LogoLogo
Documentation and Guides
Documentation and Guides
  • ABOUT APONO
    • Why Choose Apono
    • Security and Architecture
    • Glossary
  • GETTING STARTED
    • How Apono Works
    • Getting started
    • Access Discovery
    • Integrating with Apono
  • CONNECTORS AND SECRETS
    • Apono Integration Secret
    • High Availability for Connectors
    • Installing a connector with Docker
    • Manage integrations
    • Manage connectors
  • AWS ENVIRONMENT
    • AWS Overview
    • Apono Connector for AWS
      • Installing a connector on EKS Using Terraform
      • Updating a connector in AWS
      • Installing a connector on AWS ECS using Terraform
    • AWS Integrations
      • Integrate an AWS account or organization
        • Auto Discover AWS RDS Instances
        • AWS Best Practices
      • Amazon Redshift
      • RDS PostgreSQL
      • AWS RDS MySQL
      • Integrate with EKS
      • AWS Lambda Custom Integration
      • EC2 via Systems Manager Agent (SSM)
  • AZURE ENVIRONMENT
    • Apono Connector for Azure
      • Install an Azure connector on ACI using Azure CLI
      • Install an Azure connector on ACI using PowerShell
      • Install an Azure connector on ACI using Terraform
      • Updating a connector in Azure
    • Azure Integrations
      • Integrate with Azure Management Group or Subscription
        • Auto Discover Azure SQL Databases
      • Azure MySQL
      • Azure PostgreSQL
      • Integrate with AKS
  • GCP ENVIRONMENT
    • Apono Connector for GCP
      • Installing a GCP connector on Cloud Run using CLI
      • Installing a GCP connector on GKE using CLI (Helm)
      • Installing a GCP connector on GKE using Terraform
      • Updating a connector in Google Cloud
    • GCP Integrations
      • Integrate a GCP organization or project
      • CloudSQL - MySQL
      • CloudSQL - PostgreSQL
      • Google Cloud Functions
      • Integrate with GKE
      • AlloyDB
  • KUBERNETES ENVIRONMENT
    • Apono Connector for Kubernetes
      • Installing a connector on Kubernetes with AWS permissions
      • Updating a Kubernetes connector
    • Kubernetes Integrations
      • Integrate with Self-Managed Kubernetes
  • ADDITIONAL INTEGRATIONS
    • Databases and Data Repositories
      • Microsoft SQL Server
      • MongoDB
      • MongoDB Atlas
      • MongoDB Atlas Portal
      • MySQL
      • Oracle Database
      • PostgreSQL
      • Redis Cloud (Redislabs)
      • Snowflake
      • Vertica
      • MariaDB
    • Network Management
      • SSH Servers
      • RDP Servers
      • Windows Domain Controller
      • AWS EC2 SSH Servers
      • Azure VM SSH Servers
      • Installing the Apono HTTP Proxy
    • Development Tools
      • GitHub
      • Rancher
    • Identity Providers
      • Okta SCIM
      • Okta Groups
      • Okta SSO for Apono logins
      • Google Workspace (Gsuite)
      • Google Workspace (GSuite) Groups
      • Azure Active Directory (Microsoft Entra ID)
      • Azure Active Directory (Entra ID) Groups
      • Jumpcloud
      • JumpCloud Groups
      • OneLogin
      • OneLogin Group
      • LDAP Groups
      • The Manager Attribute in Access Flows
      • HiBob
      • Ping Identity SSO
    • Incident Response Integrations
      • Opsgenie
      • PagerDuty
      • VictorOps (Splunk On-Call)
      • Zenduty
    • ChatOps Integrations
      • Slack integration
      • Teams integration
      • Backstage Integration
  • WEBHOOK INTEGRATIONS
    • Webhooks Overview
    • Anomaly Webhook
    • Audit Log Webhook
    • Request Webhook
      • Custom Webhooks
      • Communications and Notifications
        • Slack Outbound Webhooks
        • Teams
        • Outlook and Gmail (Using Azure Logic App)
      • ITSM
        • Freshdesk
        • Jira
        • ServiceNow
        • Zendesk
        • Freshservice
        • ServiceDesk Plus
      • Logs and SIEMs
        • Coralogix
        • Datadog
        • Logz.io
        • Grafana
        • New Relic
        • SolarWinds
        • Sumo Logic
        • Cortex
        • Logpoint
        • Splunk
        • Microsoft Sentinel
      • Orchestration and workflow builders
        • Okta Workflows
        • Torq
    • Integration Webhook
    • Webhook Payload References
      • Audit Log Webhook Payload Schema Reference
      • Webhook Payload Schema Reference
    • Manage webhooks
    • Troubleshoot a webhook
    • Manual Webhook
      • ITSM
        • PagerDuty
  • ACCESS FLOWS
    • Access Flows
      • What are Access Flows?
    • Create Access Flows
      • Self Serve Access Flows
      • Automatic Access Flows
      • Access Duration
    • Manage Access Flows
      • Right Sizing
    • Revoke Access
    • Dynamic Access Management
      • Resource and Integration Owners
    • Common Use Cases
      • Ensuring SLA
      • Protecting PII and Customer Data
      • Production Stability and Management
      • Break Glass Protocol
    • Create Bundles
    • Manage Bundles
  • ACCESS REQUESTS AND APPROVALS
    • Slack
      • Requesting Access with Slack
      • Approving Access with Slack
    • Teams
      • Requesting Access with Teams
      • Approving Access with Teams
    • CLI
      • Install and manage the Apono CLI
      • Requesting Access with CLI
    • Web Portal
      • Requesting Access with the Web Portal
      • Approving Access with the Web Portal
      • Reviewing historical requests with the Web Portal
    • Freshservice
    • Favorites
  • Inventory
    • Inventory Overview
    • Inventory
    • Access Scopes
    • Risk Scores
    • Apono Query Language
  • AUDITS AND REPORTS
    • Activity Overview
      • Activity
      • Create Reports
      • Manage Reports
    • Compliance: Audit and Reporting
    • Auditing Access in Apono
    • Admin Audit Log (Syslog)
  • HELP AND DEBUGGING
    • Integration Status Page
    • Troubleshooting Errors
  • ARCHITECTURE AND SECURITY
    • Anomaly Detection
    • Multi-factor Authentication
    • Credentials Rotation Policy
    • Periodic User Cleanup & Deletion
    • End-user Authentication
    • Personal API Tokens
  • User Administration
    • Role-Based Access Control (RBAC) Reference
    • Create Identities
    • Manage Identities
Powered by GitBook
On this page
  • Find an access flow
  • Edit an access flow
  • Duplicate an access flow
  • Deactivate an access flow
  • Delete an access flow

Was this helpful?

Export as PDF
  1. ACCESS FLOWS

Manage Access Flows

Edit, delete, and perform other actions on existing access flows

PreviousAccess DurationNextRight Sizing

Last updated 5 months ago

Was this helpful?

An is an automated, dynamic permissions workflow that allows admins to define access to a set of resources.

The Apono UI enables you to easily manage your :

  • Editing existing access flows to maintain up-to-date access control

  • Duplicating access flow templates for reuse

  • Deactivating access flows

  • Deleting access flows


Find an access flow

Apono offers various ways to search and filter for an access flow. Follow these steps to find an access flow:

The access flow cards display key information related to each access flow:

  • Name

  • Creation date

  • Grantees (Users, Groups, or Shifts)

  • Access targets (Roles, Resources, Integrations, and Bundle names)

  • Status (Active or Inactive)

  • (If applicable) Admin-generated labels\

This information is intended to help you quickly identify specific access flows.

  1. In the search bar, enter the name, grantees, or resource types of an access flow. All access flows with matching keywords appear.

  2. (Optional) Apply one or both of the primary filters.

Filter
Description

Integration

Reveals access flows according to the integrations they manage Follow this step to apply the filter:

  1. From the Integration dropdown menu, select one or more integrations. NOTE: You may enter keywords into the search bar to locate an integration.

Resource Type

Reveals access flows according to the resource types they manage Follow this step to apply the filter:

  1. From the Resource Type dropdown menu, select one or more resource types. NOTE: You may enter keywords into the search bar to locate a resource type.

  1. (Optional) Apply one or more of the secondary filters.

Filter
Description

Approval

Reveals access flows according to their approval type

Follow these steps to apply the filter:

  1. From the More Filters dropdown menu, select Approval. The Approval dropdown menu appears.

  2. Select either Automatic or Manual approval type.

Bundle

Reveals access flows according to their bundles

Follow these steps to apply the filter:

  1. From the More Filters dropdown menu, select Bundle. The Bundle dropdown menu appears.

  2. Select one or more bundles. NOTE: You may enter keywords into the search bar to locate a bundle.

Label

Reveals access flows according to their admin-generated labels

Follow these steps to apply the filter:

  1. From the More Filters dropdown menu, select Label. The Label dropdown menu appears.

  2. Select one or more labels. NOTE: You may enter keywords into the search bar to locate a label.

Status

Reveals access flows according to their status

Follow these steps to apply the filter:

  1. From the More Filters dropdown menu, select Status. The Status dropdown menu appears.

  2. Select either Active or Inactive status.

Trigger Type

Reveals access flows according to their trigger type

Follow these steps to apply the filter:

  1. From the More Filters dropdown menu, select Trigger Type. The Trigger Type dropdown menu appears.

  2. Select either the Self Serve or Automatic trigger type.

NOTE: The icon beside the access flow name indicates the trigger type. A blue icon signifies Self Serve, and a green icon signifies Automatic

After searching and applying filters, only access flows matching the keywords and criteria appear on the Access Flows page.


Edit an access flow

Follow these steps to edit an existing access flow:

  1. In the row of the access flow, click â‹® > Edit. The Edit Access Flow page appears.

  2. Click Save Access Flow. The completion page appears.

  3. Click Done.


Duplicate an access flow

Follow these steps to duplicate an access flow:

  1. In the row of the access flow, click â‹® > Duplicate. The duplicate (Copy) flow appears in the Access Flows table.

By default, the duplicate will take on the active or inactive status of the original access flow.


Deactivate an access flow

Deactivating an access flow changes its status to inactive and stops it from managing access to its specified resources. However, deactivating an access flow does not result in deletion. The template remains in the Access Flows page.

Follow these steps to deactivate an access flow:

  1. In the row of the access flow, toggle OFF the access flow to deactivate it. A green success panel appears to indicate the deactivation.


Delete an access flow

Deleting an access flow performs two tasks:

  • Stops the access flow from managing access to its specified resources

  • Removes the access flow template from the Access Flows page

Follow these steps to delete an Access Flow:

  1. In the row of the access flow, click â‹® > Delete. A deletion warning prompt appears.

  2. Click Yes. The access flow is deleted.

From the left navigation, click . The Access Flows page appears with each existing access flow in its own card.

On the page, .

In your desired fields, .

On the page, .

On the page, .

On the page, .

Access Flows
create new access flow guidelines
Access Flows
find an access flow
Access Flows
find an access flow
Access Flows
find an access flow
Access Flows
find an access flow
access flow
access flows
Finding an access flow
Editing an access flow
Duplicating an access flow
Deactivating an access flow
Deleting an access flow