We are delighted to share our new EIC Delivery Methodology for efficiently managing Saviynt Implementations and delivering quick time to value. CLICK HERE.

Knowledge Base Articles

Role Design Best Practice

Short DescriptionBest Practices to be followed during Role Creation/Modification. Role are used to club together multiple types of access from a single or multiple endpoints and grant it to user in a single request.Applicable versionAllBest Practices...

prasannta by Saviynt Employee
  • 1044 Views
  • 1 comments
  • 1 kudos

Security system and endpoints best practice

Short DescriptionThis article describes the best practices for security system and endpointApplicable versionAll versionDetail best practiceSecurity SystemProvisioning Limits should be set for “Disable” and “Delete” Task types for all Security system...

Rishi by Saviynt Employee
  • 915 Views
  • 0 comments
  • 0 kudos

Orphan Accounts Management

Short Description - Orphan accounts can pose a serious security challenge for your organization. They are unattended , disown accounts who might have sensitive access assigned to them. We need to regular monitoring and appropriate handling of these a...

SAgrahari by Saviynt Employee
  • 636 Views
  • 0 comments
  • 0 kudos
Labels
Top Contributors