Saviynt

Saviynt

Saviynt

Securely Accelerate Your Digital Transformation With Savinyt

Securely Accelerate Your Digital Transformation With Saviynt

Our Identity and Access Governance solution, Saviynt, is meticulously engineered for enterprise needs, exclusively operating in the cloud for optimal efficiency. Our platform empowers organizations to consolidate diverse identity, role, and group definitions across on-premise, hybrid, and cloud infrastructures, establishing a unified, authoritative identity foundation. BLS 360 Saviynt enables enterprises to fortify applications, data, and infrastructure through a cohesive platform designed specifically for cloud environments, ensuring robust security and streamlined management.

Our Identity and Access Governance solution, Saviynt, is meticulously engineered for enterprise needs, exclusively operating in the cloud for optimal efficiency. Our platform empowers organizations to consolidate diverse identity, role, and group definitions across on-premise, hybrid, and cloud infrastructures, establishing a unified, authoritative identity foundation. BLS 360 Saviynt enables enterprises to fortify applications, data, and infrastructure through a cohesive platform designed specifically for cloud environments, ensuring robust security and streamlined management.

Saviynt Provisioning

Saviynt Provisioning

Saviynt Provisioning

Provisioning in Saviynt is a key capability that ensures access is granted or revoked following an approved request. It enables organizations to handle access changes efficiently through manual, automated, or instant provisioning methods. These options allow for flexibility based on application sensitivity and operational urgency. With streamlined task creation and visibility via the user interface, EIC helps maintain governance and compliance. Proper configuration of provisioning settings ensures alignment with enterprise policies and workflows.


EIC’s provisioning functionality offers a secure and efficient way to manage access across integrated applications. Whether tasks are fulfilled manually or automatically, the system ensures that all actions are traceable and compliant. Configuration at the security system, endpoint, and global levels enables tailored provisioning strategies. With features like Pending and Completed Tasks, users and administrators gain clear visibility into access fulfilment. This comprehensive approach enhances operational control, reduces risk, and supports business agility.


When a request is successfully approved using the request approval process in Enterprise Identity Cloud (EIC), it signifies that the request is approved for provisioning/ deprovisioning within the application. EIC creates tasks for those requests and enables organizations to fulfill (complete) them using Access Requests. These tasks can be completed using the Pending Tasks tile on the Home page. The completed tasks can be viewed using the Completed Tasks tile on the Home page.

Types of provisioning (granting or removing access)

Types of provisioning (granting or removing access)

Types of provisioning (granting or removing access)

Manual Provisioning

•Tasks are created after a request is approved. •A user (like an IT admin) needs to manually complete these tasks. •Tasks can be seen on the Home page under the "Pending Tasks" tile.

Automated Provisioning

Instant Provisioning

Manual Provisioning

•Tasks are created after a request is approved. •A user (like an IT admin) needs to manually complete these tasks. •Tasks can be seen on the Home page under the "Pending Tasks" tile.

Automated Provisioning

Instant Provisioning

Manual Provisioning

•Tasks are created after a request is approved. •A user (like an IT admin) needs to manually complete these tasks. •Tasks can be seen on the Home page under the "Pending Tasks" tile.

Automated Provisioning

Instant Provisioning

Provisioning Setup -Security System Detail

Provisioning Setup -Security System Detail

Provisioning is configured at the Security System level, which can group multiple applications. These settings apply to all applications under that system

Provisioning is configured at the Security System level, which can group multiple applications. These settings apply to all applications under that system

Provisioning Setup -Security System Detail

Provisioning is configured at the Security System level, which can group multiple applications. These settings apply to all applications under that system

Steps on the Security System Detail Tab

Steps on the Security System Detail Tab

Steps on the Security System Detail Tab

Decide if tasks should be created for both accounts and entitlements, or only entitlements.

Decide if tasks should be created for both accounts and entitlements, or only entitlements.

Decide if tasks should be created for both accounts and entitlements, or only entitlements.

Provisioning Connection

Provisioning Connection

If using different connections for provisioning and deprovisioning, select the right connection here

If using different connections for provisioning and deprovisioning, select the right connection here

Instant Provisioning

Instant Provisioning

Turn this ON if you want the system to auto-complete tasks without manual effort.

Turn this ON if you want the system to auto-complete tasks without manual effort.

Automated Provisioning

Automated Provisioning

Turn this ON if you want tasks to be provisioned immediately when created (without waiting for jobs)

Turn this ON if you want tasks to be provisioned immediately when created (without waiting for jobs)

Provisioning Threshold

Provisioning Threshold

Set a limit to stop processing tasks if the number of tasks created in a request exceeds this threshold (to avoid overload or mistakes)

Set a limit to stop processing tasks if the number of tasks created in a request exceeds this threshold (to avoid overload or mistakes)

SAV Role Configurations

Global Configurations

SAV Role Configurations

Users onboarded to EIC are assigned SAV roles to define their access to EIC features. SAV roles also enable you to control user permissions for Access Requests features. Ensure that Pending Tasks and Completed Tasks feature accesses are selected on the Feature Access tab to provide the users access to the Tasks features on the Home page.

SAV Role Configurations

Global Configurations

SAV Role Configurations

Users onboarded to EIC are assigned SAV roles to define their access to EIC features. SAV roles also enable you to control user permissions for Access Requests features. Ensure that Pending Tasks and Completed Tasks feature accesses are selected on the Feature Access tab to provide the users access to the Tasks features on the Home page.

SAV Role Configurations

Global Configurations

SAV Role Configurations

Users onboarded to EIC are assigned SAV roles to define their access to EIC features. SAV roles also enable you to control user permissions for Access Requests features. Ensure that Pending Tasks and Completed Tasks feature accesses are selected on the Feature Access tab to provide the users access to the Tasks features on the Home page.

BENEFITS

Simplify Compliance and Maximize Security with Saviynt

Simplify Compliance and Maximize Security with Saviynt

Seamless Integration

Saviynt integrates seamlessly with a wide range of enterprise applications and platforms, ensuring smooth and efficient operations across the organization’s IT ecosystem.

Seamless Integration

Saviynt integrates seamlessly with a wide range of enterprise applications and platforms, ensuring smooth and efficient operations across the organization’s IT ecosystem.

Seamless Integration

Saviynt integrates seamlessly with a wide range of enterprise applications and platforms, ensuring smooth and efficient operations across the organization’s IT ecosystem.

Flexibility

Saviynt’s solutions offer flexibility in deployment options, including on-premises, cloud, and hybrid environments, catering to diverse organizational needs and preferences.

Flexibility

Saviynt’s solutions offer flexibility in deployment options, including on-premises, cloud, and hybrid environments, catering to diverse organizational needs and preferences.

Flexibility

Saviynt’s solutions offer flexibility in deployment options, including on-premises, cloud, and hybrid environments, catering to diverse organizational needs and preferences.

Scalability

Saviynt’s solutions are highly scalable, capable of supporting organizations of all sizes and adapting to growing or changing business needs.

Scalability

Saviynt’s solutions are highly scalable, capable of supporting organizations of all sizes and adapting to growing or changing business needs.

Scalability

Saviynt’s solutions are highly scalable, capable of supporting organizations of all sizes and adapting to growing or changing business needs.

Securely Accelerate Your Digital Transformation With Saviynt

Our Identity and Access Governance solution, Saviynt, is meticulously engineered for enterprise needs, exclusively operating in the cloud for optimal efficiency. Our platform empowers organizations to consolidate diverse identity, role, and group definitions across on-premise, hybrid, and cloud infrastructures, establishing a unified, authoritative identity foundation. BLS 360 Saviynt enables enterprises to fortify applications, data, and infrastructure through a cohesive platform designed specifically for cloud environments, ensuring robust security and streamlined management.