Approval process
Alternative names | Approvals, Policy-based approvals, Approval scheme |
---|---|
Status | supported |
Description
The approval process is a natural part of the access request process. Once a user submits access request, the request is subject to approval by appropriate approvers. In midPoint, the approval process is dynamic and policy-driven. As each role may have its own approval settings and policies, the request may be subdivided to approval by numerous approvers in several approval levels. MidPoint dynamically determines the policy, summarizes approver decisions and applies them to the request. Approved roles are automatically assigned and applied. Approval process is a generic mechanism in midPoint, triggered by policy rules. Apart from the access request process, the approval process can be applied to other scenarios as well, such as approval of role modification.
Documentation
Version | Introduction | Guides | Configuration | Examples | Plans |
---|---|---|---|---|---|
4.9 | Policy-based approvals |
Approval |
Approval examples |
||
Development | Policy-based approvals |
Approval |
Approval examples |
||
4.8 | Policy-based approvals |
Approval |
Approval examples |
Related Features
Compliance
This feature is related to the following compliance frameworks:
-
ISO/IEC 27001 5.2: Information security roles and responsibilities
-
ISO/IEC 27001 5.31: Legal, statutory, regulatory and contractual requirements
-
ISO/IEC 27001 8.19: Installation of software on operational systems
-
ISO/IEC 27001 8.31: Separation of development, test and production environments
-
ISO/IEC 27001 8.34: Protection of information systems during audit testing