Resource provisioning
Depending on business needs, IBM Security Identity Manager provides alternatives you can use to provision resources to authorized users. Alternatives are based on requests, roles, or a combination of requests and roles.
- Request-based access to resources
On a request basis, IBM Security Identity Manager provides a process to grant, modify, and remove access to resources throughout a business. The process establishes an effective audit trail with automated reports.- Roles and access control
An organizational role supports different access control and access provisioning models in a customer deployment.- Hybrid provisioning model
The hybrid model of provisioning resources combines request and role-based approaches, which are both supported by IBM Security Identity Manager.Parent topic: Features overview