learn about OpenIAM

Press Releases

References to OpenIAM press releases

OpenIAM in the Media

References to OpenIAM in the media

Careers

Learn about open positions at OpenIAM.

  • Consulting

Proof of Value

Customized engagement to confirm defined proof of value objectives

Jump Start

Customized engagement to rapidly deliver a solution into production

Solution Implementation

Engagement with the objective to deliver a complete IAM solution based on customer requirements

  • Resources

Videos

Collection of videos describing how OpenIAM can be used to solve common use cases

Community Portal

Collaborative community portal to learn more about OpenIAM

CE Documentation

Documentation for the Community Edition

Blog

Musings on identity penned by the OpenIAM team

Webinar Calendar

Upcoming webinars and training sessions

Workforce Identity Concepts

Customer Identity Concepts

Manage Orphaned Accounts to Improve Security

December 20, 2023
Ameet Shah

Orphaned accounts are active accounts in applications, such as Active Directory, which do not have a corresponding account owner. Active accounts that don’t belong to a real user pose a potential security risk. These accounts may also result in unnecessary license fees. Virtually all of our customers have a need to be able to easily identify and manage orphaned accounts. In this post, we will explore how accounts can be orphaned and the tools available in OpenIAM to help you manage them.

How do accounts get orphaned?

There are several ways in which accounts get orphaned. These include:

  • An employee leaves and their accounts in the various applications are not decommissioned
  • Account in an application lacks sufficient information to allow us to link the account to a real user. Consider an account in Active Directory, where the record lacks an employee ID or similar attribute that would allow us to link the account to their corresponding record in the authoritative source.
  • Service accounts that have not been decommissioned or reassigned to a new user, when the original owner leaves the firm

While there are other cases, orphaned accounts are largely able to thrive in the absence of a comprehensive identity solution.

How can orphaned accounts be identified?

In OpenIAM connectors are used to integrate with applications. These connectors are used for provisioning, synchronization and reconciliation. Depending on your requirements, you can configure a synchronization or reconciliation task to run at regular intervals. If you are using synchronization, then you can enable the “Detect orphans” checkbox as shown below.

When a synchronization task is executed, data from the target application will be compared to the data in OpenIAM using the matching attributes shown in the configuration below. When a match fails, we can either:

  • Create a new user in OpenIAM
  • Log it as an orphan

If the “Detect orphan” checkbox is on, then an orphaned record will be created in OpenIAM.

DetectOrph

In cases where a connector does not exist, then we can do the same using a feed from a CSV file.

There is one more case where an orphan will be created. In the user manager, we can see all the accounts linked to a user’s profile. It possible to unlink an account from a user. In this case, the unlinked account will also appear as an orphan.

EditIdentity

Managing orphaned accounts

In the user manager, there is a a menu option for “Orphan Management”. This interface can be used to view and manage orphans.

OrphManage

At some of our customers, they have a major cleanup effort ahead of them and they prefer to get a report which can be used to perform the cleanup. The report can be obtained using the blue download report button. For customers that are performing a manual cleaning of the target application, we can simply re-synch from the application. If an identity has been corrected and is no longer an orphan, it will automatically drop off from the orphan list.

In most cases, however, customers can use the interface shown above to perform one of the following operations on orphaned accounts:

  • Link the orphaned account to a valid user
  • Remove the orphan from OpenIAM
  • Remove the orphan from the target application
Orphan management is designed to address a specific, but common, use case. Your feedback and questions are welcome.
Share

Leave a Comment

footer-top-logo
openIAM-white-logo

All modules of our IAM platform share a common infrastructure allowing customers to see one unified identity solution versus a collection of disparate products.

  • linkedin-icon
  • facebook-icon
  • twitter-icon
  • youtube-icon

sales@openiam.com

(858)935-7561

Copyright © 2025 OpenIAM. All rights reserved.
  • Privacy Policy