After Reconciliation, when a discrepancy is identified, one of the following actions are taken
Grant entitlements to match the target system
Revoke access from the target system
Revoke access from target system after approval from business owner
Initiate a certification process
Notify business and IT owner
Closed Loop Authorization
Ensure that policies are enforced as digital identities are consumed across a variety of target systems. Replace inefficient manual workflows of cleanup excess privileges with the automation of reconciliation and remediation.