Announcing the Saviynt Knowledge Exchange unifying the Saviynt forums, documentation, training,
and more in a single search tool across platforms. Read the announcement here.

Knowledge Base Articles

Role Design Best Practice

Short DescriptionBest Practices to be followed during Role Creation/Modification. Role are used to club together multiple types of access from a single or multiple endpoints and grant it to user in a single request.Applicable versionAllBest Practices...

prasannta by Saviynt Employee
  • 1641 Views
  • 1 comments
  • 1 kudos

Security system and endpoints best practice

Short DescriptionThis article describes the best practices for security system and endpointApplicable versionAll versionDetail best practiceSecurity SystemProvisioning Limits should be set for “Disable” and “Delete” Task types for all Security system...

Rishi by Saviynt Employee
  • 1232 Views
  • 0 comments
  • 0 kudos

Orphan Accounts Management

Short Description - Orphan accounts can pose a serious security challenge for your organization. They are unattended , disown accounts who might have sensitive access assigned to them. We need to regular monitoring and appropriate handling of these a...

SAgrahari by Saviynt Employee
  • 846 Views
  • 0 comments
  • 0 kudos
Labels
Top Contributors