Watch Demo
Take Self-Guided TourClear Skye IGA lets employees quickly and easily get the access they need to business applications. Employees don’t need knowledge of in-the-weeds details behind the access, like naming conventions or which roles/entitlements are included in approval workflows.
Behind the scenes, Clear Skye IGA enables application owners to build request-able catalog items, without the need for a developer. This increases productivity by increasing the number of hands that can contribute, and eliminates frustration by accelerating the process. An approval process that ensures alignment to organizational business, security, and compliance requirements ties it all together.
Your end users are already acclimated to using the ServiceNow portal for requests. They use the portal to request a new monitor, or to send a shipment. Why should the user experience be different for requesting access to an IT resource like a new keyboard?
But managing identities and access is much more complicated than a simple shipment request. How can it be so easy for end users? It starts with Points of Access.
A Point of Access can be made up of any number of application roles or entitlements, details, approvals, and more. Unlike most Identity solutions, creating these request-able bundles does not have to involve developers or IT admins.
Clear Skye uses ServiceNow's proven capabilities, common UIs, and common deployment and operations. With Clear Skye IGA, users can simply request, approve, or review access directly through the ServiceNow Portal by using approval workflows customized to your organization’s needs.
Let’s look at how end users request or update access with Clear Skye IGA in ServiceNow:The end user clicks the familiar “Request Something” in ServiceNow.
For your end-users, it could not be any easier. User Access Requests fit perfectly into your existing Portal, Catalog, and process. When users spend less time trying to get access to what they need, they spend more time doing what needs to be done.
With Clear Skye IGA installed, application owners can quickly and easily submit a Point of Access request, which can be made up of any number of application roles or entitlements, details, approvals, and more. Then, your identity and access management team can review submitted Points of Access and approve (or reject) according to your organization’s governance processes.
Once approved, Points of Access will be published automatically to the ServiceNow portal.
Pre-defined templates, which come out of the box and can be modified by the IGA team, help to provide a consistent experience to manage access across applications in your organization.
Application owners can define lower-level permissions, as they are the only ones with the required knowledge about how this application connects with business needs and what access will be required.
Each point of access has a lifecycle and can be created, updated, disabled, or enabled. These lifecycle events are implemented as IGA access request tasks and usually include approvals.
It’s easy to set up predefined standards of approval for access. They can be auto approved or have multiple stages of approval, depending on the risk scenario, and allow organizations to implement standards while accounting for different use cases.
The application owner can then easily choose preconfigured selections that make sense for the business and IT.
The information provided by the application owner helps with the governance process when publishing a new Point of Access to the system, ensuring that proper processes were followed and making it faster and easier for the approver to determine whether the new Point of Access is OK to publish.
An end-user requesting access to something they don’t have the underlying accounts for is a very common occurrence. Clear Skye IGA can automate the work necessary to provision access through the use of Request Variables.
This automation and reusability helps enforce standards and maintain simplicity for users on the front end as your organization changes and grows. Request Variables automate the numerous variations of rules that identity teams need to consider when creating and updating accounts. They act as a rules engine, enforcing organizational standards and IT processes for IGA requests. For example, Request Variables determine how to define and implement the naming convention for an account and in which order rules should be orchestrated. No more first-in, first-out for critical access requests.
Request Variables enable an IGA administrator to configure conditional attributes that may be attached to a request object, and these attributes are then available throughout the access request process, including any child automated activities. While requesting access is straightforward to the end user, IT teams can feel confident in a solid foundation of rules for enforcing every access process that happens within the system. Some rules, like password reset policies, are enforced org-wide, while each AD domain or OU may have its own rules for certain activities and account types.
With the ability to define universal rules, Request Variables can apply to all of your existing systems. New applications also benefit from using these predefined rules, meaning IT need only address the deltas specific to the new application.
Clear Skye IGA Access Request helps you ensure employees have access to the IT resources they need to do their jobs, while making it easier than ever to add (and update) requestable applications.
Leverage ServiceNow, the portal employees already use, without the need for additional training.
Reduce complexity and decrease the burden on your Help Desk.
Make access request approval workflows as fine-grained as you like and align to business processes.
Enable application owners to submit request-able items