Lifecycle Management

Automate the User Lifecycle, across the staff turnover period
image

Foundation Features

  • Birth-right Provisioning

  • Role based Provisioning

  • Promotions and Transfers

  • Access Request - Role based

  • Access Request - Account based

  • Manager initiated access requests

  • Multi-Level Approval Workflows

  • Suspension and Restoration

  • De - Provisioning

Birth-Right Provisioning

All users joining an organization get access to certain systems and applications as part of default application access for everyone in the organization (such as an AD account to login to their OS and join the domain, an Email account, Office 365, etc.). Different organizations have different accesses to be provided to users based on the prevalent processes and organizational rules. Based on these rules, Compact Identity automatically grants access to new users.


image


image


Role Based Provisioning

Compact Identity creates accounts for new users across business applications based on thier attributes and roles. Administrators can create static or dynamic roles. Users can then get access to business applications based on their role memberships.

Promotions and Transfers

Compact Identity automatically adjusts user access across business applications based on promotions or transfers. The necessary accounts relevant to the new role of the user are automatically provisioned. Accounts that are no longer relevant to the user’s new role are automatically de-provisioned. Provisioning and de-provisioning is conducted in accordance with rules defined on the relevant accounts configured for the role.



image


Access Request - Account based

As part of the ongoing operations of an organization, users need access to different business systems and applications at different times.

Compact Identity allows users to request access to any onboarded app Based on the configuration defined while onboarding the app, these requests are sent to the relevant authority for approval. Upon approval the accounts are provisioned automatically.

Access Request can be initiated by using the launchpad or using the mobile app.

You can also the see the status of your request in the launchpad or on the mobile app.
Approvers can approve or deny access requests through the launchpad or on the mobile.

Role based Access Request

You may also need to obtain membership to certain roles that can provide you with access to additional apps

IDaaS Next allows you to request membership to roles. Based on the configuration defined while defining the role, these requests are sent to the relevant authority for approval. Upon approval, the users are given membership to the requested role and accesses linked to that role are automatically provisioned.

An access request can be initiated by the user through the launchpad or by using the mobile app.

You can also the see the status of requests through the mobile app or launchpad.
Approvers can approve or deny access requests in the same manner

Multi-Level Approval Workflow

Compact Identity allows administrators to configure workflows for access requests to applications or roles.

Admins can choose a role or user as the approving authority at each level of the workflow. Admins can also specify if everyone or only one person needs to approve the request.

These workflows can be configured for each application and role.

image
Manager initiated access requests

Compact Identity also allows managers to request for access to an app or role for users on their behalf. These requests also follow pre-configured workflows before access is granted.

Suspension and Restoration

Compact Identity automatically deletes or suspends users who are marked as “suspended” in the Active Directory or in CSV files. Based on a person’s status within Compact Identity, his or her accounts in various are deleted or suspended

When users are marked as “Restored” in the Active Directory, Compact Identity automatically reactivates all the accounts of those users and enables their access.

De - Provisioning

When someone leaves an organization, Compact Identity automatically revokes their access across all business applications which eliminates the need for it to be done manually. This feature supports statutory and regulatory compliances and ensures effective security.