Announcing the Saviynt Knowledge Exchange unifying the Saviynt forums, documentation, training,
and more in a single search tool across platforms. Read the announcement here.

Endpoint - Out of Band Sync

ssudhakar
New Contributor III
New Contributor III

Hello Team,

https://docs.saviyntcloud.com/bundle/KBAs/page/Content/Configuring-the-detection-of-out-of-band-acce...

According to the documentation, it is clear that saviynt has the ability to detect unauthorized accesses that are assigned directly in the target application and then synchronize this data with Saviynt and based on the action defined at endpoint (either Deprovision Access or Deprovision Access and Recreate Request), Saviynt takes necessary actions regarding any out-of-band access added directly in the target application.

However, we could not find any information regarding how Saviynt handles access removal that occurs directly in the target application (for example, if a user's AD group membership is removed directly in Active Directory) and how Saviynt reconciles this change.

We are curious to know if Saviynt can identify such instances of access removal happening within a target application, and whether it provides an option to recreate a request for these removed accesses when the Out of Band Sync process is enabled for that particular endpoint.

Furthermore, what does Saviynt recommend as a solution to identify instances where access is being removed directly from a target application? How can we initiate the remediation process? Is there a specific report available to show which accesses have been removed or provide an option to recreate requests for those removed accesses?

Thanks in Advance,

Sudhin Sudhakar

 

 

1 REPLY 1

rushikeshvartak
All-Star
All-Star

Currently in saviynt there is no way to detect if any access has been removed from target.

As saviynt uses account_entitlements1 table for storing all transactions of account to access mapping.

We had custom table in v5.5 in client where we use to compare current access with last run access (custom table) to identify such anomalies  


Regards,
Rushikesh Vartak
If you find the response useful, kindly consider selecting Accept As Solution and clicking on the kudos button.