Knowledge Base Articles

Security system and endpoints best practice

Short DescriptionThis article describes the best practices for security system and endpointApplicable versionAll versionDetail best practiceSecurity SystemProvisioning Limits should be set for “Disable” and “Delete” Task types for all Security system...

Rishi by Saviynt Employee
  • 521 Views
  • 0 comments
  • 0 kudos

Orphan Accounts Management

Short Description - Orphan accounts can pose a serious security challenge for your organization. They are unattended , disown accounts who might have sensitive access assigned to them. We need to regular monitoring and appropriate handling of these a...

SAgrahari by Saviynt Employee
  • 353 Views
  • 0 comments
  • 0 kudos

Role Design Best Practice

Short DescriptionBest Practices to be followed during Role Creation/Modification. Role are used to club together multiple types of access from a single or multiple endpoints and grant it to user in a single request.Applicable versionAllBest Practices...

prasannta by Saviynt Employee
  • 466 Views
  • 0 comments
  • 1 kudos
Labels
Top Contributors