Benefits of JIT Provisioning

Leanr more about JumpCloud's response to COVID-19We’re prepared to help with your COVID-19 response. Learn more.

Just-in-Time (JIT) provisioning is one of the many innovations aimed at simplifying processes in IT administration. Here are some of the benefits JIT provisioning could offer to you and your organization.

Benefits of JIT Provisioning

Some of the key advantages of JIT provisioning are listed below. 

Less Time Onboarding

JIT provisioning is the combination of user provisioning and single sign-on. Using JIT provisioning, an IT admin doesn’t need to manually set up accounts for new users in each individual resource. Instead, the admin just needs to enter the user’s attributes into the identity provider (IdP) and authorize access to applicable resources. Then, an account for the user is automatically created when they first log in to any of their authorized web apps.

Reduces Identity Sprawl

If admins automate the provisioning and SSO process, users are less inclined to create their own accounts. Users usually create their own accounts because they don’t want to go through the process of submitting a help ticket and waiting for it to be addressed. This reduces the amount of shadow IT in an organization, improving security overall by ensuring all accounts are created within the domain. 

Fewer Help Tickets

JIT provisioning helps prevent users from submitting help tickets when they need to be provisioned to an application. There are also fewer password resets because users can leverage the same credentials for access to all of their web apps. Some IdPs even offer a customized user portal where users have one click access to all of their provisioned apps, eliminating the need to navigate the web. Both admins and users can go throughout their day more efficiently as a result.

Group Management

With the right IdP, users can also be provisioned to web applications in groups, which saves admins even more time. Rather than provisioning users with apps (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Megan Anderson. Read the original post at: