Access Management
Training Guide
A comprehensive deep-dive into how StrongDM manages identities, resources, and access controls — covering users, roles, workflows, and device trust.
Human users and non-human service accounts. Permission levels, admin tokens, and identity management.
How roles group identities and grant resource access via static or dynamic access rules.
Approval and Access workflows for just-in-time, policy-driven resource access with time-limited grants.
Integrating endpoint security posture (CrowdStrike, SentinelOne) into StrongDM policies.
Users & Accounts
Identities that interact with the StrongDM platform — slides 20–26
Human Users
- An identity that can log in via Admin UI, StrongDM client, or CLI.
- Requires an email address and first & last name at creation.
- An invitation email is sent to the specified address to join the network.
- Can be assigned one of five permission levels (no custom levels).
Permission Levels
| Action | Admin | Auditor | DB Admin | Team Leader | User |
|---|---|---|---|---|---|
| Access datasources, servers, clusters, clouds & websites | ✓ | ✓ | ✓ | ✓ | ✓ |
| Access dashboards | ✓ | ✓ | – | – | – |
| Audit activities, queries & SSH captures | ✓ | ✓ | – | – | – |
| Audit account configuration | ✓ | ✓ | – | – | – |
| Grant administrative access | ✓ | – | – | – | – |
| Grant access to datasources, servers, clusters, clouds & websites | ✓ | – | – | – | – |
| Invite and suspend users | ✓ | – | – | ✓ | – |
| Manage user details | ✓ | – | – | – | – |
| Manage service accounts, admin tokens & API keys | ✓ | – | – | – | – |
| Create roles and manage their access | ✓ | – | – | – | – |
| Move users into and out of roles | ✓ | – | – | ✓ | – |
| Manage datasources, servers, clusters, clouds & websites | ✓ | – | ✓ | – | – |
| Manage relays and gateways | ✓ | – | – | – | – |
| Update account settings | ✓ | – | – | – | – |
Service Accounts
- Provide programmatic access to resources — no email or full name required, only a display name.
- Authenticate to the StrongDM control plane with admin tokens.
- When created, the token has no admin permissions — resource access is granted via roles.
- Auto-Connect is disabled by default (security best practice), since service accounts cannot self-authenticate the way humans can.
- Require email + name
- Login via UI, client, CLI
- Invited via email
- 5 permission levels
- Display name only
- Authenticate with admin token
- Auto-Connect off by default
- Access via roles
Roles & Access Rules
Grouping identities and defining resource access — slides 27–33
Roles are the primary mechanism for providing access to resources in StrongDM. Both human users and service accounts can be added to roles. Roles have two configurable components:
Individual user identities that share attributes and are managed as a group. Identities can belong to multiple roles simultaneously.
Define which resources role members can access. Predates policies — if policies are not enabled, this is the sole resource access control.
Access Rule Types
- Resources are explicitly selected and added to the role from a list.
- Good for targeted access where the resource list is well-known and stable.
- Requires manual updates when new resources need to be added.
- Example: Grant access to
marketing-db-1,SSH-07, anddev-web.
- Resources are added automatically based on resource type and tags.
- Best for organizations with a well-defined tagging strategy.
- New resources with matching tags are automatically added to the appropriate role.
- Example: Grant access to all
stagingservers in theus-east-1region.
User & Group Provisioning
Syncing users from external identity providers — slides 34–36
- Lets you manage users in one place (your IdP) and have them automatically populate in StrongDM.
- Eliminates the need to create duplicate user records in StrongDM.
- Users are set up in the external service first, then synced to StrongDM.
- Provisioned users cannot be individually edited within StrongDM — changes must be made at the source.
- Provisioned users get resource access the same way as native users: by assigning them to roles.
Supported Providers
Azure AD
Sync users and groups via SCIM from Microsoft Azure Active Directory.
Okta
Automate user lifecycle management using Okta's SCIM integration.
Google Workspace
Provision users directly from Google Workspace directory.
OneLogin & Generic SCIM
Use any SCIM 2.0-compliant provider via the Generic SCIM endpoint.
StrongDM uses the System for Cross-Domain Identity Management (SCIM) 2.0 API, which allows compliant applications to manage user and group provisioning automatically.
Workflows
Approval and access workflows for just-in-time access — slides 37–51
When StrongDM policies are enabled, administrators can use Workflow Approval functionality. Workflows are triggered by a policy match and prompt users to request access to resources.
There are two workflow types that work together:
Defines what resources appear in the Request Access Catalog and who (which roles) can see that catalog.
Defines who approves or denies requests, and how (automatically, via ServiceNow, or manually).
Approval Workflow Types
- Requests meeting policy requirements are instantly approved — no human intervention needed.
- Ideal for machine-to-machine interactions or low-risk resources where friction should be minimized.
- Available out-of-the-box in all StrongDM installations.
- Integrates with ServiceNow — requests and approvals are managed via ServiceNow workflows.
- Requires installation of the StrongDM ServiceNow application from the ServiceNow Store.
- Useful for organizations with existing ITSM change-management processes.
- Selected StrongDM users or roles must manually approve or deny each request.
- User receives an "Approval Workflow Notification" prompt on their StrongDM client.
- Approver sees the request in Admin UI under Access → Request Access → Requests.
- Approver clicks Actions → View request details → Approve.
- Once approved, user can access the resource via the StrongDM client.
sdm status
# Shows: resource name, status, address, type, tags, expiry
Creating an Access Workflow
Assign Resources
Define which resources appear in the user's Access Catalog. Users will be able to request these resources.
Attach Roles
Select which roles can view and request from this Access Catalog. Only role members can see the catalog entries.
Set Approval Criteria
Choose the Approval Workflow (Automatic, ServiceNow, or Manual) that will process requests for this workflow.
Access Duration Settings
- Granted access is not permanent — it is time-limited.
- Maximum permitted duration is 45 days per request.
- Two modes: User-specified duration (user chooses, up to the max) or Fixed duration (admin sets, users cannot change).
- Policy-triggered access (via the "With" policy statement) grants access for the configured approval duration (e.g., 4 hours).
Standing Access
Understanding persistent access and the zero-privilege model — slides 52–65
"Standing access" refers to how long a user has access to a resource — specifically, persistent access that doesn't require requesting each time. When a role's Access Rule grants a resource directly, that user has standing access: the resource is always visible on their StrongDM client and no catalog request is required.
The Standing Access Spectrum
The key is balancing user needs for frictionless access against security requirements. Most organizations aim for a position closer to zero standing privileges, especially for sensitive resources.
Security Maturity Levels
Entitlements Visibility
The Admin UI provides real-time visibility into who has access to what. All views show live/active entitlements at the moment of access.
Path: Principals → Users → [Name] → Entitlements — shows what resources a user can access, how access was granted, duration, and last use. Can revoke directly.
Path: Principals → Roles → [Name] → Entitlements — shows all resources accessible to a role and last access timestamp.
Path: Resources → [Type] → Entitlements — shows all users/roles with access to a specific resource. Can revoke directly.
3rd Party Approval
External integrations for access requests and approvals — slides 66–71
In addition to requesting and approving access via the StrongDM Admin UI, users and approvers can send requests and approvals through third-party integrations. This meets users where they already work, reducing friction.
Available Integrations
Slack
Request access directly from a Slack app or channel. Approvers are notified in Slack and approve within the app.
Microsoft Teams
Allow access requests and approvals through Microsoft Teams channels and bots.
ServiceNow
Manage requests and approvals via ServiceNow ITSM workflows for full change-management integration.
Jira
Manage requests and approvals through Jira tickets for teams already using Jira for work management.
Slack Integration Flow
User Requests via Slack
User makes a resource access request directly in the Slack app or a designated channel.
Slack Notifies Approver
Slack notifies the Access Workflow Approver designated in StrongDM.
Approver Grants Access in Slack
The approver grants entitlement to the user directly within the Slack app — no need to open the StrongDM console.
StrongDM Enforces Access
StrongDM enforces the access entitlement. The user receives Just-In-Time access in their StrongDM client.
Device Trust
Endpoint security posture in policy evaluation — slides 72–80
- A security mode that enables StrongDM to work with endpoint management software to evaluate a device's security posture before granting access.
- Configured using the policy builder — the "When" clause in a policy can include device trust conditions.
- Must be explicitly enabled in
Settings → Security → Device Trust— policies alone won't activate it. - Supported providers include: SentinelOne, CrowdStrike, Microsoft Defender, Duo.
Trust Levels
✅ High Trust
Device passes all security checks. Healthy posture.
⚠️ Low Trust
Device has security issues or is in a degraded state.
🔵 Exempt
Device is explicitly excluded from Device Trust requirements.
❓ Unknown
Device trust status cannot be determined (agent not installed, etc.).
Enabling Device Trust — Required Steps
Setup 3rd Party Integration
Go to Settings → Security → Device Trust. Enable Device Trust and select your provider (e.g., SentinelOne, CrowdStrike).
Complete Integration Steps
Install the vendor agent on endpoints and connect the vendor's control plane to StrongDM per the vendor's documentation.
Configure StrongDM Policies
Use the policy builder to add Device Trust conditions in the "When" clause (e.g., "Device is High Trust"). The policy editor will show the injected trust status check.
How Device Trust Works
Host sends status to vendor
The Device Trust vendor agent on Host A reports the device's security posture to the vendor control plane.
StrongDM queries vendor
The StrongDM control plane queries the vendor control plane for the trust status of all customer hosts.
StrongDM enforces policy
Based on the device's trust level and the configured policy, StrongDM grants or denies the host access to the resource via the gateway.
Knowledge Check
Test your understanding of the Access module
Your Score
Answer the questions below to track your progress.