• Monitor one or more systems of record (SoR).
  • Generate requests to grant, revoke access.

Request portal:

  • Users can request for themselves or others.
  • Access control model limits visibility, requestability.


  • Initiated by the system (event, schedule).
  • Stake-holders review identities, entitlements.
  • Generates deprovisioning requests.


  • Invite authorizers, implementers, certifiers to act.
  • Built-in reminders, escalation, delegation and more.
  • Selects participants via policy, not flow-charts.

Policies, controls:

  • RBAC.
  • SoD.
  • Risk scores.
  • Approvals.
  • Entitlement analytics.


  • 110+ bidirectional connectors, included.
  • Incident management, SIEM, e-mail interfaces.
  • Manage building access, physical assets.