EmpowerID Admin Lab 17: Configuring Approval Flow and Access Request Policies
Purpose
This lab guides you through configuring a multi-step approval flow in EmpowerID. You’ll build an escalation policy, create an approval step involving a security oversight team, configure an approval flow with multiple levels of review, and tie it all together with an access request policy. You'll then make a group requestable under this policy and walk through submitting, approving, and fulfilling the request with a time-limited membership.
Prerequisites
- Access to the EmpowerID training environment.
- Familiarity with approval steps, policies, escalation handling, and access requests.
- At least one Active Directory group available for configuration.
Steps
1. Create a Management Role for the Security Oversight Team
This role will serve as the approver group for one of the approval steps.
- Navigate to Role Management > Management Roles.
- Click to run the Onboard Management Role workflow.
- Enter the following information:
- Name:
Security Oversight Team
- Location: Temporary
- Responsible Party: Yourself
- Mark as Requestable in IAM Shop: Enabled
- Access Request Policy: Default Access Request Policy
- Name:
- Click Next, skip any group assignments or permanent members, and submit the workflow.
- After creation, open the role and go to the Members tab. Add yourself so you can participate in approvals later.
2. Create an Escalation Policy
This policy defines what happens if an approver doesn’t respond promptly.
- Go to Low Code / No Code Workflows > Approval Policies > Escalation Policies.
- Click + to create a new policy named
Frequent Escalation
. - Add escalation steps:
- Day 1:
Notify Approvers Day 1
– sends a reminder. - Day 2:
Notify Approvers Day 2
– sends a second reminder. - Day 3:
Reject on Close
– auto-rejects the request if no decision has been made.
- Day 1:
- Save the escalation policy.
3. Create the Security Oversight Approval Step
- Navigate to Approval Policies > Approval Steps.
- Click + to create a new approval step:
- Name:
Security Oversight Approval
- Escalation Policy:
Frequent Escalation
- Name:
- Set the Approver Resolver Rule to
Static Approver by Management Role
. - Assign the Security Oversight Team role as the approver.
- Set a Fallback Approver—such as
Lab Admin
—in case the primary approvers are unavailable. - Save the step and click Publish so it’s available to use in an approval flow.
4. Create the Approval Flow Policy
Now you’ll define the full approval chain.
- Navigate to Approval Policies > Approval Flow Policies.
- Click + to create a new policy:
- Name:
Line Manager - Security Oversight - Owner Approval
- Name:
- Save and reopen the policy to add steps.
- Add the following in order:
- Step 1: Line Manager Approval
- Step 2: Security Oversight Approval (your new custom step)
- Step 3: Resource Owner Approval
- Leave all conditional logic as
Send for Approval
for each step. - Save and Publish the approval flow policy.
5. Create the Access Request Policy
This policy defines how users can request access and how approvals are handled.
- Go to Access Request Policies.
- Create a new policy:
- Name:
Security Oversight Approval Required
- Selectable in UI: Yes
- Approval Flow Policy: Line Manager - Security Oversight - Owner Approval
- Default Duration: 2880 minutes (48 hours)
- Maximum Duration: 2880 minutes
- Allow Duration Selection: No
- Name:
- Save the policy.
If saving fails, check that your approval flow and steps are properly published.
6. Assign the Access Request Policy to a Group
You’ll now make the Executive Reports
group requestable with the new policy.
- Navigate to Identity Administration > Groups.
- Locate the
Executive Reports
group under theRestricted Groups
OU. - Assign the following:
- Access Request Policy:
Security Oversight Approval Required
- Responsible Party: Yourself (you’ll approve ownership requests)
- Publish in IAM Shop: Enabled
- Description: Brief explanation of the group’s purpose
- Access Request Policy:
- Go to the Advanced > Eligibility tab:
- Type: Eligible
- Assignee Type: Business Role and Location
- Assignment: All Employee Roles in All Business Locations
- Save your changes.
7. Test the Approval Flow via IAM Shop
- Open IAM Shop > Shop for Access.
- Confirm the
Executive Reports
group appears. - Click Shop for Someone Else, and choose Susan Cabrera.
- Add the
Executive Reports
group to the cart. - Submit the request.
Approval Testing and Fulfillment
- Go to Business Requests to monitor the submitted request.
- You should see all three approval steps in the flow:
- Line Manager Approval
- Security Oversight Approval
- Resource Owner Approval
- If needed, assign yourself as Susan's temporary Line Manager to proceed.
- Approve each step:
- Approve as Line Manager
- Approve as Security Oversight Team member
- Approve as Resource Owner
- Once all steps are approved, monitor the Fulfillment Status.
- Navigate to the
Executive Reports
group:- Confirm Susan Cabrera has been added as a member.
- Check the RBAC Assignment tab and confirm the 48-hour membership limit is shown with the clock icon.
Notes
- Approval steps must be Published to be used in policies.
- Escalation policies ensure timely decisions and can enforce automated outcomes if no action is taken.
- Time-constrained access is ideal for sensitive or temporary group memberships.
Completion
Once all approval steps are completed and the group membership is applied with the defined time constraint, this lab is complete. You can now explore advanced approval scenarios or move on to the next EmpowerID lab to continue your learning.