Monitor the progress of the access request, working with Identity and Access Management as needed. Receive the response to the access request. Determine if the access was authorized.
©Copyright IBM Corp. 2005, 2008. All Rights Reserved.