Let's Get
Started
Let us show you how Omada can enable your business.
In Identity Governance and Administration (IGA), a Certification Campaign refers to the systematic process that organizations use to ensure user access rights and permissions are accurate, appropriate, and aligned with business policies and compliance requirements across systems, applications, and data resources. The principal purpose of using Certification Campaigns is to regularly validate who has access to what resources and why. This enables an organization to prevent unauthorized access to sensitive assets, ensure compliance with regulatory requirements, reduce security risks, and maintain an audit trail for accountability purposes.
The campaign typically involves managers, application owners, or compliance officers reviewing user access rights to ensure they are aligned with their job roles and responsibilities.
Modern IGA solutions automate the initiation, tracking, and reporting of Certification Campaigns. Campaigns can be triggered on a schedule (e.g., quarterly or annually) or in response to specific events (e.g., an employee leaving or changing roles).
The campaign checks whether users have the correct role-based access and identifies over-provisioning or unused privileges. Many organizations use Role-Based Access Control (RBAC), a method that restricts users’ access to resources based on the roles assigned to them within an organization. Rather than assigning permissions to individual users, permissions are grouped by role, and users are assigned to roles that determine what actions they can perform and which resources they can access within an IT infrastructure.
Helps organizations comply with regulations such as Sarbanes-Oxley (SOX), General Data Protection Regulation (GDPR), Health Insurance Portability and Accountability Act (HIPAA), and others by providing auditable access reviews.
Identifies potential risks from excessive access or orphaned accounts (accounts that are active but no longer associated with any user).
Provides a detailed view of access across all systems, enabling informed decisions about approvals, revocations, or modifications.
Scheduled reviews (e.g., quarterly or annually) where managers validate user access rights.
Triggered by events such as an employee’s departure, role change, or a new regulatory requirement.
Focused on specific high-risk systems, users, or roles.
Managers review and certify the access rights of their direct reports.
Application or data owners validate who has access to their resources and ensure appropriateness.
An administrator defines the purpose of the campaign including what data is to be certified, who should certify it, and how often the survey should run in the IGA system. The administrator also inputs what should happen when responses are submitted or when answers are not given as well as the notifications and reminders that should be sent and determines who can monitor and manage the campaign. Once the administrator has set up the campaign, a test can be run in the IGA system and, if necessary, perform any modifications.
A survey administrator initiates and assigns surveys to relevant managers or system owners. Administration includes determining when the survey should start, monitoring the progress, reassigning questions if requested to do so by the respondent, generating and sending reports to stakeholders, and closing the survey.
After a campaign has been initiated by the survey administrator, all the questions are assigned to individuals, so responses can be given. Questions that cannot be assigned automatically are manually assigned by the survey administrator. A task is sent to the responder, so they can answer the campaign questions.
Reviewers approve, revoke, or request changes to access rights. If a reviewing manager determines that access rights are not appropriate, then they should be removed from the user to maintain high levels of security and governance. When an employee or contractor leaves the organization and their identity is deleted, the organization must transfer the ownership of objects to another human identity. This process automatically starts a workflow, which allows resource owners to propose new owners, who can then accept or reject the proposal.
To ensure compliance, all accounts have an owner assigned to them. The account ownership process allows for both the manual proposing of new owners for the orphaned account and for the start of deprovisioning activities in cases where the orphaned account is no longer required, because the owner has left the organization. If the rules in the IGA system cannot identify an owner from an orphaned account, then a new owner must be assigned manually. Once the process is complete, the orphaned accounts will either have new owners or will be deleted.
The campaign results are documented and stored for auditing and compliance purposes. Audit trail functionality provides accountability by enabling auditors to gain insight into why access exists, who authorized it, and how that access originated.
Reduces the risk of insider threats or data breaches by ensuring access rights are limited to what’s necessary.
Simplifies audits and ensures adherence to laws and standards.
Automates repetitive tasks and reduces manual errors.
Ensures clear ownership and responsibility for access decisions.
To ensure ongoing security and compliance, it is necessary for organizations to regularly verify that information such as access rights, policies, role definitions, and master data held in an IGA system is still valid.
To succeed, the Certification Campaign process that an organization uses must be as simple and efficient as possible, so other stakeholders do not see it as an unnecessary obstacle to business workflows.
Omada has developed and defined best practices for creating a Certification Campaign process in IdentityPROCESS+. Following IdentityPROCESS+ enables organizations to create effective Certification Campaigns that ensure access rights are aligned with business policies and compliance requirements and do not violate any security and compliance policies. Learn more.
Let us show you how Omada can enable your business.