- Components and Policy Tables to Customize IAM Processes
Deploy rich, standardized process automation quickly. Customize processes only where needed.
- Auto-discovery of Identities and Entitlements
Build an inventory of accounts and groups across all integrated systems and applications.
- Relationship-based Access Controls
Control visibility, requestability and authorizer routing through defined relationships.
- Privacy Protection
Safely manage sensitive or personally identifying data, such as termination dates or SSNs.
- Implementers Workflow
Automate request/approval processes and policy enforcement even for applications too small to merit integration.
- Intercept 'Access Denied' Dialogs
Intercept 'access denied' errors and help users navigate to the appropriate request page.
- Compare User Entitlements
Help requesters select entitlements by comparing model user with recipient rights.
- Automated and Self-service ID Mapping
Map login IDs to their owners through data mapping and self-service enrollment.
- Robust Workflow for Human Stake-holders
Get timely responses from unreliable humans with BYOD access, N of M approval, reminders, timed escalation and more.
- Role Mining and Entitlement Analytics
Analyze assigned entitlements to find problems and help define roles.
- Reports, Dashboards and Analytics
Built-in analytics for identities, entitlements and trends, that can automatically remediate problems.