Identity Governance

Insight and overview

IGA puzzel

Identity Governance provides you with overviews of which accounts exist and the rights assigned to those accounts. The trick is to make these overviews manageable and usable.

Predict & certify authorisation

This feature allows managers to periodically review and approve user roles and permissions. And that they do so for new users at the outset. The prediction lies in the fact that for a new user the rights can be predicted. This is done with the help of machine learning.

Access & approval reports

Reports on the access that identities have and who has approved access when.

Since the introduction of AVG in Europe, customer identity & access management (CIAM) is on the rise. This involves specific applications that ensure that only attributes for which the user has given permission are sent to an application. And that ensure that users can see which permissions they have given. Various suppliers offer solutions for this. In addition to the AVG, which imposes requirements on personally identifiable information (PII), there are other laws and regulations regarding access, use and retention of information. These must also be respected in consent management.

Privileged account management

Privileged Account Management (PAM) helps control and monitor management access to servers, databases and applications. Administrators gain access to systems without the risk of passwords being shared or lost. All activities are centrally logged for all different systems. In addition, extensive auditing and reporting of all management activities, and even tracking, is possible.

Delegate authorisation management

See here.

Request access

See here.

Back to Modiam