Access Request: Security in user provisioning
In growing companies, granting software access becomes a mess. "Unlock Notion for the intern?" Jestor Forms creates a formal flow where the manager requests access, justifies the reason, and IT executes, keeping an audit trail.
Principle of Least Privilege
The form asks:
- Which system?
- Which access level? (Admin / Reader).
- For how long? This avoids giving Admin permission to those who don't need it.
Audit Trail
For certifications (ISO 27001), you need to prove who authorized access. Jestor keeps the log: "Manager approved on the 10th. IT granted on the 11th."
Frequently Asked Questions (FAQ)
Does it work for revoking access? Yes. When an employee changes roles, the manager fills the "Profile Change" form, asking to remove old accesses.
Does Jestor create the user alone? Via API, it is possible to integrate to automatically create the user in modern systems (like Google Workspace or Slack) after approval.
Can it have double approval? Yes. First the Manager approves, then the CISO (Security) approves.
Conclusion
With Jestor Forms, IT ensures data security and license organization.
Control your access:https://jestor.com/forms/