- Components and Policy Tables to Customize IAM Processes:
Deploy rich, standardized process automation quickly. Customize processes only where needed.
- Auto-discovery of Identities and Entitlements:
Build an inventory of accounts and groups across all integrated systems and applications.
- Relationship-based Access Controls:
Control visibility, requestability and authorizer routing through defined relationships.
- Privacy Protection:
Safely manage sensitive or personally identifying data, such as term. dates or SSNs.
- Implementers Workflow:
Automate request/approval processes and policy enforcement even for applications too small to merit integration.
- Intercept 'Access Denied' Dialogs:
Intercept 'access denied' errors and help users navigate to the appropriate request page.
- Compare User Entitlements:
Help requesters select entitlements by comparing model user with recipient rights.
- Automated and Self-service ID Mapping:
Map login IDs to their owners through data mapping and self-service enrollment.
- Robust Workflow for Human Stake-holders:
Get timely responses from unreliable humans with BYOD access, N of M approval, reminders, timed escalation and more.
- Role Mining and Entitlement Analytics:
Analyze assigned entitlements to find problems and help define roles.
- Reports, dashboards and analytics:
Built-in analytics for identities, entitlements and trends, that can automatically remediate problems.