eAuditor Identity Access Management2024-12-18T16:16:54+01:00

IAM management

  • Access automation
  • Control of entitlements
  • Central access management
  • Audit of entitlements

Table of contents

How does the entitlement request processing work?

Privilege management

Zarządzanie uprawnieniami
Employees submit requests for new resource permissions, which are automatically sent for approval.
The process is intuitive, minimizing the risk of errors.
The system automatically executes accepted requests, eliminating errors and speeding up the process.

Decision makers review and approve applications, with full insight into applicant data and potential conflicts.

Administrators manage the authorization lifecycle, with full auditing of activities.

The system supports internal audits by identifying risks and nonconformities.

Change management

Zarządzanie zmianami
The system allows the creation and approval of plans for changes to the IT infrastructure, minimizing the risks associated with the their implementation.
Monitor the implementation of changes, according to the schedule, with automatic documentation of the process.

Absence and substitution management

Zarządzanie nieobecnościami_zastępstwami
Employees enter absence information, which is automatically sent to the appropriate people.
Automatically appoint a deputy for entitlement requests and other tasks.

Management of the application approval path

Zarządzanie ścieżką akceptacji wniosku
The system allows you to create, modify and delete approval templates.
The templates specify the Active Directory account responsible for accepting or rejecting the request, based on the parameters indicated by the user.
It allows recording such data as the name of the template, description of the application/service/profile, approval steps, and identification of the approver (login, position, department).
One template can be used for multiple permission definitions, provided that the parameters and criteria match.

Privilege and access management

Learn about eAuditor IAM during a free presentation

Definitions of entitlements

Definicje uprawnień

The system allows the creation, modification and deletion of permission definitions for applications or profiles covering multiple services.

Determining the type of entitlement, status and support group, with the possibility of verification.

Define a support group and assign an approval template, with parameters required for registration.

Directories and statements

Kartoteki i zestawienia

Centralized storage and controlled access to data on users, resources and permissions.

Generate operational and strategic reports based on collected data.

Support portal

Portal pomocy technicznej
Users can quickly create technical requests that go to the appropriate support team.
Users track the status of requests in real time, with access to request history.
Access to an updated knowledge base for self-solving problems.

Benefits

IAM management – questions and answers

Is it possible to give temporary privileges to employees?2024-09-30T10:53:56+02:00

Yes, the system allows you to assign permissions with a specific expiration date. When granting permissions, you can set the start and end dates of the permissions, which is useful for projects with limited duration or tasks that require temporary accesses.

What is an opening balance audit in the IAM system?2024-09-30T10:55:12+02:00

The opening balance audit is a function used to import and verify the current privileges granted to employees. After importing data into the system, the administrator can check the compliance of assigned accesses to information systems.

Does the system support permission verification for different roles and access levels?2024-09-30T10:56:11+02:00

Yes, the system supports permission verification for different roles and access levels, allowing you to control and audit the permissions assigned to different roles and access levels in your information systems. 

Does the system allow you to plan and manage longer periods of absence such as maternity leave?2024-09-30T10:57:04+02:00

Yes, the system allows you to plan and manage longer periods of absence such as maternity leave by automatically assigning substitutes and updating authorizations during the period of absence. 

How do IAM approval templates work?2024-09-30T10:58:46+02:00

Approval templates make it possible to clearly identify those responsible for accepting or rejecting an application. Email notifications are also defined to inform all participants in the approval process.

Is the IAM system scalable?2024-09-30T10:59:35+02:00

Yes, IAM systems are typically scalable and can be customized to meet the needs of small, medium and large enterprises. They can be expanded as the company grows and its identity management needs increase.

Does the eAuditor IAM system integrate with Active Directory?2024-09-30T11:00:21+02:00

Yes, the system integrates with AD. You can automatically import data from AD, including user information, system access permissions (domain login capability) and organizational structures.

Does the system give you the ability to check your current permissions from the Employee Panel?2024-09-30T11:01:11+02:00

Yes, the Employee Panel allows you to view the current permissions assigned to a user. The user can see a list of all the systems and roles to which he or she has access, as well as details about each authorization. 

Contact us

    Contact information
    Indicate the subject of the message


    I agree to the processing by BTC Sp. z o.o. of my personal data in the form of name, surname, telephone number, e-mail address for the purpose of sending me technical and marketing information on products and services offered by BTC Sp. z o.o. by means of electronic communication, pursuant to the content of Article 10 Paragraph 1 and 2 of the Act on Electronic Provision of Services.