Extend ITSM with Identity Governance
Leverage identity governance processes for access management in the ITSM tool to ensure access governance and compliance
Extend IT Service Management (ITSM) with Identity Governance
An integrated ITSM and identity governance solution streamlines the business services provided by the IT organization, empowers end users, and improves the overall security posture. The combination of an IAM solution that includes identity governance capabilities and ITSM maximizes the investment through a seamless workflow and provides full reporting capabilities for documentation of compliance.
IGA as a Starting Point for Access Management
Leading analysts like Gartner recommends that you use the IAM tool as the preferred starting point for managing access requests, and then leverage the indirect fulfillment processing in ITSM when applicable.
The immediate benefits of integrating the solutions include using the ITSM tool for service desk task management handling manual provisioning and utilizing the IAM tool for access governance of the ITSM tool to fulfill governance and compliance requirements.
ServiceNow and Omada Identity ITSM integration with Omada Identity gives the organization access to the OIS reference architecture that provides functionalities like automatic policy violation checks (e.g. SoD checks), near real-time provisioning of access rights, definition, and implementation of automated access rules and policies.
DO MORE WITH IDENTITY
There are three different types of integration options between Omada Identity and the ITSM system, each covering a different aspect of the domain and use cases. Below are examples of each of these and the associated use cases. The technology offered within the two products allows for rich configuration and adaptation based on requirements.
Governance and administration of ServiceNow accounts and entitlements from within Omada Identity
Indirect provisioning of accounts and entitlements in the ITSM system governed by Omada Identity
Specific integrations from the ITSM system to Omada Identity utilizing the rich set of APIs provided to third party integration