4. Application
Form
Search for
permissions
and accounts
Add to the
request
Validate
request
Provisioning
and details
Monitoring
request and
notifications
Operational
accounts and
permissions
EASY! A simple 7 step process…
Requesting IT access rights for a normal user ?
5. But reality is oftendifferent …
Validate
request
Application
form
Search for
permissions
and accounts
Add to the
request
Provisioning and
details
Monitoring
request and
notifications
Operational
accounts and
permissions
6. Validate
request
Application
form
Search for
permissions
and accounts
Add to the
request
Provisioning and
details
Monitoring
request and
notifications
Operational
accounts and
permissions
By profiles and
by users
Security Validation /
Authorization catalog
exposure
Adding partial
roles
Requests
by user
copy
Manager
validation
Compliance
validation
Provisioning
Return code from
target applications
User email
Initial password
change
Connection
validation
Automatic
additions by HR
Profile
Person in
charge
validation
Each step requires coordination
of unclear sub processes involving multiple actors ...
7. At Inventy,
we OPTIMIZE and SECURE the user lifecycle
Validate
request
Application
form
Search for
permissions
and accounts
Add to the
request
Provisioning and
details
Monitoring
request and
notifications
Operational
accounts and
permissions
By profiles and
by users
Security Validation /
Authorization catalog
exposure
Adding partial
roles
Requests
by user
copy
Manager
validation
Compliance
validation
Provisioning
Return code from
target applications
User email
Initial password
change
Connection
validation
Automatic
additions by HR
Profile
Person in
charge
validation
Optimization
Zone
8. S
S
S
S
C
C
S
S
S
S
S
C
C
S
with SAP Identity & Access Governance,
each step is modeled and automated in IDM & GRC …
S
C
Simple automated action
.
Complex action natively integrated
Validate
request
Application
form
Search for
permissions
and accounts
Add to the
request
Provisioning and
details
Monitoring
request and
notifications
Operational
accounts and
permissions
By profiles and
by users
Security Validation /
Authorization catalog
exposure
Adding partial
roles
Requests
by user
copy
Manager
validation
Compliance
validation
Provisioning
Return code from
target applications
User email
Initial password
change
Connection
validation
Automatic
additions by HR
Profile
Person in
charge
validation
9. …integrated data flows accelerate AUDITS
and reduce maintenance costs
Integrated data flow
.
I
I
I
I
I
I
I
I
I
Validate
request
Application
form
Search for
permissions
and accounts
Add to the
request
Provisioning and
details
Monitoring
request and
notifications
Operational
accounts and
permissions
By profiles and
by users
Security Validation /
Authorization catalog
exposure
Adding partial
roles
Requests
by user
copy
Manager
validation
Compliance
validation
Provisioning
Return code from
target applications
User email
Initial password
change
Connection
validation
Automatic
additions by HR
Profile
Person in
charge
validation
I
I
I
10. Add to the
request
Provisioning and
details
Operational
accounts and
permissions
By profiles and
by users
Return code from
target applications
Initial password
change
Connection
validation
Person in
charge
validation
Our commitment ?
A simple user experience
A COMPLIANT process with a low cost
Application
form
Search for
permissions
and accounts
Validate
request
Monitoring
request and
notifications
Adding partial
roles
Requests
by user
copy
Automatic
additions by HR
Profile
Manager
validation Provisioning
Security Validation /
Authorization catalog
exposure
Compliance
validation
User email
11. April 2015
Inventy
François Michel – francois.michel@inventy.ca - 514-804-2333
Odette Scully – odette.scully@inventy.ca – 514-972-7245
www.inventy.com
Contact us to learn more
We would love to hear
more from you!