Request-based access to resources

On a request basis, IBM Security Identity Manager provides a process to grant, modify, and remove access to resources throughout a business. The process establishes an effective audit trail with automated reports.

In request-based provisioning, users and their managers search for and request access to specific applications, privilege levels, or resources with a system. The requests are validated by workflow-driven approvals and audited for reporting and compliance purposes..

For example, users, or their managers, can request access to new accounts. Additionally, managers or other administrators are alerted to unused accounts and given the option to delete the accounts through a recertification process. These periodic reviews of user access rights ensure that access with previous approval is removed, if it is no longer needed.

Parent topic: Resource provisioning