Four aspects to consider when choosing a permission management software

IT systems

A permissions management software must be able to incorporate all significant IT systems, e.g. core systems, like Active Directory, and systems that build on it and require some form of permission management, like approvals (network sharing), Exchange, SharePoint, Citrix. For many applications, users and permissions are administered in an extra user database. These user accounts and permissions are equally important and should therefore be incorporated into the centralized permission management system. To do this, the safest bet is to implement a system that applies an open connector structure – like tenfold.


When choosing a permission management software, it is important to consider whether all relevant procedures are fully covered. Let’s take “on-boarding“, i.e. introducing a new staff member into the company, as an example: the new member is added to the HR database. The data are automatically adopted into the permission management system. Based on their department and location, certain permissions are automatically assigned to the new member. The manager is informed in good time before the new employee’s commencement of duties and thus able to assign any additionally required permissions. tenfold automatically generates an e-mail account and a “home“ directory. The new employee’s accounts are activated the night before their commencement of duties and the software automatically generates initial passwords and sends them to the supervisor by e-mail. Only a software that is able to carry out processes in a flexible and consistent fashion is able to provide consistent permission management.


A permission management software is only effective if it is able to incorporate all members of an organization where relevant: HR, who are generally in charge of providing master data; data owners in different departments, who are in charge of approving permissions; and, last but not least, the IT department, who regulate daily business routines and provide reports. The software must be able to incorporate members proactively, e.g. through e-mail notifications. The majority of company members will most likely not be trained to handle permissions, which means that a software designed for permission management must provide a simply-designed and easy-to-use interface and pack any complex procedures into its back-end.


When introducing a permission management software, the most important aspect to consider is planning individual steps. Depending on its complexity, a project may be completed within a day – as is usually the case with tenfold Essentials Edition – or there may be more complex processes, workflows and interfaces involved that will take longer to implement. It is therefore recommended to implement the software step by step und to extend and improve the system gradually. tenfold’s Enterprise Edition is ideal for such scenarios.

Identity Management Software, IAM Software, permission management software – the four points outlined above will bring you one step closer to a successful implementation.

By |2019-05-21T09:10:41+00:0007 / 06 / 2018|BLOG|

About the Author:

Helmut Semmelmayer
Helmut Semmelmayer has been Senior Manager Channel Sales at the software company tenfold since 2012. He is in charge of partner sales and product marketing and regularly blogs about issues and topics related to identity and access management.