Use Cases

1. Delegated Admin - Creating Users

Overview: Delegated administrators can efficiently manage users within UNIFYElevate, allowing them to add new team members and assign appropriate roles without needing full control of the end user application.

Example

Tom, an administrator from a partner company, needs to add new users to their system and ensure they have the correct roles in the end user application to perform their tasks.

Sequence Diagram

sequenceDiagram actor Tom as Delegated Admin participant System as UNIFYElevate System Tom->>System: Create User System-->>Tom: User Created Tom->>System: Assign End User Application Role to User System-->>Tom: Role Assigned

Detailed Steps

  1. Create User: Tom accesses the UNIFYElevate system to add a new user. This involves entering the user’s details such as name, email, and initial access settings.
  2. User Created: The system processes the request and confirms that the new user has been successfully created.
  3. Assign Role to User: Tom then assigns a specific role for an end user application to the newly created user. Roles determine the level of access and permissions the user will have within the end user application.
  4. Role Assigned: The system updates the user’s profile with the assigned role, granting them the necessary permissions to perform their duties in the end user application.

Benefits

  • Efficiency: Delegated admins can quickly add and manage users, reducing wait times and administrative overhead.
  • Security: By assigning specific end user application roles, organizations can ensure users only have access to the resources they need in the end user application, enhancing overall security.
  • Flexibility: The system allows for easy adjustments to user roles as team responsibilities evolve.

2. Delegated Admin - Assigning Roles to Users

Overview: Delegated administrators can assign specific roles to users, ensuring they have the appropriate permissions to carry out their tasks within the end user applications.

Example

Lucy is a team member who needs access to manage tasks in a specific application called TaskMaster. Tom, a delegated administrator, will assign her the ‘Task Admin’ role to enable her to oversee these tasks.

Sequence Diagram

sequenceDiagram actor Tom as Delegated Admin participant System as UNIFYElevate System Tom->>System: Assign 'Task Admin' Role to Lucy System-->>Tom: Role Assigned

Detailed Steps

  1. Identify Role Requirement: Tom identifies that Lucy needs the ‘Task Admin’ role to manage tasks in the TaskMaster application.
  2. Assign Role: Tom accesses the UNIFYElevate system and assigns the ‘Task Admin’ role to Lucy, specifying her new permissions.
  3. Role Assigned Confirmation: The system processes the assignment and confirms that Lucy has been granted the ‘Task Admin’ role.

Benefits

  • Role-Based Access Control: Ensures that users have the appropriate access levels necessary for their responsibilities in end user applications, enhancing security and operational efficiency.
  • Simplified Administration: Delegated admins can easily manage and update user roles without needing full system control, streamlining administrative tasks.
  • Scalability: The system can adapt to organizational changes, allowing for quick role adjustments as team members’ responsibilities evolve.

3. Delegated Admin - Removing Users

Overview: Delegated administrators can efficiently manage user access by removing users who no longer require access to specific applications, ensuring that only authorized personnel have access.

Example

John has moved to another department and no longer needs access to the TaskMaster application. Tom, a delegated administrator, will remove John’s access to ensure security and proper access control.

Sequence Diagram

sequenceDiagram actor Tom as Delegated Admin participant System as UNIFYElevate System Tom->>System: Remove John from TaskMaster System-->>Tom: User Removed

Detailed Steps

  1. Identify Access Removal Requirement: Tom identifies that John no longer needs access to the TaskMaster application due to his department change.
  2. Remove User Access: Tom accesses the UNIFYElevate system and removes John’s access to the TaskMaster application.
  3. Access Removal Confirmation: The system processes the request and confirms that John’s access has been successfully removed.

Benefits

  • Enhanced Security: Ensures that only current and relevant personnel have access to sensitive applications, reducing security risks.
  • Efficient Access Management: Delegated admins can quickly and easily manage user access, saving time and administrative effort.
  • Compliance and Auditability: Maintaining accurate and up-to-date access controls helps ensure compliance with organizational policies and provides a clear audit trail.

4. Service Owner - Monitoring Activity

Overview: Service owners or auditors can monitor the activities of other personnel to ensure compliance and security. This involves reviewing actions taken by delegated administrators and other users within the system.

Example

Jane is responsible for ensuring compliance and security within the organization. She will use the UNIFYElevate system’s reporting mechanism to monitor and review the actions taken by Tom, a delegated administrator.

Sequence Diagram

sequenceDiagram actor Jane as Auditor participant System as UNIFYElevate System Jane->>System: Review Actions Taken by Tom System-->>Jane: Action Report

Detailed Steps

  1. Access Monitoring Tools: Jane accesses the monitoring and reporting tools within the UNIFYElevate system.
  2. Review Actions: Jane reviews the actions taken by Tom, such as user creation, role assignments, and access removals.
  3. Generate Report: The system generates a detailed report of Tom’s activities, providing transparency and accountability.

Benefits

  • Enhanced Oversight: Provides service owners and auditors with the ability to monitor user activities, ensuring that all actions are compliant with organizational policies.
  • Improved Security: Continuous monitoring helps to quickly identify and address any unauthorized or suspicious activities.
  • Accountability: Detailed reports ensure that all actions are tracked and documented, providing a clear audit trail for compliance purposes.

5. Service Owner - Creating Delegated Admins

Overview: Service owners can create delegated administrators to help manage user access and roles within the ecosystem. This allows for efficient delegation of administrative responsibilities.

Example

Sarah, a service owner, needs to assign administrative responsibilities to Tom from GlobalTech. She will use the UNIFYElevate system to create Tom as a delegated admin and assign him a specific scope of responsibility, enabling him to manage user access for his team.

Sequence Diagram

sequenceDiagram actor Sarah as Service Owner participant System as UNIFYElevate System Sarah->>System: Create Delegated Admin Tom System-->>Sarah: Delegated Admin Created Sarah->>System: Assign Admin Scope to Tom System-->>Sarah: Admin Scope Assigned

Detailed Steps

  1. Identify Need for Delegated Admin: Sarah determines that Tom needs delegated admin rights to manage user access for his team.
  2. Create Delegated Admin: Sarah accesses the UNIFYElevate system and creates Tom as a delegated admin.
  3. Assign Admin Scope: Sarah assigns a specific scope to Tom, defining the applications and user groups he can manage.
  4. Confirmation: The system processes the request and confirms that Tom has been successfully created as a delegated admin with the assigned scope.

Benefits

  • Efficient Administration: Allows service owners to delegate administrative tasks, reducing their workload and ensuring timely management of user access.
  • Scalability: Facilitates the distribution of administrative responsibilities across multiple individuals, improving operational efficiency.
  • Security: Ensures that only authorized personnel have administrative privileges, with clearly defined scopes, enhancing overall security.

Key Takeaways

  • Streamlined User Management: Simplifies the process of managing user accounts and permissions across your community ensuring efficient and secure access control.
  • Role-Based Access Control: Empowers you to assign specific roles and permissions enhancing security and workflow specificity.
  • User-Centric Interface: The intuitive design of our platform ensures a seamless user experience, making administration tasks straightforward and less time-consuming.
  • Robust Auditing and Reporting: Comprehensive reporting tools provide valuable insights into user activities and system changes, enabling better oversight and compliance.
  • Multi-Organizational Collaboration: Facilitates collaboration, allowing for easy management of users across different departments and even between companies.

More questions?

If you have further inquiries, we’re here to help.

Looks good!
Please enter your e-mail address so we can contact you.
Looks good!
Please enter some details about your enquiry.
This form uses Google ReCaptcha to ensure interactions with our site are from legitimate users. Please accept the use of recommended storage before submitting the form. Find out more at the Privacy Center.
Your message has been sent. You should hear from us soon.
Your message could not be sent. Try again later.

You may also be interested in:

UNIFY is the global leader in design and deployment of Microsoft CIAM solutions. From MIIS to Entra, UNIFY remains Microsoft’s trusted partner for quality Cybersecurity, Identity and associated secure collaboration outcomes.
Delegate with Confidence: Secure, Compliant Identity Management.