• Download a trial
  • Sales
  • Support
  • Login
logo
  • Home
  • Products
  • Solutions
  • Partners
  • About Us
  • Consulting
  • Resources
Request a Quote
  • Workforce Identity
  • Customer Identity
  • Comparison
  • Subscriptions

All Features

Overview of all features in Workforce Identity

User Onboarding and Offboarding

Automate joiner, mover, leaver processes

Access Request

Access requests with multi-step approvals

User Access Reviews

Save time with user access reviews

Self-Service Portal

Self-service portal for all end user activities

Segregation of Duties

Detect and remediate SoD violations

Password Management

Enforce password policies and enable synchronization

Single Sign-On (SSO)

Enable SSO using standards - SAML, oAuth, OIDC

Authentication and MFA

Improve security with adaptive authentication and MFA

3rd Party IdP Integration

Integrate with your existing identity provider

Integration API

Use the REST API to add identity into your applications

Connector Library

Integrate on-premise and SaaS applications

Modern Architecture

Microservice architecture that supports deployment using RPM, Kubernetes or OpenShift

Workforce Identity Concepts

All Features

Overview of all features in Customer IAM

Authentication and MFA

Improve security with adaptive authentication and MFA 

Single Sign-On (SSO)

Enable SSO using standards - SAML, oAuth, OIDC

Password Management

Enforce password policies and enable synchronization

Modern Architecture

Microservice architecture that supports deployment using RPM, Kubernetes or OpenShift

Customer Identity Concepts

Community vs Enterprise

Summary of the differences between the Community and Enterprise editions

Subscription Benefits

Overview of the benefits provided by an OpenIAM subscription

  • Integrations
  • Verticals
  • Workforce Use Cases
  • CIAM Use Cases
  • Compliance
  • Data Breach Mitigation

Active Directory

Azure (O365)

SAP

SAP SuccessFactors

Workday

AWS

Linux Server

LDAP

Microsoft SQL Server

Google Cloud

Windows Server

Oracle EBS

ServiceNow

SAP Fiori

Oracle Fusion

Entra ID

Salesforce

Keycloak

Custom Applications

Education

Manage identity for students, staff and alumni

Financial Services

Address the compliance and security challenges of the financial sector

User Access Requests

Empower end users and improve compliance with user access requests

Strong Authentication

Improve security with adaptive authentication and MFA

Single Sign-On (SSO)

Improve customer experience with SSO

NIS2

Achieve compliance with the EU directive for cybersecurity frameworks.

DORA

Comply with the Digital Operational Resilience Act for the EU.

HIPAA

For healthcare organizations seeking HIPAA compliance.

PCI DSS

Compliance with the Payment Card Industry Data Security Standard

SOC 2

Solutions for organizations subject to SOC 2 audits

GDPR

Take advantage of OpenIAM to comply with the General Data Protection Regulation

Social Engineering Attacks

  • Partners

Current Partners

Our Current Partners

  • About Us

About OpenIAM

Learn about OpenIAM

Press Releases

References to OpenIAM press releases

OpenIAM in the Media

References to OpenIAM in the media

Careers

Learn about open positions at OpenIAM.

  • Consulting

Proof of Value

Customized engagement to confirm defined proof of value objectives

Jump Start

Customized engagement to rapidly deliver a solution into production

Solution Implementation

Engagement with the objective to deliver a complete IAM solution based on customer requirements

  • Resources

Videos

Collection of videos describing how OpenIAM can be used to solve common use cases

Community Portal

Collaborative community portal to learn more about OpenIAM

CE Documentation

Documentation for the Community Edition

Blog

Musings on identity penned by the OpenIAM team

Webinar Calendar

Upcoming webinars and training sessions

Workforce Identity Concepts

Customer Identity Concepts

What is Birthright Access?

Understanding Birthright Access

Birthright access defines the minimum necessary access rights a person needs to perform their job — nothing more.

These rights are automatically assigned based on a user’s profile attributes, such as job title, department, location, or employment type.

Rather than granting every tool a new hire might ever use, birthright access establishes a baseline of essential permissions tied to the user’s role and organizational context.

As attributes change — for example, when someone moves from Finance to HR — OpenIAM automatically recalculates their access, granting new rights and removing old ones.

Birthright access enforces least privilege dynamically — ensuring users always have the access they need, and never more than they should.

Why Birthright Access Matters

Without governed birthright rules, access can quickly become inconsistent and excessive.

Employees accumulate entitlements over time, leading to privilege creep, audit complexity, and compliance risks.

Governed, automated birthright access ensures:

  • Least Privilege: Access aligns exactly with current job needs.
  • Dynamic Accuracy: Access is recalculated when roles or attributes change.
  • Efficient Onboarding: New users receive immediate, policy-approved access.
  • Simplified Auditing: Every entitlement has a defined policy origin.
  • Reduced Administrative Workload: No more manual or repetitive provisioning tasks.

Birthright access establishes the foundation for secure, efficient, and compliant identity governance.

How Birthright Access Works

Birthright access policies are built on attribute-based rules that map identity data (from HR or other authoritative systems) to entitlements across connected applications.

Policy Logic Example

If Department = Finance and Location = NY, assign:

  • AD Group → Finance_NY_Users
  • Application Role → Expense_Approver
  • Shared Folder → \\FinanceData\NYSecured

As soon as a user’s attributes change — for example, moving from Finance to HR — OpenIAM:

  1. Removes entitlements that no longer apply.
  2. Assigns new entitlements based on the new role.
  3. Records all changes for audit tracking.

Birthright access is not static. It’s a living policy continuously recalculated as people change roles, locations, or departments.

Birthright Access and the Identity Lifecycle

Birthright access underpins the Joiner–Mover–Leaver (JML) lifecycle:

Lifecycle Stage  Birthright Function 
Joiner 

Grants minimum, policy-defined access when a new user record is created in HR or an authoritative source.

Mover  Recalculates access automatically when job-related attributes (e.g., department, title, or region) change. 
Leaver  Removes all access when employment or engagement ends. 

Reconciliation validates that these access rights remain correct across systems, closing the loop on lifecycle accuracy.

Birthright access defines what users should have — reconciliation confirms that’s exactly what they do have.

Risks and Governance Controls

Even automated access policies require governance. Without clear rules, over-entitlement or conflicting permissions can still occur.

OpenIAM supports governance controls such as:

  • Segregation of Duties (SoD): Prevents conflicting access assignments.
  • Access Certification: Ensures baseline access remains appropriate over time.
  • Policy Reviews: Regularly validate and refine business rules.
  • Exception Handling: Allow justified deviations with documented approvals.

Effective governance transforms birthright automation from convenience into compliance assurance.

Automating Birthright Access with OpenIAM

OpenIAM automates the full lifecycle of birthright access using a policy-driven business rule engine built for flexibility and scalability.

How OpenIAM Implements It

  1. Integration with Authoritative Sources – Connects to HR or directory systems to retrieve user attributes.
  2. Low-Code / No-Code Policy Configuration – Administrators can define rules directly in the OpenIAM interface using prebuilt conditions and mappings — no development required.
  3. Optional Extensibility – For complex logic, policies can invoke Groovy scripts, custom workflows, or connectors to handle special cases or exceptions.
  4. Automated Provisioning – Creates and updates accounts through connectors or APIs.
  5. Dynamic Recalculation – Automatically adjusts access when attributes change (department, title, region).
  6. Continuous Validation – Reconciliation ensures target systems reflect the latest policy-driven entitlements.
  7. Audit Logging – Captures every change for full audit visibility.

OpenIAM’s low-code, policy-driven design makes automation accessible — yet powerful enough to handle even complex business scenarios.

Example: Department Transfer Scenario

  1. Current State: An employee in Finance has access to finance systems and shared drives.
  2. Mover Event: HR updates the record — the employee transfers to HR.
  3. Automatic Recalculation:
    • OpenIAM removes Finance entitlements.
    • Assigns HR-specific access.
    • Logs the entire change history for audit.
  4. Reconciliation Validation: Confirms the target systems now match OpenIAM’s policy assignments.

Result: Instant role alignment, zero manual tickets, complete traceability.

Using Birthright Access to Enforce Policy Integrity

Birthright access also acts as a policy enforcement boundary.

By defining which entitlements are allowed per role or department, organizations can prevent out-of-band changes that violate governance policies.

For example, if an admin directly modifies a group in AD or Entra ID, reconciliation detects the unauthorized change and applies the organization’s policy response:

  • Revert the modification to match OpenIAM.
  • Flag and report the deviation for audit.
  • Escalate via workflow for approval or remediation.

When birthright access rules serve as the system of record, they become an active guardrail that enforces governance consistency across all systems.

Benefits of Automated, Attribute-Driven Birthright Access

  • Least Privilege by Design: Only the minimum access needed is assigned.
  • Dynamic Adjustment: Access evolves automatically with role changes.
  • Reduced Risk: Eliminates stale or over-entitled permissions.
  • Simplified Governance: Centralizes control through low-code policies.
  • Compliance Ready: All changes logged, traceable, and auditable.
  • Improved Productivity: Onboarding and transitions require no manual IT work.

OpenIAM’s low-code automation ensures access remains both compliant and adaptive — keeping governance effortless and continuous.

← Back to Identity Lifecycle Management

Related Concepts

  • Joiner–Mover–Leaver Lifecycle
  • Reconciliation
  • Identity Governance (IGA)
  • Role-Based Access Control (RBAC)
  • Attribute-Based Access Control (ABAC)
  • Workforce Identity Concepts

Let’s Connect

Managing identity can be complex. Let OpenIAM simplify how you manage all of your identities from a converged modern platform hosted on-premises or in the cloud.

For 15 years, OpenIAM has been helping mid to large enterprises globally improve security and end user satisfaction while lowering operational costs.

Download a Trial Contact Sales
footer-top-logo
openIAM-white-logo

All modules of our IAM platform share a common infrastructure allowing customers to see one unified identity solution versus a collection of disparate products.

  • linkedin-icon
  • facebook-icon
  • twitter-icon
  • youtube-icon

sales@openiam.com

(858)935-7561

Copyright © 2025 OpenIAM. All rights reserved.
  • Privacy Policy