The Identity Governance product enables administrators and managers to easily collect all user and access information in one central location and certify that users have only the level of access that they need to do their jobs. Following the principle of least privilege, this product allows you to ensure that your users have focused access to those applications and resources they use and cannot access resources they do not need to access.
With Identity Governance, administrators and business managers can ensure that your employees, either individually or as a group, have the appropriate set of permissions. Identity Governance collects information from various identity and application data sources and manages the entire review and certification process. Identity Governance provides tools to guide you through the key phases of the access or account review, audit case management, and validation process.
Collecting identity and application data
Publishing identities, accounts, permissions, and groups
Highlighting policy violations
Grouping common permission sets into technical roles
Establishing business role policies to describe what is authorized
Preparing published data for review
Previewing review data
Reviewing user access
Approving the review
Fulfilling the access changes
Verifying that the access changes were made