Access Governance Features

Insightful user access and policy reviews

Make informed decisions based on actionable insights

Maximize visibility by reviewing access based on users, applications, cloud resources, policies, and permissions across the IT and infrastructure ecosystem. Access Governance simplifies the certification process and provides actionable insights so managers and administrators can make informed decisions about user access permissions and cloud infrastructure policies.

Insightful user access and policy reviews
Insightful user access and policy reviews

Event-based and time-driven microcertifications

Set policies to reduce manual certification processes

Minimize the resources needed for lengthy periodic certification campaigns by introducing event-based and time-driven microcertifications. Access Governance enables organizations to quickly run microcertifications based on events such as internal job changes or employee leaves of absence. It also allows for the activation of a controlled number of microcertifications based on specific dates such as project completions and anniversaries. This approach makes it easier to maintain compliance for access privileges and take steps to revoke overprivileged user access. It also reduces the time and costs associated with verifying access entitlements across the business.

Event-based micro-certifications
Event-based micro-certifications

Analytics-driven decisions

Enforce access controls with insightful analytics based on access permission patterns across the organization

Turn large amounts of identity data into actionable insights. From peer group analysis to outlier detection, Access Governance’s machine learning–based insights provide risk evaluation and advanced analytics with prescriptive recommendations to help improve risk awareness, reduce manual certification efforts, and automate access control and provisioning.

Analytics-driven decisions
Insights with Prescriptive Analytics

Efficient orphan accounts management

Mitigate risks with versatile options to review, associate, or revoke orphan accounts

Simplify your organization's orphan account management process by efficiently identifying, assessing, and addressing orphaned accounts. Gain granular control with various management options, such as alert, review, associate, or revoke with periodic access reviews. Stay ahead of security threats and compliance challenges with ease.

Analytics-driven decisions
Efficient orphan accounts management

Centralized, enterprisewide visibility

Instant auditability of access trends and entitlement risk

Pinpoint security risks with the My Directs’ Access and Enterprisewide Access dashboards. Consolidate your organization’s access data into one view that details who has access to what and how access was granted. Security owners and managers can now achieve total visibility into user access patterns regardless of whether the resource is in the cloud or on-premises, quickly remediate threats, and help ensure consistent compliance.

Centralized enterprise-wide visibility
Centralized, enterprisewide visibility

Smart identity attribute control

Meet your enterprise's unique needs by harnessing custom identity attributes from your governance system

Leverage custom attributes such as “Location” or “Employee Type” for more flexibility when managing periodic and event-based access review campaigns. Sourced from on-premises Oracle Identity Governance systems, these attributes allow you to tailor campaigns for specific enterprise requirements and use cases. By using custom attributes to define active and inactive identities, organizations can efficiently adapt to meet unique governance needs, streamline processes, and bolster security.

Smart identity attribute control
Smart identity attribute control

Easy data synchronization

Fetch entitlement data from authoritative sources to quickly support governance for cloud and on-premises environments

Save time by pulling data from authoritative sources—such as Microsoft Entra ID, Microsoft SQL Server, Oracle E-Business Suite Human Resources Management System (HRMS), Oracle Fusion Applications, Oracle NetSuite, Oracle Cloud Infrastructure Identity and Access Management (OCI IAM)—directly or by running Access Governance as a hybrid solution alongside Oracle Identity Governance 12c. Start provisioning entitlement data to target systems, managing user privileges from the cloud, running user access or OCI IAM policy and group membership reviews, and triggering remediation across systems in the cloud or on-premises.

Easy data synchronization
Easy data extraction

Intuitive user experience

Get going faster with a simplified user experience and intelligent workflow

Simplify the execution of certification campaigns with an intuitive user experience to help ensure appropriate and timely user access and OCI IAM policy reviews. In addition, the intelligent workflow guides users and makes straightforward suggestions to help meet compliance and regulatory objectives faster.

Intuitive user experience
Intuitive user experience

Dynamic access control

Implement dynamic identity collections and access bundles for attribute-, policy-, and role-based access control

Orchestrate on-premises and cloud application entitlements using dynamic access control, featuring attribute-, policy-, and role-based access control. Enable application owners to construct bespoke access bundles, and empower business owners to precisely determine access privileges for identity user groups. Benefit from granular and customizable yet highly automated access permissions with heightened protection.

Dynamic access control
Dynamic access control

No-code workflow formation

Optimize access control and governance through no-code and flexible workflow formation

Easily create lightweight no-code workflows for access control and governance. Visualize and design linear or parallel workflows, seamlessly integrating user management, management chain, and identity collection into the workflow process. The intuitive workflow graphical UI simplifies the workflow process for access provisioning, reviews, and policy-, attribute-, and role-based access control.

No-code workflow formation
No-code workflow formation

Swift application onboarding

Simplify and accelerate heterogeneous application and system onboarding with a wizard-based approach

Rapidly onboard applications with an easy connection to on-premises and cloud systems through wizard-based steps and simplified data loading. Say goodbye to the complexities of managing and upgrading traditional IGA connectors—identity orchestration is managed centrally by Oracle Access Governance and data is seamlessly managed and updated periodically, eliminating the need for data migration.

Swift application onboarding
Swift application onboarding