After Reconciliation, when a discrepancy is identified, one of the following actions are taken
- Grant entitlements to match the target system
- Revoke access from the target system
- Revoke access from target system after approval from business owner
- Initiate a certification process
- Notify business and IT owner
Closed Loop Authorization
Ensure that policies are enforced as digital identities are consumed across a variety of target systems. Replace inefficient manual workflows of cleanup excess privileges with the automation of reconciliation and remediation.
Try IDHub for FREE for 30 Days, no payment information necessary.
Try out our full working version of IDHub Cloud or Teams and explore right now!