Skip to main content

Authorization Center

This feature is available if you have purchased the [Lifecycle Management] or [IGA – Identity Governance] module. Administrators can use this module to define custom authorization models, policies, and rules for fine-grained access control on the IAM platform, supporting complex enterprise access management scenarios.

Permission Model

The Permission Model defines how entitlements are bundled (as permission packages), how user and application scopes are defined, and how permissions are automatically provisioned or requested.

No.Configuration ItemDescription
1Model TypeDefines the category used when users request permission packages in the portal.

Default options include: Role-based, Position-based, Organization-based, Attribute-based, Business Unit-based, and Public permissions.

You can manage model types under System Settings → Permission Model Types.
2Business OwnerAllows owners to view and manage their responsible permission packages in the portal.
3IT OwnerReserved field for marking IT responsibility; currently no specific function.
4Provisioning InfoPermissions configured here will be used by the Authorization Center → Account Provisioning module.
5Workflow PermissionsPermissions configured here will be presented as permission packages for user requests via the portal.

Note: Approval workflows depend on the Workflow Engine. Ensure that the System Settings → Workflow Engine is configured. To use ParaFlow (our custom workflow engine), the ParaBPM module must be purchased.

Deactivating a Permission Model

The following operations are impacted when a permission model is deactivated:

No.OperationDescription
1Access RequestDeactivated models will not be visible in the portal during permission requests.
2ProvisioningDeactivated models will not appear in new provisioning policies. Existing policies using the model will also be disabled.

Permission View

Displays the permissions configured within a permission model. You can easily understand what entitlements are associated with the model.

No.View TypeDescription
1List ViewShows associated permissions in a table format
2Topology ViewDisplays associated permissions in a tree structure

Account Provisioning

Configure account provisioning policies so that when a user's lifecycle changes (e.g., creation, update, deactivation), account information is automatically synchronized to downstream application systems. This ensures smooth access without requiring manual account setup.

No.Configuration ItemDescription
1Model TypeRequired. This is sourced from the list of defined permission model types.
2Model NameLists all enabled permission models of the selected type for selection.

Lifecycle Events: Defined under provisioning policies. The system comes with built-in lifecycle actions: Create, Update, Disable, Enable, Delete, and Password Change. You can also define custom lifecycles.

No.Lifecycle EventDescription
1CreateWhen a user is created, accounts for all applications associated with the selected permission model are provisioned.
2UpdateWhen a user is updated, the account info is automatically synchronized to the selected applications.
Note: This only applies if the user already has an account in the application.
3DeleteWhen a user is deleted, their accounts in the selected applications are either deleted or disabled accordingly.
4DisableWhen a user is disabled, their accounts in the selected applications are deleted or disabled.
5EnableWhen a user is re-enabled, their accounts are automatically enabled in the selected applications.
Note: If “Create Account” is set to Yes and the user has no existing account, one will be created. If set to No, no action will be taken.
6Password ChangeWhen a user successfully changes their password, the update is synchronized to their accounts in the selected applications.

Policy Priority

Provisioning policies can be prioritized. If multiple policies match a user, and the lifecycle event and application are the same, only the policy with the highest priority will be executed.

Global Provisioning Policy

When a user is deactivated or deleted, their remaining application accounts will follow the global provisioning policy.

If a user update causes them to no longer meet policy conditions, this policy defines how to handle their accounts and permissions in the affected applications.

Application Dependency Rules

In cases where application accounts are interdependent (e.g., an Exchange account requires an AD account first):

No.OperationExample
1Create/EnableUsers will be prompted to activate AD accounts before Exchange accounts
2Disable/DeleteUsers must disable/delete Exchange accounts before AD accounts
3Permission ModelWarnings are shown based on configured dependency rules
4Provisioning RuleWarnings are shown based on configured dependency rules

Configuration Walkthrough

To meet a use case where updates to users in a certain organization should trigger synchronization to the OA system, follow these steps:

  1. Create Organization: e.g., Organization A

  2. Create Application: e.g., OA Application, enable data sync and associate the OA plugin

  3. Create Permission Model:

    • Model type: Organization-based
    • Scope: Select Organization A
    • Associated application: OA
    • Optional: bind permissions during provisioning
  4. Create Provisioning Policy:

    • Link it to the permission model
    • Lifecycle events: Select Create and Update
  5. Verify Outcome:

    • Create a user under Organization A
    • Confirm records appear in Synchronization Logs after create and update actions

Organization Provisioning

You can configure which operations on organizations trigger provisioning. Unlike account provisioning, organization provisioning is based on organization structures and not linked to permission models.

No.Lifecycle EventDescription
1CreateCreates a new organization in the target application when a new one is created in IAM.
(Note: “Include Sub-orgs” must be selected during policy configuration.)
2UpdateUpdates the organization data in the selected application when an org is modified
3DeleteDeletes the organization from the target application when deleted in IAM
4DisableDisables the organization in the target application
5EnableEnables the organization in the target application

Position Provisioning

Position provisioning is similar to organization provisioning but targets position groups and is also independent of permission models.

No.Lifecycle EventDescription
1CreateCreates a new position in the target application
2UpdateUpdates the position in the target application
3DeleteDeletes the position from the target application
4DisableDisables the position in the target application
5EnableEnables the position in the target application

Re-Execution

The Re-Execution feature is designed for "catch-up" actions. If data was created after a provisioning policy was configured and still needs to be provisioned to downstream systems, this function will trigger provisioning based on existing configurations. Re-execution applies only to the Create lifecycle.

Execute All

No.Configuration ItemDescription
1Execution TypeSelect whether to execute Account, Organization, or Position provisioning
2ApplicationSelect the target application

Note: The application must be associated with an existing provisioning policy
3Push to ApplicationIf enabled, data will be pushed to the application if synchronization is turned on; if disabled, no data will be pushed

Example:

  1. Create a permission model associated with Organization A and Application A (sync enabled), and bind permissions
  2. Create a provisioning policy linked to the model, and select Create lifecycle
  3. Create User 01 in Organization A
  4. Use “Execute All” with type = User, application = App A, and enable “Push to Application”
  5. User 01 will automatically be provisioned and granted permissions in App A

Execute by Organization

No.Configuration ItemDescription
1Execution TypeChoose to execute Account, Organization, or Position provisioning
2ApplicationTarget application (must be linked to a provisioning policy)
3Push to ApplicationControls whether data is actually pushed when sync is enabled
4Include Sub-orgsYes = includes sub-organizations in execution
No = executes only on selected orgs

Execution Records

Re-execution tasks are run on a scheduled basis. After choosing “Execute All” or “Execute by Organization,” the task enters a Pending state and runs at the next scheduled time. Once executed, detailed logs will be available in the task view.

Lifecycle Management

Lifecycle data is shared across Account, Organization, and Position provisioning. Each has its own submodule with specific lifecycle event definitions.