Inventy
What does it mean to
OPTIMIZE the user
lifecycle?
INVENTYApril 2015 – SAP Security 360° Service
Have you ever had serious difficulties in obtaining computer rights ?
I HAVE !
Application Form
Search for permissions
and accounts
Add to the request
Validate request
Provisioning and details
Monitoring request and notifications
Operational accounts and permissions
EASY! A simple 7 step process…Requesting IT access rights for a normal user ?
But reality is often different …
Validate request
Application form
Search for permissions
and accounts
Add to the request
Provisioning and details
Monitoring request and notifications
Operational accounts and permissions
Validate request
Application form
Search for permissions
and accounts
Add to the request
Provisioning and details
Monitoring request and notifications
Operational accounts and permissions
By profiles and by users
Security Validation / Authorization catalog
exposure
Adding partial roles
Requests by user
copy
Manager validation
Compliance validation
Provisioning
Return code from target applications
User email
Initial password change
Connection validation
Automatic additions by HR
Profile
Person in charge
validation
Each step requires coordinationof unclear sub processes involving multiple actors ...
At Inventy,
we OPTIMIZE and SECURE the user lifecycle
Validate request
Application form
Search for permissions
and accounts
Add to the request
Provisioning and details
Monitoring request and notifications
Operational accounts and permissions
By profiles and by users
Security Validation / Authorization catalog
exposure
Adding partial roles
Requests by user
copy
Manager validation
Compliance validation
Provisioning
Return code from target applications
User email
Initial password change
Connection validation
Automatic additions by HR
Profile
Person in charge
validation
OptimizationZone
S
S
S
S
C
C
S
S
S
SS
C
C
S
with SAP Identity & Access Governance,
each step is modeled and automated in IDM & GRC …
S
C
Simple automated action.
Complex action natively integrated
Validate request
Application form
Search for permissions
and accounts
Add to the request
Provisioning and details
Monitoring request and notifications
Operational accounts and permissions
By profiles and by users
Security Validation / Authorization catalog
exposure
Adding partial roles
Requests by user
copy
Manager validation
Compliance validation
Provisioning
Return code from target applications
User email
Initial password change
Connection validation
Automatic additions by HR
Profile
Person in charge
validation
…integrated data flows accelerate AUDITSand reduce maintenance costs
Integrated data flow.
I
I
I
II
I
I
I
I
Validate request
Application form
Search for permissions
and accounts
Add to the request
Provisioning and details
Monitoring request and notifications
Operational accounts and permissions
By profiles and by users
Security Validation / Authorization catalog
exposure
Adding partial roles
Requests by user
copy
Manager validation
Compliance validation
Provisioning
Return code from target applications
User email
Initial password change
Connection validation
Automatic additions by HR
Profile
Person in charge
validation
I
I
I
Add to the request
Provisioning and details
Operational accounts and permissions
By profiles and by users
Return code from target applications
Initial password change
Connection validation
Person in charge
validation
Our commitment ?
A simple user experience
A COMPLIANT process with a low cost
Application form
Search for permissions
and accounts
Validate request
Monitoring request and notifications
Adding partial roles
Requests by user
copy
Automatic additions by HR
Profile
Manager validation Provisioning
Security Validation / Authorization catalog
exposureCompliance validation
User email
April 2015
Inventywww.inventy.com
Contact us to learn more
We would love to hear more from you!
Top Related