Skip to main content

Identity Governance

This feature is available if you have purchased the [IGA – Identity Governance] module. Administrators can define custom strategies and rules to enforce fine-grained governance of permissions on the IAM platform, supporting enterprise-level access governance in complex scenarios.

Account Governance

Platform Account Policies

No.Anomaly TypeDescription
1Dormant AccountA user account that has not logged in for an extended period.
2Empty AccountA user account that is not linked to any application account.

Supported platform account policy actions:

No.ActionDescription
1NotificationCan send alerts (see Policy Management – Notifications).
If using email, a valid business email must be maintained in the user profile.
2Lock UserAutomatically lock user accounts identified by the policy.
3Disable UserAutomatically disable user accounts identified by the policy.
4Delete UserAutomatically delete user accounts identified by the policy.

Note: The sysadmin account is excluded when executing the Empty Account Policy.

Application Account Policies

No.Anomaly TypeDescription
1Dormant AccountApplication accounts with no login activity for an extended period.
2Orphan AccountApplication accounts not linked to any user.
3Duplicate AccountA user associated with multiple application accounts.

Supported application account policy actions:

No.ActionDescription
1NotificationCan send alerts (see Policy Management – Notifications).
If using email, ensure the user has a business email set.
2Disable AccountAutomatically disable accounts identified by the policy.
3Delete AccountAutomatically delete accounts identified by the policy.

Retention Strategies for Duplicate Accounts:

  • Keep Newest: Retain the account with the latest creation and update time (only if status is Requested or Active). If timestamps are identical, retain both.
  • Keep Oldest: Retain the account with the earliest creation and update time (same logic as above).

Permission Governance

The permission governance function provides fine-grained control over user entitlements. It allows defining rules to restrict or validate which permissions a user may hold and supports ongoing permission audits.

Permission Rules

These rules serve as pre-authorization controls, validating permissions before assignment.

No.Rule TypeDescription
1Mutual ExclusionAn account cannot be assigned two or more permissions marked as mutually exclusive.
2Maximum ComplianceSets the upper boundary for permissions; exceeding this scope is considered over-privileged.
3Minimum ComplianceSets the lower boundary; falling below this scope is considered non-compliant.

Actions supported for mutual exclusion rules:

No.Use CaseDescription
1Application PermissionsPrompts or blocks assignment of mutually exclusive permissions.
2Permission ModelsPrompts or blocks mutual exclusivity violations during model configuration.

Authorization Policies

Authorization policies enforce real-time permission checks during the assignment process. When permissions are granted, the system checks whether the assignment conforms to policy.

Supported actions for authorization policies:

No.Use CaseDescription
1Account ManagementPrompts or blocks when assigning mutually exclusive permissions.
2Application PermissionsSame as above during permission assignment at the application level.

Policy Priority

Authorization policies can be prioritized. If multiple policies apply to the same user, application, and rule set, the one with the highest priority takes effect.

Validation Policies

Validation policies perform post-assignment audits to detect and correct violations in already-assigned permissions. Only Active personal accounts are evaluated.

Execution Order

Validation policies also support priority settings. When multiple policies apply, they are executed sequentially based on priority. Unlike authorization policies, the last validation policy executed determines the final outcome.

Deprovisioning Policies

Deprovisioning policies allow reclaiming accounts and entitlements from downstream systems back into the IAM platform.

Currently supported sync plugins for deprovisioning:

No.PluginDescription
1DB PluginOnly AD and DB plugin applications are supported. Others will have no effect.
2AD PluginSupports real AD account recovery (details below).

Currently supported data types for deprovisioning:

No.Data TypeDescription
1Application AccountOnly AD plugin supports real account recovery. DB plugin performs virtual recovery by inserting records into the ac_user table, enabling recovery execution.

See Account – AD Plugin for configuration.
2Application RoleOnly supported in DB Plugin (virtual). Roles are inserted into the ac_role table.

Supports role hierarchies (role-to-role, role-to-resource). These relationships are inserted via the appropriate fields.

Important: Contained roles or permissions must be deprovisioned first. Existing permissions in IAM are not supported for recovery.
3Application ResourceYou can specify which resource types to recover.