33.1 Understanding the Access Request Process

The Access Request interface allows you to request application access and permissions for other resources in your environment. These requests might be subject to an approval chain before they are granted, and Access Request also manages these approvals. Additional features include ability to view access request related activity timeline, ability to view SoD violation if any, and the ability to compare granted permission between users, allowing you to standardize their access.  Finally, based on your authorization, it allows you to examine your own current access, or the access of another user, revoke a request, retry a failed request, or terminate a failed request.

Access Request allows you to request the following types of items:

  • Application request, which usually gives login privileges to that application

  • Permission request, which usually gives more rights within an application

  • Access profile (technical role), which is a collection of permissions requested as a single request

Identity Governance administrators define the policies that govern who can request access, what they can access for and for whom, and any required approvals. Approvers are notified by email of pending requests according to these Access Request policies, which contain a fine-grained mechanism for controlling the frequency of these notifications. Access Request policies may also designate CC and BCC email recipients, as well as an escalation policy in case the approver does not act in a timely fashion. For more information, see Section 27.0, Administering Access Request.