Sarah got promoted last month. She was a Sales Development Rep; now she’s an Account Executive. Different team, different manager, different tools, different access needs. HR updated her title in Workday. The change synced to Okta. Her email signature got updated. Her LinkedIn shows the new role. But here’s what didn’t happen:Documentation Index
Fetch the complete documentation index at: https://docs.provisionr.io/llms.txt
Use this file to discover all available pages before exploring further.
- Nobody removed her from the SDR Slack channels
- Nobody removed her from the SDR Google Groups
- Nobody removed her access to the SDR-specific Salesforce dashboards
- Nobody added her to the AE Slack channels
- Nobody added her to the AE Google Groups
- Nobody added her to the AE-specific tools
The Forgotten Middle: Joiners, Movers, Leavers
Identity lifecycle management focuses on three stages: Joiners (onboarding), Movers (role changes), and Leavers (offboarding). Most organizations have reasonable processes for two of these and completely neglect the third.Joiners get attention
They’re visible. Someone new shows up. They need access. If they don’t get it, they complain. A natural forcing function exists.
Leavers get attention
The stakes are obvious. Someone leaves the company. Their access must be revoked. Security audits specifically look for terminated employees with active accounts. Compliance pressure is direct.
The Dual Problem: Old Access and Missing Access
When someone changes roles, two things should happen and usually don’t:Old access should be removed
The SDR doesn’t need SDR tools anymore. Keeping that access violates least privilege. It’s a compliance risk. It’s a security risk if credentials are compromised. But removing access requires someone to know what to remove and actually do it.
Why Movers Are Harder Than Joiners
With a new hire, the starting point is zero. Whatever access they get is being added. The checklist, flawed as it is, covers “what to add.” With a mover, the starting point is their existing state. IT teams need to know:- What access does this person currently have?
- What access should they have in their new role?
- What’s the delta—what needs to be added and what needs to be removed?
Access Accumulation: The Creeping Risk
Consider someone who’s been at an organization for five years and changed roles three times:- Year 1: Joined as Support Analyst. Got Support access.
- Year 2: Moved to Support Team Lead. Kept Support access, added Team Lead access.
- Year 3: Moved to Operations Manager. Kept everything, added Operations access.
- Year 4: Moved to IT Systems Administrator. Kept everything, added IT Admin access.
- Year 5: Current state—has Support + Team Lead + Operations + IT Admin access.
The Manual Solutions Don’t Scale
Organizations try to solve the mover problem through manual processes:Role change checklists
Like onboarding checklists, but for transitions. Same problems—always out of date, require manual effort, don’t cover edge cases.
Manager responsibility
“When an employee changes roles, review their access.” Managers don’t have visibility into what access exists. They don’t have time. They approve requests; they don’t audit existing access.
Annual access reviews
Once a year, ask managers to certify their employees’ access is appropriate. Managers rubber-stamp because the lists are too long and the context is missing. Real issues don’t surface.
Policy-Based Movers: Automatic Recalculation
Here’s how policy-based access handles movers differently: Instead of “run a checklist when someone changes roles,” the system continuously evaluates “does this person’s current attributes match this Ruleset’s conditions?” When Sarah’s title changed from “Sales Development Rep” to “Account Executive,” her attributes changed in the directory. The policy engine re-evaluates every Ruleset she’s attached to: SDR Team Ruleset: Condition istitle contains "Sales Development". Sarah no longer matches. She’s marked for removal from SDR resources.
AE Team Ruleset: Condition is title contains "Account Executive". Sarah now matches. She’s marked for addition to AE resources.
No checklist. No manual review. No ticket. The system recalculates membership based on current attributes and adjusts access accordingly.
This happens automatically, on the next sync cycle, for every system governed by policy. Sarah’s access reflects her current role, not her historical accumulation of roles.
Graceful Deprecation: Avoiding the “Oops” Problem
Immediate access revocation on role change can cause problems. What if the attribute change was a mistake? What if there’s a transition period? What if Sarah is still wrapping up SDR work for another week? This is why a good policy engine supports graceful deprecation—a configurable period between “no longer qualifies” and “actually removed.” Here’s how it works:- Sarah’s attributes change. She no longer matches the SDR Ruleset conditions.
- Instead of immediate removal, her membership is set to
expires_at= 30 days from now. - For the next 30 days, she still has access—but it’s flagged as expiring.
- IT can review expiring access and either accelerate removal (it’s correct, remove now) or extend it (she needs more transition time).
- After 30 days, if no action is taken, access is automatically removed.
What Movers Look Like with Policy-Based Access
Let’s replay Sarah’s promotion with policy-based access: Day 0: HR updates Sarah’s title from “Sales Development Rep” to “Account Executive” in Workday. Day 0 + sync cycle: The change flows to Okta. Provisionr’s directory sync picks up the attribute change. Rulesets are re-evaluated. Automatic results:- Sarah no longer matches SDR Rulesets → memberships flagged for deprecation
- Sarah now matches AE Rulesets → memberships added
- Downstream syncs update Google Groups, Slack, GitLab, Okta apps
The Manager’s View
With policy-based movers, managers finally have visibility they’ve never had. When someone on their team changes roles, they can see:- What access the person is losing (and when it will be removed)
- What access the person is gaining (already provisioned or pending)
- Any discrepancies between expected and actual access
Closing the Mover Gap
Movers are the forgotten middle of identity lifecycle. They create silent risk through access accumulation. They burden IT with preventable access requests. They frustrate employees who can’t get what they need for their new role. The solution isn’t better checklists or more frequent audits. The solution is policy-based access that recalculates membership when attributes change. When access policies are defined as “who should have this based on their current role,” movers handle themselves. The system adapts to reality. Humans provide oversight, not manual execution. Organizations can stop scrambling every time someone changes teams. Let the policy engine do what it’s designed to do.Next up: a specific case study of where role changes create the most chaos. It’s the sales team. Frequent reorgs, territory changes, and title shuffles make sales access management uniquely challenging—and a perfect test case for policy-based automation.
Ready to solve the mover problem? Learn how graceful deprecation works in Provisionr