Identity Management Proxy Users

Streamline access management, boost security, and embrace a new era of control with IAM Proxy Users. Automatically re-assign all tasks when managers are out of office so your operation never skips a beat.

proxy-users

IAM Proxy Users

Identity and Access Management systems often create complex and highly efficient workflows and processes that involve approvals or actions to be taken by specific individuals or groups.

As with any chain, a missing link will bring the entire process to a hard stop.  Creating Proxy connections provides an easy way to ensure that your processes continue without any hiccups.

What is an IDHub Proxy User?

Inside IDHub, a Proxy User is a real user account that has been selected as an alternate for a different single user.

In IDHub, typical users are assigned tasks, including approving, or fulfilling requests, taking some type of required action, or any other step which might be part of a custom workflow or part of their requirements inside of a user role.

In the event a user is temporarily, or permanently unavailable, a preassigned account will be granted proxy access to the original user's tasks.

Proxy accounts can act on behalf of the original user, and complete any assigned task to ensure everything runs smoothly.

proxies-my-profile

How is a Proxy User assigned?

IDHub out-of-the box does not default Proxy Users, however you can configure it that way. If a default Proxy has not been configured, you will need to choose one, and potentially change it to default at a later time.

Steps to assign a Proxy

Assigning a Proxy User in IDHub can be done from the User Profile, and is quite simple.

  • Click on “Add Proxy”
  • Select the Proxy date(s)
  • Select the user you'd like to assign as Proxy, or select your Manager
  • Accept and Assign

About IDHub Proxy Users

What rights do Proxy users have?

Proxy users' rights are not elevated from their standard user rights. There is not a specific Proxy Authentication process, Proxy User password, or even a temporary password for accessing the system.

Proxy User accounts will function exactly as they did when not assigned as a proxy.

We suggest if you are in a position where you're required to complete tasks requiring elevated access, users should choose either a manager, supervisor, or someone with matching access levels.

What can Proxy users do?

There are no specific Proxy user Permissions so they are limited to the ability to accomplish any task that would have otherwise been assigned to the original Destination User they are standing for.

They will utilize the regular client connections and basic login procedures to access their non-proxy accounts as normal.

There is not a specific proxy login process or proxy passwords, so users will be able to use their basic direct logins.

The most common scenarios for using a proxy would be for things like approving access for someone or carrying out a service request task which would have been required by the original user such as, updating a physical document, gathering physical equipment, modifying a user, or fulfilling a step in the provisioning process.

Learn more about Manager Level Access Control and how gives managers the flexibility they need.

What are common reason someone would use a Proxy?

One of the additional features of assigning a proxy is that you can change it at any time, and set it to only be active for a specific range of time.

Having the flexibility to choose who and when you would like someone to act as your proxy makes them the perfect solution for things like vacations, offsite meetings, or any other scheduling conflict.

In addition, when not designated for a specific event, they are perfect to have a built-in contingency plan in the event of a sudden departure from employment with the company for any reason.

Identity and Access Management

IAM Extras

https://media.sath.com/featured_access_control_policy_template_2_ecd665465b/featured_access_control_policy_template_2_ecd665465b.jpg

Access Control

Learn more about User Access Control and utilize our free Access Control Policy Template, to help establish a healthy framework for your organizations access control.

https://media.sath.com/Screenshot_from_2023_06_16_12_44_24_1aa1286c8f/Screenshot_from_2023_06_16_12_44_24_1aa1286c8f.png

Approval Workflows

Learn Approval Workflow Basics, see our most common workflow scenarios, and brush up on your workflow skills for your own business workflows.

https://media.sath.com/application_onboarding_be1f7159bb/application_onboarding_be1f7159bb.jpg

App Onboarding

Learn about Application Onboarding and grab a copy of our free Google form, 36 question, app onboarding questionnaire! See more blogs on our Blog Page.

Take the 1st step to improve security and cut your daily work.

try-idhub-banner01 (1).webp