Skip to main content

Overview of No Code Flows

EmpowerID's No Code Flows provides a way to automate complex business processes without the need for traditional coding. This system helps administrators design, manage, and enhance intricate workflows securely and efficiently. The system has a component-based architecture with predefined elements to connect different stages of a business process. This approach eliminates the coding barrier associated with traditional workflow management.

Listen to an Audio Overview

Core Concepts

EmpowerID’s No Code Flows framework is designed to automate business processes by seamlessly integrating Flow Events, Flow Items, Flow Definitions, and Flow Policies. These components work together to define how events are triggered, what actions should be taken, and how workflows are structured and executed. Learn more by clicking each tab below.

Flow Events are the starting point of any workflow. They act as triggers that initiate a business process. For instance, a Flow Event could be a new employee joining the organization, triggering a series of onboarding tasks.

When an event is triggered, it is directed to the Flow Event Inbox, which holds events until they are processed. Examples of Flow Events include:

  • Mailbox Discovered – A new mailbox is detected, requiring actions such as verification, adding it to distribution lists, or configuring access controls.
  • Account Takeover – Indicates potential unauthorized access, prompting actions such as account suspension, security team notifications, and further investigation.
  • Person Leaver – Triggered when someone leaves the organization, requiring actions like disabling accounts, updating group memberships, and revoking access.

EmpowerID includes several predefined Flow Events. Below is a list of selected Flow Events with descriptions to provide more insight into their functionality.


View Default Flow Events
Flow EventDescription
Primary Business Role Location Changed AutomaticallyPrimary Business Role Location Changed based on Directory Data and RBAC Mappings, by the Role and Location Compiler/Processor Jobs.
Secondary Business Role Location Added AutomaticallySecondary Business Role Location Added based on Directory Data and RBAC Mappings, by the Role and Location Compiler/Processor Jobs.
Primary Business Role Location Reverted TO DEFAULT AutomaticallyPrimary Business Role Location Reverted TO DEFAULT due to lack of Directory Data or RBAC Mappings, by the Role and Location Compiler/Processor Jobs.
Person LeaverPerson Termination or Planned Leaver.
Person MoverPerson Mover Lifecycle Event.
Person JoinerPerson Joiner/Onboard Lifecycle Event.
Possible Account TakeoverPossible Account Takeover - possibly an account has been compromised.
Mailbox DiscoveredNew mailbox detected event.
Account Inbox Person ProvisionPerson provisioned from Account Inbox process.
Person Inbox JoinerPerson Inbox Joiner.
Person RehireRehire Person.
Person ReactivationCancellation of planned leaver event or Person reactivation after disablement.
Person Preleaver NotificationNotification about upcoming leaver event.
Secondary Business Role Location Removed AutomaticallySecondary Business Role Location Removed based on Directory Data and RBAC Mappings, by the Role and Location Compiler/Processor Jobs.

Additional Concepts

Beyond Flow Events, Flow Items, Flow Definitions, and Flow Policies, the No Code Flows framework also includes key concepts that govern how requests are initiated, processed, and fulfilled.

A Business Request is generated when an event triggers a Flow Definition. It represents a formal request to execute the actions defined in the definition.

A Typical No Code Flow Execution Process

The Flow execution process in a No Code Flow involves the following steps. A graphical representation of the process follows the steps.

  1. The flow initiates with an event, such as Person Mover.

  2. The event is added to the Event Inbox.

  3. The applicable policies determine the flows that need to be run. These flows are then added to the Flow Inbox.

  4. Once in the Flow Inbox, each flow awaits processing.

  5. Upon processing, each flow creates a Business Request. This request consists of multiple Business Request Items, which are individual tasks to be performed.

  6. Each Business Request Item represents an action to be performed. This could range from adding the resource to a group to disabling the resource.

  7. The sequence and timing of the Business Request Items are managed through the Flow Definition.

  8. Items requiring human approval are sent for approval.

  9. Upon human or system automated approval, each Business Request Item is sent to the Business Request Fulfillment Engine, which executes the tasks, fulfilling the requests.

    A typical no code flow

Seamless Automation with No Code Flows

EmpowerID’s No Code Flows framework enables organizations to automate and orchestrate business processes efficiently by integrating Flow Events, Flow Items, Flow Definitions, and Flow Policies into a unified system.

Flow Events act as the initial triggers, capturing key business scenarios such as employee onboarding or account deactivation. These events drive Flow Definitions, which outline the sequence of Flow Items—specific actions like disabling accounts or modifying permissions—that must be executed in response.

At the core of this orchestration are Flow Policies, which define the overarching rules that govern process execution. Flow Policies determine which Flow Definitions should be triggered in response to a given Flow Event, allowing for customization based on organizational requirements. By configuring multiple policies for different scenarios—such as handling internal employee departures versus external consultant contract terminations—organizations can tailor automated workflows to align with their security, compliance, and operational policies.

This modular and scalable approach ensures that every business event is processed consistently and efficiently, reducing manual intervention while maintaining flexibility. By leveraging these interconnected components, organizations can construct custom workflows that adapt to evolving business needs, reinforcing the principles of automation, security, and process optimization.