Identity Lifecycle Management

Easily take control of user access and permissions with Identity Lifecycle Management. Get full visibility to control and maintain the user lifecycle, ensuring the security and efficiency of your organization's IT environment.

User Life.png

User Lifecycle

Identity lifecycle management is an important component of Identity and Access Management (IAM). It is the process of managing a user’s identity, permissions, and access throughout their entire experience with an organization.

The IAM lifecycle involves creating, managing, and terminating user accounts based on predetermined criteria, helping organizations ensure that only authorized individuals have access to specific systems or resources across their IT environment.

Identity Lifecycle

By providing powerful visibility into user accounts, user lifecycle management in IAM helps organizations protect their systems from unauthorized access and data breaches. Additionally, it can help improve the effectiveness of IT operations by simplifying account provisioning and de-provisioning processes.

IAM Lifecycle

Here are the management steps that take place in the full identity lifecycle.

  • New User Creation & Account Activation
  • Automated Onboarding
  • Account Transfers
  • Deactivation, Deletion, and Archiving

New Employee Onboarding Process

  • Creating a new user account
  • Assigning a unique identifier
  • Setting up login credentials
  • Setting up role-based-access
  • Activating the user

Once the user account is created, it needs to be activated and made available for the user to access digital resources and perform necessary activities.

After activation, the new user will receive a welcome email informing them of the next steps.

IDHub includes many out-of-the-box emails and email templates, all are completely customizable, and if needed, new emails or templates can be created from scratch.

welcome email

Automated Employee Onboarding

New user accounts are generally created using connectors that integrate with the organization's source of truth, like Azure AD for example, to automate user account provisioning.

This process, along with Roles, instantly provides the newly created user access to only the resources needed for their specific job responsibilities.

One of the most efficient ways to manage the user lifecycle is accomplished using connectors, automating provisioning and deprovisioning for complete user lifecycle management.

Employee Onboarding Process

Some organizations give managers the authority to request to onboard new users. IDHub easily accommodates this with Access Requests.

After the Service Request is initiated and the creation of a new user is approved, the new account will provision to the resources assigned through Roles. If using connectors, those accounts are automatically provisioned.

Without connectors, IDHub would still start the provisioning of those resources, however IT or another named fulfiller, would do the actual provisioning work.

Identity Management Lifecycle

The user lifecycle involves managing the user account during its active lifecycle, including:

  • Monitoring user activities
  • Updating access permissions
  • Disabling access
User Lifecycle Profile

User Access Reviews

IDHub monitors and manages the user profile using Certification and Reporting.

Certifications are used to audit and review user access, which can be scheduled or on-demand. Admins can instantly process revocations directly from the Certification Task.

The Reporting tool is capable of collecting any data needed to determine any activities made by the user. That data can be exported into a PDF of XLS file for later use.

Birth Right Access

IDHub Roles are a collection of organizational resources, generally automatically assigned to user accounts using attribute based conditions.

When the user account attributes match the condition in the Role, access to the resources and permissions in the Role are granted and provisioned to that account.

Consequently, when the user account attributes change and no longer meet the condition in that Role, the Role and the resources within it will deprovision, while the appropriate Role provisions the new access.

Identity Lifecycle Deactivation

IAM Lifecycle New Employee Onboarding

Once the account is no longer required, it may be deactivated in IDHub via the Service Request, and access privileges are removed.

The user will still be found in IDHub, however the user will not be able to perform any activities or obtain any access.

Identity Lifecycle Deletion/Archiving

Depending on the organization policies and regulatory requirements, the account may be deleted or archived for future reference or auditing purposes. IDHub can accommodate both scenarios.

Overall, the phases of the user account lifecycle are designed to ensure that digital resources are secure and accessible to authorized users, while minimizing the risk of unauthorized access or data breaches.

User Lifecycle Management

Unlike other Identity Management Systems, IDHub simplifies the process of managing the full identity lifecycle; creating, managing, deactivating, and terminating user accounts.

IAM lifecycle management ensures only authorized users have access to sensitive business resources. Automating the provisioning and deprovisioning process saves critical IT time and puts focus on other important business tasks.

By implementing effective Identity Lifecycle Management, organizations can enhance security, streamline administrative processes, and ensure that access rights are aligned with the current roles and responsibilities of users within the organization.

Identity and Access Management

User Lifecycle Extras

https://media.sath.com/WORKFLOWS_PDF_02_ce2e4b2ea9/WORKFLOWS_PDF_02_ce2e4b2ea9.jpg

Approval Workflows

Learn Workflow Basics, see our most common workflow scenarios, and brush up on your workflow skills for your own business workflows.

https://media.sath.com/featured_access_control_policy_template_2_ecd665465b/featured_access_control_policy_template_2_ecd665465b.jpg

Manager Control

Manager level access control is vital, providing exclusive oversight and control over relevant resources. Learn how IDHub gives managers the control they need.

https://media.sath.com/application_onboarding_fa01d723e3/application_onboarding_fa01d723e3.jpg

IAM Proxy Users

Integrating Proxy Users into your IAM system ensures seamless continuity of your processes, and provides an efficient method to prevent disruptions.

Find Out How Many Hours You'd Save With A Quick 10-Minute Call.

Could your IT team use an extra 10, 30, or 100 hours per week?

schedule-a-call.webp