Access requests

Request to grant or revoke access for a single identity or group of identities.

Flexible request process

Automate, simplify, and customize every step of granting access, from approval to implementation. With PASK, you can create unique application scenarios—from simple, single-step paths for low-risk resources to complex, multi-step processes involving, for example, management or the security department.

A tailor-made acceptance and implementation process

Configure application workflows to match your procedures. Create multi-step approval and fulfillment paths, require full compliance at key stages, and securely manage access limits. Once approved, the system will automatically assign permissions or delegate the task for manual processing.

Acceptance by email

Make decisions with a single click, without logging in. Acceptors respond immediately via email, reducing application processing time and expediting access granting.

Substitutions

Maintain continuous approvals even in the absence of key individuals. Requests don't get stuck, decisions are made in a timely manner, and every approval is clearly recorded - with information about who made it, when, and why.

Automatic expiration of privileges

The system automatically monitors the timeliness of access requests and revokes them when they are no longer needed. It relieves users of manual control, supports effective offboarding, ensures compliance with security policies, and limits the number of redundant accesses.

FAQ

Can I set timed access?

Are reports and application history available?

Can I submit an application for an entire group of users?

What happens when the accepting person is absent?

Can I automate the granting of permissions to new employees (Onboarding)?