DX Grant is an invaluable accelerator with a variety of benefits.
User onboardingA powerful self-registration functionality allows IT Administrators and Product Owners to give approved users the autonomy to access their apps, speeding up the process of onboarding new employees or customers.
User events auditingWhenever a user logs into a product, whether successful or not, these events are recorded in the audit log. This functionality dramatically improves the ability of IT Administrators to provide governance for user access across their application portfolio.
Product OwnershipFlexibility for IT Administrators to specify who owns each application within their portfolio and to re-group applications and modules in a logical manner to give them better granularity when it comes to managing access to digital products.
User SearchA powerful search engine enables IT Administrators and Product Owners to quickly find within the enterprise application portfolio the user accounts they are responsible for managing.
Microsoft Azure AD accounts managementExternal user accounts can be managed via the DX Grant system, unifying and standardising user accounts management throughout the entire organisation, either for internal or external accounts.
Change events auditing Changes to access, roles, permissions, data and passwords also are recorded in the audit log. This provides IT Administrators and Product Owners with prompt insights and helps identify unauthorised operations.
User impersonationAllows designated users to login into an application on behalf of another user, facilitating testing capability and the temporary transfer of responsibilities when a staff member takes leave.
User authorisationEasy configuration of roles and permissions by Product Owners according to set conditions, which prevent users from having incompatible assignments.
DX Grant: How does it work?
IT Administrators can grant permission for Product Owners to own their applications and manage user accounts.
This allows Product Owners to onboard new users, offboard users, and change user roles and permissions.
Access granted by the IT Administrators and Product Owners occurs via a self-registration functionality for approved users.
Product Owners can temporarily assign roles and permissions from one user account to another person. The login impersonation function is helpful for QA testing or when key staff are on leave. And it can be done on any application in a controlled manner.
IT Administrators can track and audit user access activity to investigate issues or review unwanted activity.
IT Administrators and Product Owners can view comprehensive audit logs for each application, which detail logins (who and when) as well as changes to user access, roles and permissions.