Workflow for Provisioning Requests
Provisioning uses workflows to automate token deployment. A workflow defines the number of steps or work tasks required for each type of user provisioning request. The users and administrators who perform tasks in a workflow are called workflow participants.
The following table lists the types of workflow participants and the tasks they can perform.
Workflow Participant | Tasks |
User | From the Self-Service Console, the user initiates a request that starts a workflow. The types of user requests are:
|
Request Approver | From the Security Console, the Request Approver:
|
Token Distributor | From the Security Console, the distributor:
|
Assigning Administrative Roles
If you use workflows for provisioning requests, you need to assign the Token Administrator, Request Approver, and Token Distributor Administrator roles. For more information about administrative roles in provisioning, see Administrative Roles in Provisioning. For instructions, see Assign an Administrative Role.
Related Concepts
Related Articles
Using E-mail Notifications for Provisioning Requests 40Number of Views Workflows stuck in AFX fulfillment and/or Provisioning nodes in RSA Identity Governance & Lifecycle 505Number of Views Change Requests stuck in the AFX Fulfillment Handler Workflow Node and Workflows Stalled in RSA Identity Governance & Life… 1.04KNumber of Views Provisioning Termination rule is not generating change requests to disable accounts in RSA Identity Governance and Lifecycle 125Number of Views Change requests get randomly cancelled and add unrelated activities or continue to provision in RSA Identity Governance & … 554Number of Views
Trending Articles
Troubleshooting RSA SecurID Access Identity Router to RSA Authentication Manager test connection failures RSA SecurID Software Token 5.0.2 Downloads for Microsoft Windows RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Governance & Lifecycle 8.0.0 Administrators Guide Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory