Request Actions on Identity Management Systems
When a user submits a request to access to one or more applications, the IDM system might implement one or the entire next possible request actions. o Approve Request The Read more...
When a user submits a request to access to one or more applications, the IDM system might implement one or the entire next possible request actions. o Approve Request The Read more...