Learn about IGA/IAM concepts including birthright access, JIT access, and the employee lifecycle
Access request patterns
Organizations typically manage two types of access during the employee lifecycle: Birthright access is handled by your identity provider (Okta, Google Workspace) using group rules based on employee attributes like department or role. This access is applied automatically as attributes change. Just-in-time (JIT) access is handled by Ravenna for ad hoc requests, project-based needs, and exceptions that require approval. This guide focuses on setting up JIT access request workflows.Before you begin
You need:- Applications configured with access levels in Settings > Applications
- Identity provider integration (Okta or Google Workspace) for automated provisioning
- Understanding of your approval policies and who should approve different access levels
Learn about applications and access level configuration
Step 1: Create an access request form
Create a dedicated form for application access requests that users will submit.Add Application Select field
Add an Application Select field. This allows users to choose which application they need access to from your application catalog.
Add Access Level Select field
Add an Access Level Select field. This field dynamically shows the access levels available for whichever application the user selects.
Add supporting fields
Add fields like:
- Business Justification (text area) - Required field for users to explain why they need access
- Duration (select or text) - Optional field if access should be time-limited
- Manager Approval (yes/no) - If you want to track whether the requester’s manager approves
The Access Level Select field is dependent on the Application Select field. It will only show access levels for the application the user selects.
Step 2: Create an approval workflow
Build a workflow that triggers when users submit the access request form and routes the request to appropriate approvers based on the application and access level.Create the workflow
Create new workflow
Go to Workflows and click New > Workflow. Name it “Application Access Approval” or similar.
Choose your routing approach
You can route access requests using one of two approaches:- Single workflow with branching
- Separate workflows per application
Use one workflow with conditional branches for different applications. This approach centralizes your access request logic.When to use:
- You want centralized control over access request routing
- Applications have similar approval patterns
- You prefer maintaining one workflow
Add approval actions
For each application or access level branch, configure approval actions:Add approvers
Use the Add Ticket Approvers action to assign approvers. You can:
- Assign specific users (e.g., IT Security Team)
- Assign groups (e.g., Engineering Managers)
- Use dynamic approvers (e.g., requester’s manager)
- Set assignment strategy (All, Round Robin, or Auto)
Wait for approval
Add a Wait for Approval action. The workflow pauses here until an approver approves or declines the request.
Learn about assignment strategies for different approval patterns
Step 3: Add provisioning actions
After approval, automatically provision access by adding users to the appropriate groups in your identity provider.Okta provisioning
Add conditional for approved requests
Ensure provisioning only happens for approved requests by checking the approval status.
Add users to Okta group
Use the Add Users to Okta Group action. Select:
- User: The requester (from ticket data)
- Group: The Okta group mapped to the access level
Google Workspace provisioning
Add users to Google Group
Use the Add Users to Google Group action. Select:
- User: The requester (from ticket data)
- Group: The Google Group mapped to the access level
Step 4: Test your workflow
Test the complete access request flow before deploying to users.Verify routing
Check that the ticket was created and routed to the correct approvers based on your workflow logic.
Verify provisioning
Check that the user was added to the correct group in your identity provider after approval.
Step 5: Deploy to users
Make the access request form available to users in your organization.Add form to channel
Add the access request form to your support channel or help desk so users can easily find and submit requests.