Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

itsa 365: Title of the whitepaper
  • Whitepaper
  • Data Center Security, Identity and Access-Management

Joiner, Mover, Leaver: User provisioning with SolarWinds Access Rights Manager

SolarWinds Access Rights Manager is designed to help address the user provisioning process across three phases – joiners, movers and leavers.

The flexibility of today’s working world requires a well thought-through user provisioning process. Whether for a new user, a short-term assignment, department changes or temporary projects, the expectations of an IT group are to accurately and quickly provision users while helping to maintain data security. 

IT departments are typically responsible for securing a network, managing access to resources and keeping an overview of permissions and access rights policies. Therefore, they should use a provisioning framework. SolarWinds® Access Rights Manager (ARM) is designed to help address the user provisioning process across three phases – joiners, movers and leavers. Administrators can use ARM to quickly identify who can view which data and adjust access rights if necessary. To simplify the administration of access rights, an optional self-service portal can be used, which allows employees to request authorizations quickly and easily. With ARM, user management processes can be automated, access rights can be optimized and, ultimately, data protection can be improved. Thanks to ARM, the allocation processes always remain transparent and clear. 

Download - exclusively for registered users

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.