Features and Workflows of axont

Features and Workflows of axont

Features and Workflows of axont

Here you can find all the information about axont's features and workflows. If you have any questions, you can contact us at any time or request a demo. Click on the links to find out more:

- Joiner Workflow
- Mover Workflow
- Leaver Workflow
- Access Request
- Access Review
- IT Service Inventory

Joiner Workflow

Joiner Workflow

Joiner Workflow

We've all seen it.. A new team member starts, everyone is full of enthusiasm - but access rights are still a long time coming. Not so with axont: From the very first day, your joiners get access to all relevant systems and can hit the ground running. Naturally according to the need-to-know principle, so that everyone only receives exactly the authorisations they really need.

People Management

Register new employees directly in axont or connect the existing HR system via API. As a result, all employees are available to manage access in axont at all times - the basis for seamless and efficient access management.

Overview of the Joiner

Thanks to the centralised overview, you can see the upcoming and completed joiners at a glance. This means that no joiner is forgotten and it is always clear which task is open and who is responsible for it.

Function roles (RBAC)

Whether internal or external employees - with axont you can manage all access rights in one place. With just a few clicks, you can assign predefined function-based access roles and have your access management under control at all times.

Organisational structure

axont makes it easy to map and adjust departments, teams and line managers. New employees are quickly assigned to the right structures, while changes are updated in real time. Without time-consuming, manual work steps.

Mover Workflow

Mover Workflow

Mover Workflow

We've all seen it.. Employees move to a new department and retain all access rights from their old position. This often results in over-privileged accounts and increased security risks. Not so with axont: every change of department is initiated and access rights are adjusted strictly according to the need-to-know principle. This enables smooth transitions, prevents unnecessary access and thus minimises risks.

Mover overview

Mover overview

Mover overview

Thanks to the central overview, you can see the upcoming and completed movers at a glance. This means that no work start is forgotten and it is always clear who is responsible.

Smooth change of department

Employees who move to a new department or a new line manager are assigned the appropriate access rights thanks to the integrated role concept. axont carries out an automated comparison between the existing and newly required access rights.

The resulting delta report lists all accesses that are either additionally required or obsolete. The new line manager can confirm or reject these additional orders from the previous activity. In this way, productivity and data security are guaranteed in equal measure.

The persons responsible for access rights in the relevant systems are automatically notified by the mover process to assign or remove the required access rights in the systems and voilà - the employee can start the new tasks safely and smoothly.

Leaver Workflow

Leaver Workflow

Leaver Workflow

We've all seen it.. Employees leave the company, but access rights are not withdrawn in a timely manner, meaning that leavers continue to have access to systems long after they have finished work - creating security risks. Not so with axont: all access rights are managed in a central solution and revoked in a clearly defined process when employees leave. Nothing is forgotten and your company remains protected.

Leaver overview

Leaver overview

Leaver overview

Thanks to the central overview, you can see the upcoming and completed leavers at a glance. This means that no end of work is forgotten and it is always clear who is responsible.

A smooth leaver process

When you record the departure of an employee in the system, the revocation of all access rights for the specified last working day is initiated. All system authorisation managers are automatically notified to revoke access rights in the systems. That's how simple and secure good access management can be.

Access Request

Access Request

Access Request

We've all seen it.. Employees need new Access Profiles for an IT Service in the course of their work - but nobody knows exactly which Access Profiles can be requested, where they have to be requested or who has to approve and allocate them. Not with axont! Here, responsibilities are clearly defined, requesting channels are transparent and decision-making processes are clearly specified. Access Profiles can be requested easily and provisioned quickly.

In axont, employees can intuitively order the required Access Profiles for the desired IT Services. Thanks to a smart workflow, tickets are automatically sent to the right people for approval and provisioning - efficiently, transparently and without delays.

In axont, employees can intuitively order the required Access Profiles for the desired IT Services. Thanks to a smart workflow, tickets are automatically sent to the right people for approval and provisioning - efficiently, transparently and without delays.

Access Review

Access Review

Access Review

We've all seen it.. Reviewing employees' Access Profiles is tedious, time-consuming, often confusing and yet important. It's made easy with axont: predefined review cycles, a simple and accompanied process and traceable documentation ensure that you maintain an overview and control at all times - simply, securely and efficiently.

Overview of reviews

All scheduled and unscheduled access reviews are listed in the review overview in axont. This allows you to keep track of the status of every review at all times and coordinate them efficiently.

Guided review workflow

The review workflow in axont guides you step by step through the important elements of the review: The master data of the IT Service, the defined responsibilities, the existing Access Profiles and - most importantly - the employees who use these Access Profiles to ensure the need-to-know principle. The best thing about it? The entire documentation is an integral part of the workflow so that everything is recorded transparently and in an audit-proof manner.

IT Service Inventory

IT Service Inventory

IT Service Inventory

We've all seen it.. IT Services in the company are not documented, responsibilities are unclear and there is no consistent role and permissions concept. axont puts an end to this! Clear structures, documented IT Services and roles and responsibilities are embedded in smart workflows - for effective and efficient access management

All IT Services at a glance

In axont, all IT Services can be viewed centrally in a clearly arranged register. The most important responsibilities are allocated and clearly defined for each IT Service: for example, the IT Service Owner is responsible for the IT Service from a business perspective and the IT Service Access Manager is responsible for the effective provision and revocation off access rights.

It only takes a few clicks to add a new IT Service or modify an existing one - quickly, intuitively and efficiently. For transparency and control over your IT landscape at all times.

It only takes a few clicks to add a new IT Service or modify an existing one - quickly, intuitively and efficiently. For transparency and control over your IT landscape at all times.

It only takes a few clicks to add a new IT Service or modify an existing one - quickly, intuitively and efficiently. For transparency and control over your IT landscape at all times.

Access Profiles for all IT Services

Access Profiles can be created in axont for each IT Service, which are easy for users to understand. With these, it is always clear who needs to apply for which Access Profile. The Access Profiles can be requested, making its assignment simple, transparent and efficient.

In axont, you can view Access Profiles that have been assigned to employees directly in the associated IT Service. This provides full transparency about the Access Profiles and they can be withdrawn if necessary.

In axont, you can view Access Profiles that have been assigned to employees directly in the associated IT Service. This provides full transparency about the Access Profiles and they can be withdrawn if necessary.


















Stay in touch and
subscribe for e-mail updates

Copyright axont ag 2025. All rights reserved.

Copyright axont ag 2025. All rights reserved.

Copyright axont ag 2025. All rights reserved.