# Revoke Access

A big, often overlooked, part of access management is revoking access; de-provisioning access, removing group membership and deleting orphaned accounts.

Apono helps **automate** this process as part of its access lifecycle:

![](https://files.readme.io/a68f931-Screen_Shot_2023-07-04_at_12.16.02.png)

## Benefits of working with Apono

### Automated grant & revoke

Apono helps automate the entire access lifecycle:

1. The admin defines the access lifetime per app, environment, resource and permission

<figure><img src="https://1094436629-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fv6MBfUGvblSdAz31yJXm%2Fuploads%2Fgit-blob-84df9124c9d51a11099142b7217e61b9aa5686da%2Frevoking-access-1.png?alt=media" alt="" width="375"><figcaption></figcaption></figure>

2. The user requests access with Slack, Teams or CLI
3. According to each [Access Flow](https://docs.apono.io/docs/access-flows/access-flows), access is approved automatically or by approver(s)
4. When the access lifetime ends, Apono revokes the access for you automatically

<figure><img src="https://1094436629-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fv6MBfUGvblSdAz31yJXm%2Fuploads%2Fgit-blob-e4618cf46f01ec06f0e15f964c997bafbe5ebe91%2Frevoking-access-2.png?alt=media" alt="" width="563"><figcaption></figcaption></figure>

5. All requests, approvals, grants and revocations are fully audited

<figure><img src="https://1094436629-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fv6MBfUGvblSdAz31yJXm%2Fuploads%2Fgit-blob-5371685a738730d9dc08a18d2ed1be6b97edfb85%2Frevoking-access-3.png?alt=media" alt="" width="563"><figcaption></figcaption></figure>

{% hint style="success" %}
Congratulations! You just automated the complete access lifecycle, saving time and resources and reducing standing access
{% endhint %}

### Panic button

Apono serves as your central control tower for shut-down - in case of **emergency or incident**, you can revoke all active access directly from Apono:

1. Admins can use the Apono UI to find and revoke all active access\
   ![Revoke active access to S3 buckets with Apono](https://files.readme.io/faa8a77-2023-07-03_16.06.32.gif)
2. Approvers (managers, resource owners, developers on duty, DevOps, DevSecOps, SRE, IAM Ops, CISO or anyone else you want) can revoke access
3. End users can revoke their own access

<figure><img src="https://1094436629-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fv6MBfUGvblSdAz31yJXm%2Fuploads%2Fgit-blob-8061f1259ab3788500126aacfbb8380e46fefd8f%2Frevoking-access-4.png?alt=media" alt="" width="379"><figcaption></figcaption></figure>

### Admin and approver control

With Apono, admins and approvers have full control over who can access what:

1. Admins can define Access Flows with automatic revocation
2. Admins can find all active access and revoke it

<figure><img src="https://1094436629-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fv6MBfUGvblSdAz31yJXm%2Fuploads%2Fgit-blob-67e034d54b5465e507c869c54319c344e26cb572%2Frevoking-access-5.png?alt=media" alt="" width="563"><figcaption></figcaption></figure>

3. Approvers (managers, resource owners, developers on duty, DevOps, DevSecOps, SRE, IAM Ops, CISO or anyone else you want) can revoke all the active access they approved

### Access visibility

It's hard to keep track of all the active access in the organization. Access can be granted in the IdP for users and groups, users can be granted access directly from apps' IAM portals, using roles, permission sets or users (personal or shared).

This causes access drift, shadow admins, orphaned accounts, partial offboarding, and unused access which increases downtime and attack risks.

Apono lets you find out who has access to what in the organization:

**BEFORE**

<figure><img src="https://1094436629-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fv6MBfUGvblSdAz31yJXm%2Fuploads%2Fgit-blob-8f84bc5bbbfede9238620c040e730fde5d47c002%2Frevoking-access-6.png?alt=media" alt="" width="563"><figcaption></figcaption></figure>

Take standing access for users and groups and turn into dynamic, just-in-time, on-demand, temporary access. It's **dynamic, easy to manage and fully audited**.

**AFTER**

![](https://files.readme.io/3e4bc3e-image.png)
