In our Agility breakout session, we shared 7 key steps for managing permissions and access end-to-end within Risk Cloud. Below you will find resources to help you with learning about and implementing these features and functionalities.
1. Setup Single Sign-On
Single Sign-On (SSO) allows your users to access Risk Cloud without having to remember a unique username and password. This can enhance your security and ensures your IT team controls who can access the platform. Learn more about enabling Single-Sign On.
2. Setup SCIM provisioning
SCIM is a standard used across cloud-based applications to automate user management, including provisioning and deprovisioning. When paired with SSO, your users can reliably be created in Risk Cloud, access the platform, and, when appropriate, have their access revoked and be deactivated. Learn more about Risk Cloud's SCIM integration.
3. Centralize access within Roles
Risk Cloud is highly flexible in terms of how users can be granted permissions and access, such as by applying a Permission Set directly to a user. This is useful for testing and exceptions, however for most situations we recommend managing access through Roles so that all users can receive the same entitlements and Step access. Learn more about creating and managing Roles.
4. Push identity groups via SCIM
Risk Cloud's SCIM integration includes the functionality to sync groups from an identity provider to Risk Cloud Roles. This allows you to not only automate access to Risk Cloud, but within Risk Cloud as well. Learn more about SCIM Group Sync.
5. Connect Roles to User Groups
User Groups allow you to manage access to specific records with Risk Cloud. This forthcoming feature will allow you to automate the membership of a group so that it is always up to date by connecting the group to a Risk Cloud Role. Learn more about User Groups.
6. Automate record-level access
Rather than requiring your users to understand when a record is sensitive and correctly apply a user group to the record, this forthcoming feature will allow administrators to choose a field on the record that automatically adds the relevant user group to the record.
7. Track and audit access
While automating access end-to-end within Risk Cloud takes care of daily maintenance, you may want to double check that your permissions and access are configured correctly or you may even need to provide evidence for an access audit. Risk Cloud has you covered with the ability to export User Groups and Permission Sets for verification. The ability to export Roles and Build Access are coming soon.
Comments
0 comments
Article is closed for comments.