It is nearly impossible to master this process manually, but tenfold offers full out-of-the-box support for the procedure: first, IT administrators must determine the relevant data owners in tenfold; then, they must use the graphical workflow editor to set up the according approval procedures. Data owners are informed of new requests by e-mail and can directly approve or reject these requests by clicking buttons contained in the very same e-mail. The clearance is processed via Kerberos authentication and thus protected from abuse. Once approved, the target system automatically implements the procedure using the corresponding plugin.
Through approval workflows in tenfold, data owners are informed automatically about IT access requests and are thus able to make decisions as to whether access should be provided or not. Data owners can calculate weigh up necessity vs. risks of access rights without having any previous extensive IT knowledge. This significantly reduces the workload for the entire organization, while tenfold’s advanced control mechanisms help to increase security and protection for important company data.