Logo

Access Manager

Please note: It's a roadmap, not a promise. Items might be subject to change without notice.
🔨 Now
⏳ Next
💡 Considering
✨ Launched
Management of Exchange Functional/Shared Mailboxes [Exchange Online]
Self Service: Description for profiles
Reapproval - Different time intervals for different sensitivity levels
Centralized Script Management
Assistance: Request permissions for multiple users
Assistance - Request rights for multiple profiles
Logging with Splunk
Support for User Permissions & Roles Migrations
Request new AD Groups with Naming Conventions
Centralized Logging with Loki
REST API
Credential Provider for Password Reset
For-eyes-principle for remote work
No-code Identity Management - Ask for a demo now
Active Directory in Self Service
AMPR - New Target System: Meierhofer KIS
MS Teams Management - test it now
Multi-Language-Supported User Interface
Public Items: Automatically approve requests on 3rd Party Items
Password Reset via Phone Call
Easy Desktop: Self Service in Windows Explorer - test it now
AD Group Management - test it now
User Tagging
Protect sensitive data with additional user pre-authorization
Previously in History
Powered by airfocus
Protect sensitive data with additional user pre-authorization
Protect sensitive data with additional user pre-authorization
Protect sensitive data with additional user pre-authorization
✨ Launched

For highly sensitive data, it may be advisable to carry out pre-authorization, e.g. in the form of anti-sabotage or confidentiality training, in addition to complying with the need-to-know principle. At the same time, it is important to ensure that only those employees who have completed this pre-authorization are granted access permissions.

In order to technically map such organizational protective measures, it is now possible to define AD groups for data protection classes that contain the pre-authorized employees.

If a resource is marked with this data protection group, the system guarantees that only those permissions are transferred to the target system that have been authorized by AD group membership. Unauthorized users are highlighted in the user interface. If they are later added to the group, the permission is transferred to the target system during the next job run.

To pick up a draggable item, press the space bar. While dragging, use the arrow keys to move the item. Press space again to drop the item in its new position, or press escape to cancel.