The status of all requests are continuously monitored during the execution of the actual process steps.
On-line status displays, automated notifications, automated reports, and real-time reports are available to gain an
understanding of the status of the contacts.
In addition, monitor identities to determine if they are still valid and still require the rights they currently
have. It is typically a security risk to maintain identities no longer needed or provide rights that are no longer
needed. This monitoring may take any of the following forms:
-
Identifying HR records of individuals who are no longer with the business, have been promoted, or have changed jobs
-
Requesting that all users identify whether they have a current need for identity or access
-
Monitoring user activity
-
Etc.
|