Skip to main content

13 docs tagged with "Identity process"

View all tags

Access management

The Access management processes include the request of identities, as well as the evaluation and actions that must be taken in connection with the request(s). These processes in turn, help decentralize the user access management processes by introducing self-service access requests, workflow-supported approvals, and provisioning.

Administration

As business and systems change over time, so should the administration of managed systems, and they must be handled in a structured, secure, and seamless way.

Business alignment

The Business alignment processes concern the business benefits obtained such as cost efficiency and risk management. These benefits are achieved by addressing roles, assignment and constraint policies, as well as the reasons for being in the organization or identities context.

Data interfaces

Data is imported into Omada Identity using standard data collectors. Out-of-the-box, Omada Identity provides a wide range of collectors.

Governance

The governance processes cover the tasks and data that provide reports for

Identity lifecycle management

The Identity Lifecycle Management processes enables you to onboard, change, and offboard identities such as employees or contractors. This process is known as the joiner-mover-leaver process. Triggering any of those processes results in identities being updated in regard to your company's organizational structures.

Identity security breach

In some cases, it may be necessary to lock out one or more identities from using any type of system connected to Omada Identity, typically in the case of a security breach or other system irregularities.

IdentityPROCESS+

The Omada IdentityPROCESS+ describes the standard Omada Identity or Omada Identity Cloud solution offering. In this context, the standard refers to the functionality which is available out-of-the-box (OOTB), provided that Omada Identity is configured correctly.

IGA process parameters and mechanisms

To guarantee an efficient and compliant functioning of the IGA processes, there are several parameters that must be configured. The parameters range from governance in the form of responsibilities to setting timers to trigger events.

Solution concepts

This chapter describes Omada Identity solution concepts that are important to understand in the context of this document.