View details of the types of non-human identities in your organization in order to monitor access, permissions, and compliance status.
ImportantThis is a "Pre-release" feature and is not considered an official release. Please
review the Pre-release disclaimer before using the feature.
|
NoteThis feature is not available in all regions.
|
The Non-Human Identities tab in Identity Inventory gives you a centralized view of all of the non-human identities in your organization.
Non-human identities are organized into three types:
-
Groups: A collection of users, devices, service principals, or groups assigned the same security or application access permissions
-
Devices: Endpoints, including desktops, laptops, printers, and mobile devices, that are registered to your identity provider in order to allow single sign-on (SSO) or conditional access
-
Enterprise applications: Applications registered with your identity provider that need to access user and group data or to which you wish to control access