The Identity Panel Suite provides the capability to automatically issue credentials for new employees before their official start date. This ensures new joiners have timely access to the systems and resources they need—enabling line managers and service desks to onboard new team members smoothly and securely.
Automated Credential Provisioning
Using HyperSync Panel, Identity Panel can detect new employee records from authoritative sources such as HR systems. Once a new identity is identified, credentials can be automatically generated for target systems like Active Directory, Microsoft Entra ID (Azure AD), or cloud applications. This automation supports both state-based (ongoing status) and event-based (triggered by a future start date) scenarios.
-
Credential creation can be scheduled ahead of the join date.
-
Multiple systems can be updated in sync from a single onboarding trigger.
-
Credentials include usernames, initial passwords, email accounts, and group memberships.
Configurable Delivery to Line Managers or Service Desk
Service Panel allows organizations to define workflow rules and recipient chains that control how and where credentials are distributed. These rules can be customized to reflect organizational policies. For instance:
-
Line managers can receive credentials directly if policy allows.
-
Service desk teams may receive credentials when additional steps (such as manual handover or equipment preparation) are required.
-
Conditions and logic can be defined using Service Panel’s flexible request policy and audience rule frameworks.
Secure Logging and Auditing
All credential-related actions—such as generation, distribution, and access—are logged in Identity Panel's Operations History and Panel Action records. These logs are:
-
Fully searchable via the Time Traveler interface.
-
Retained in accordance with your organization’s data retention policy.
-
Available for audit reports and compliance reviews.
This level of visibility ensures full accountability and supports governance requirements such as ISO 27001, SOC 2, and internal policy audits.
Comments
0 comments
Article is closed for comments.