Process documentationUser Provisioning Locate this document in the navigation structure

 

The Access Control application provides a standardized and centralized framework to request user and system access, and to review and manage those requests. The basic user provisioning process, as suggested by most system and security administrators, involves the steps described below.

Note Note

The process described below is an example. A company's process may be different, and may have more or fewer steps. The application allows you to customize the steps as required. For more information, see the Customizing activity Maintain MSMP Workflows, under   Governance, Risk, and Compliance   Access Control   Workflow for Access Control  .

End of the note.

Prerequisites

  • Outside the application, you have identified your business needs, and evaluated your approach for managing user and system access.

  • Within the application, you have maintained the review and approval workflows.

    You maintain the workflows in the Customizing activity Maintain MSMP Workflows, under   Governance, Risk, and Compliance   Access Control   Workflow for Access Control  .

Process

User Provisioning consists of the following procedures:

  1. Creating access requests

  2. Reviewing access requests

  3. Analyzing access risks

  4. Managing risks

  5. Approving requests

    The application then provisions the user access requests.

    You can configure provisioning settings such as e-mail notification, auto provisioning, and so on, using the Customizing activity Maintain Provisioning Settings, under   Governance, Risk, and Compliance   Access Control   User Provisioning  .

Example

This graphic is explained in the accompanying text.