đĒĒIdentity Centric
The Identity centric is a 2-page section that presents aggregated, cross-platform information about the identities and the access that they have to the environment.
Last updated
The Identity centric is a 2-page section that presents aggregated, cross-platform information about the identities and the access that they have to the environment.
Last updated
For this mode to be unlocked, at least 2 integrations must be connected to Rezonate.
a unified view of all of the Human identities, that exist across the different platforms. Rezonate, through its Authorization graph (Identity Storyline), aggregates the different sub-identities associated with each Identity, into 1 unified entity that has attributes, access path, and Risk.
From this view, it's possible to query and ask questions such as:
Show me all of the users who have access to specific applications
Show me all of the identities who have high privileges in at least one platform
Show me all of the identities who have no HR-related record, or are marked as offboarded.
Selecting an identity we will open a drawer with 3 tabs:
Properties - A summarized information about the identity, including associated emails, names, and other useful information collected across the board. for example -when selecting Michael Scott's identity we will see that he's known by a few names such as Michael Scott, ScottTrexony, and others. We can also see the creation date of the identity and note that he last signed in 3 days ago.
By Clicking the Devices, we can also see all of the Registered Mobile or endpoint devices that he ever used to operate in the environment. clicking on them will show additional information, such as device-state, and serial numbers.
Identity Storyline - A Visual Representation that describes the access that the identity has to the environment, taking into consideration federated access, and tenant configurations. for example, below we can see that Michael has access to a Google Workspace account through Okta and that he has federated access to 5 AWS Accounts, managed through EntraID SSO. we can also that Michael has access to additional products such as GitHub, Snowflake, and others.
By Selecting an item on the graph, we can View his storyline and deep-dive into his access path, or alternatively, we can View entity details to see expanded properties, privileges, and activity information
Security Risks - an aggregated risks & threats view for Michael Scott entities, including their risk-level, status, and ability to drill down for more information.
A unified view of all of the Non-human identities, that exist across the different platforms. Rezonate Aggregate those identities by general type according to the following categories:
Access Keys
Service Accounts
Access Tokens
IAM Roles
By selecting a category we will see the different entities associated with it, including their risk level, number of identities, and associated accounts. by clicking a row we can pivot to the relevant entity page for more information.