LogoLogo
SupportDeveloper Docs
  • Welcome
  • Getting Started
    • Introduction to BalkanID
      • BalkanID Onboarding
      • BalkanID Summary Dashboard
    • Setting Up BalkanID
      • User Role Management
      • Users Entitlements Discovery
      • Employee Data Extraction
      • Application Integration & Entitlement Data Extraction
      • Business Owners for Application Integrations
    • Entitlement Discovery
      • Entitlements Discovery
      • Applications Entitlements Discovery
      • Connection Entitlement Discovery
      • Resource Entitlement Discovery
      • Identities Entitlements Discovery
      • Working with Filters
      • Impact Analysis
    • Access Review Management
      • Access Review Campaigns
      • Performing Access Reviews
      • Campaign dashboard and management
      • Campaign Audit Reporting
      • Access Review Campaign Notifications and Reminders
      • Configuring Integration Specific Multi-Level Review Settings
      • Configuring Multi-Level Review Settings in Campaigns
      • Reviewer Insight Escalation for Campaigns
      • Recurring Campaigns
      • Campaign Escalation
      • Nominate Delegate In Account Preferences
      • Access Review Graphs
      • Access Review Recommendations
    • Access Request Management
      • Creating and Managing Access Requests
        • New User Access Request
        • New Service Account Access Request
        • New Identity Access Request
        • New Connection Access Request
        • New Resource Access Request
        • New SCIM Access Request
    • System Notifications & Automatic Ticket Creation
      • Notification Preferences
      • In-app Notifications
      • Supported Ticketing Systems
    • BalkanID CLI
      • BalkanID Extractor CLI
      • BalkanID API CLI
  • Configurations and Integrations
    • Integrations Overview
    • HRIS Integrations
      • Integrate via Merge
    • Direct Application Integrations
      • Asana Integration Setup
      • Atlassian Confluence Integration Setup
      • Atlassian Jira Application Integration Setup
      • AWS Application Integration Setup
      • AWS Identity Center Integration Setup
      • Bitbucket Integration Setup
      • Box Integration Setup
      • Code Climate Integration SetupPage
      • Datadog Integration Setup
      • Dropbox Integration Setup
      • GitHub Application Integration Setup
      • Gitlab Integration Setup
      • Google Cloud Platform Integration Setup
      • Google Drive Integration Setup Guide
      • Google Workspace Integration Setup
      • Jenkins Integration Setup
      • JumpCloud Integration Setup
      • MariaDB Integration Setup
      • Microsoft Azure and Active Directory (AD) Integration Setup
      • On-Prem Active Directory (AD) Integration Setup
      • Microsoft Office365 Integration Setup
      • MongoDB Integration Setup
      • MySQL Integration Setup
      • Netsuite Application Integration Setup
      • New Relic Integration Setup
      • Okta Application Integration Setup
      • Onelogin Integration Setup
      • OpenVPN Integration Setup
      • Pagerduty Integration Setup
      • Ping Identity Integration SetupPage
      • PostgreSQL Integration Setup
      • Ramp Integration Setup
      • Salesforce Application Integration Setup
      • SAP Integration Setup
      • Sendgrid Integration Setup
      • Sentry Integration Setup
      • Slack Application Integration Setup
      • Smartsheet Integration Setup
      • Snowflake Integration setup
      • Splunk Integration Setup
      • Sumologic Integration Setup
      • Twingate Integration Setup
      • Zoom Integration Setup
    • Manual Uploads
      • Application Entitlement Data
      • Employee Data
      • Mapping Identities to Employees
    • SSO Integrations
      • Ping Identity
      • Okta
      • OneLogin
      • Microsoft
    • Fulfillment Options
    • BalkanID API
  • Playbooks and Webhooks
    • Playbooks Overview
    • Configuring Global Playbooks
    • Configuring Integration Specifc Playbooks
    • Configuring Global Webhooks
    • Configuring Integration Specific Webhooks
    • Automated Employee Data Upload Playbook with AWS Lambda & S3
    • Automated Entitlement Data Upload Playbook with AWS Lambda & S3
  • IAM RISK ANALYZER
    • Findings
    • Current State RBAC
    • IAM Risk & RBAC Analysis Report
  • Insights and Rules
    • Entitlement Rules & Labels
      • Setup Rules and Labels
      • Terminated Employee Label
      • Privileged identity Label
      • Setup privileged identities
    • Entity Insights and Finding Rules
      • Creating entity filters
      • Setup insights using entity filters
      • Setup finding rules using entity filters
  • BalkanID Slackbot
    • Setting up BalkanID Slackbot
    • Access Requests and Access Review Notifications with BalkanID Slackbot
    • Findings (Daily Alert) with BalkanID Slackbot
  • JITPBAC
    • Overview of JITPBAC
    • Purposes
      • Create Purpose
      • Edit Purpose
      • Delete Purpose
      • Filtering Purposes
      • Create User-Purpose Access Request
        • Creating a Request Through the Web App
        • Creating a Request Through the Slackbot
      • Starting & Stopping Assigned Purposes
  • BalkanID Copilot
    • BalkanID Copilot
  • Updates
    • Release Notes
      • Introducing Findings: Prioritize, Act, and Automate Identity Risk Management
      • Action Center as a command hub for identity risk findings
      • Introducing Impact Analysis: Visualize, Understand, and Manage Access
      • In-app Notifications & Notification Preferences
      • Upgrades to RBAC Analyzer
      • Slackbot for Access Requests and Review Notifications
      • Playbooks and Webhooks for enhanced workflow automation
      • Introducing support assistant for BalkanID application for in-app support
      • Scheduling campaigns & multi-level approvals, nomination & delegation of reviews and graph views for
      • Campaign dashboard actions, access reviews by identity, enhanced access requests and entities connec
      • Access Provisioning & Deprovisioning, Email Notifications, Access Reviews & Campaigns Updates and Ne
      • Quickly find what you’re looking for with the new People, Applications, and Identities pages
      • Integrate your HRIS or Identity Provider without exposing sensitive personnel data or powerful admin
      • Quickly find unusual entitlements with Outliers (Early Access)
      • Announcing “Days Since Termination” filter
      • Announcing JumpCloud direct integration
      • Published Access Review Campaigns can now be deleted
      • Easily switch between tenants using the new tenant picker
      • Skip Access Review Campaigns by downloading a PDF report of your Entitlements
      • User account information now available on the Account page
      • Announcing Bulk API (Early Access)
      • Announcing HRIS integration capability with 23 new HRIS integrations
      • Privileged Identity insights help to quickly identify privileged identities
      • Terminated insights help to quickly identify and remediate entitlements held by terminated employees
      • Announcing Azure and Azure Active Directory direct integration
      • Access Review Campaign drafts can now be permanently deleted
  • Terms & Conditions
    • Privacy Policy
    • Terms of Service
    • AI Policy FAQ
    • Trust Center
Powered by GitBook

© 2025 · BalkanID, Inc. | Nothing on the BalkanID website, platform, or services, nor any portion thereof constitutes actual legal or regulatory advice, opinion, or recommendation by BalkanID, Inc.

On this page
  • Introduction
  • Playbooks can do the following
  • Playbooks can be used by 3 kinds of personas
  • Playbooks can be run in either of these ways
  • Playbooks can be executed outside of the tenant application
  • The following articles can walk through configuring and executing playbooks on BalkanID
  • Example Playbook usecases
  • Joiner
  • Leaver
  • Automatic daily just in time access grant at beginning of day and access revoke at end of day based on prior usage patterns
  • Automatic access reviews followed by approval or denial as well as remediation based on insights, scheduled on a cadence
  • Terminated (Action on Terminated users with active identities in AWS)
  • SoD (Github Non-Engineering Admins)
  • Suspend all identities with last login activity more than 180 days
  • Escalate SoD AND Privileged finding with actions
  • Quarterly, automatically create a “DRAFT” campaign for privileged identities in the organization
  • Notify employees who have not enabled MFA for certain apps
  • Auto-suspend/lock if an account does not have MFA enabled and found in a breach
  • If a finding is an SOD violation with unused access

Was this helpful?

Export as PDF
  1. Playbooks and Webhooks

Playbooks Overview

Introduction

Playbooks are automated programs or workflows that can be executed from BalkanID. BalkanID API SDK functions can be used in any programming language or framework to stitch workflows based on usecases. By stitching the various functions as per the usecases, workflows can be built in something as simple as shell script or can be run as AWS step functions or any custom workflow frameworks. Thereby, all the intelligence and workflows on the BalkanID platform can be customized as needed.

Playbooks can do the following

  • run a set of one or more pre-defined Balkanid actions (review, approve, deny, provision, de-provision, notify, accept risk etc.) expressed as a program and specified on the findings. Entities can be employees, identities, connections, resources, app integrations, for example. Findings are entities with labels such as sod/privileged/sod+privileged/outliers/etc generated by rules or via data science models. A single finding on an entity may have one or more labels.

  • run a set of one or more pre-defined actions (review, approve, deny, provision, de-provision, notify, accept risk etc.) expressed as a program and irrespective of any findings.

Playbooks can be used by 3 kinds of personas

  • customer user who is not technical and doesn’t want to own writing the playbooks or running them, but use balkanID interface + balkanID cloud for configuring playbooks and running playbooks.

  • customer user who is technical and wants to own the playbook scripts, but don’t want to own running them (use balkanID cloud for running the playbooks).

  • customer user who is technical, wants to own the playbook scripts as well as running them on their own infrastructure.

Playbooks can be run in either of these ways

  • customer user triggers the execution of the playbook directly from the web app on one or more findings (within say an action center). customer user may also trigger the execution of the playbook not necessarily on a finding as well.

  • playbooks is run as a cron automatically at scheduled time intervals.

Playbooks can be executed outside of the tenant application

  • Full audit trail of the playbook actions need to be tracked within the tenant application, including the historically completed playbook actions. Once action is taken on the findings, they disappear from the main list but are available in the Archive list.

The following articles can walk through configuring and executing playbooks on BalkanID

Example Playbook usecases

Joiner

New employee gets access to necessary apps

Leaver

De-provision all active identities for terminated employees

Mover

Mover employee access re-adjustment

Automatic daily just in time access grant at beginning of day and access revoke at end of day based on prior usage patterns

Automatically trigger and fulfill just-in-time access grants & access revokes on a recurring basis, for employees and service accounts based on usage patterns

Automatic access reviews followed by approval or denial as well as remediation based on insights, scheduled on a cadence

Automatically trigger access reviews and auto-approve & deny based on thresholds

Terminated (Action on Terminated users with active identities in AWS)

If an active identity of a terminated user is found in AWS, notify first person in default escalation order (eg: First Line Manager (FLM))with options to accept risk, notify, suspend or escalate to next level(s) (Risk Managers/Application Owners). If no action is taken by FLM in 3 days, auto-escalate to Risk Manager. If no action is then taken by Risk Manager in 2 days post that, notify and escalate to CISO. If no action is taken by CISO in 1 day post that, suspend (if no suspend option, de-provision) the active identity.

SoD (Github Non-Engineering Admins)

If an active identity having org admin permission on Github is found, notify risk manager with options to accept risk, notify, escalate, update identity permissions (in action center). If no action is taken in 2 days, notify and assign finding to application owner. If no action in 3 days post that, auto-create revoke access request to demote user to member permissions (defined by playbook creator).

Suspend all identities with last login activity more than 180 days

If an active identity has not been logged-in more than 180 days, suspend/lock the account and notify app owner and first line manager of the employee via email.

Escalate SoD AND Privileged finding with actions

Escalate finding to Risk Manager if a finding is both Privileged and SoD -> If action taken (risk accept, access revoked OR changed to NOT impact SOD) fine, if not escalate to App Owner and User’s manager (within 3 days) -> If action taken (risk accept, access revoked or changed to NOT impact SOD) fine, if not taken in 5 days lock/suspend account (immediately).

Quarterly, automatically create a “DRAFT” campaign for privileged identities in the organization

Every quarter, automatically create a “DRAFT” campaign for privileged identities in the organization. App Owners and User’s manager must review privileged identities and their associated permissions (connections or resources). If not reviewed and overdue by > 5 days, lock/suspend account.

Notify employees who have not enabled MFA for certain apps

If there are identities for which MFA has not been enabled, notify the employee that the identity belongs to and also notify the app owner. If no action in 10 days, suspend that identity.

Auto-suspend/lock if an account does not have MFA enabled and found in a breach

If an account is found in a breach (identity exposure) and does not have MFA enabled, immediately lock/suspend account and notify all risk managers and app owners.

If a finding is an SOD violation with unused access

If a finding is an SoD violation with unused activity of more than 90 days, notify risk managers and app owners. If no action is taken within 3 days, create a revoke access request assigned to the application owner.

PreviousBalkanID APINextConfiguring Global Playbooks

Last updated 4 months ago

Was this helpful?

Configuring Global Playbooks
Configuring Integration Specific Playbooks
Executing Playbooks via Action Center
Executing Playbooks as Fulfillment option on a per application integration