Skip to main content

Slow Onboarding

Business Challenge

In any organization, the process to request systems and applications access for a new user involves multiple paper forms, which must be correctly filled in and approved by multiple authorizers. Once these forms are completed and approved, the requested changes must be fulfilled by multiple security adminstrators, each of whom is responsible for systems of a single type.

This kind of change management can be quite slow. It is not unusual for new employees to wait days or weeks before they can access all of the systems and applications needed to do their job.

Hitachi ID Identity Manager Solution
  • Identity Manager uses automation to eliminate change requests entirely wherever a suitable system of record is available.
  • Identity Manager uses self-service to move change requests on-line. Requests are validated, auto-completed and sent to the right authorizers automatically, making the process easy to use.
  • Security administrators can use Identity Manager to manage access across multiple systems. For new users, this means that one person can create login accounts on several systems at once, with no special platform-specific skills.

Using Identity Manager, organizations can reduce the time to activate a new user from days to hours -- limited only by the time it takes business users to approve the change request.

Read More:

  • Slow Onboarding:
    It can take too long to create login IDs for newly hired or reassigned users.
  • Costly Security Administration:
    Processes to manage users and entitlements are costly and time consuming.
  • Unreliable Deactivation:
    Access deactivation can be slow, unreliable or incomplete.
  • Policy Violations:
    Manual security administration leads to users whose access profiles violate corporate policies regarding appropriate access or segregation of duties.
  • Auditing User Entitlements:
    Auditing user entitlements that span multiple systems.
  • Ambiguous User Access Requests:
    Users understand files and folders, but not groups and ACLs. This makes change requests hard to interpret and both costly and time consuming to fulfill.
  • No History for Security Rights:
    When security entitlements are granted or revoked using native administration tools, there is no audit trail to show who made the change, when or for what reason.
page top page top