Offboarding an internal user is critical to ensuring no unauthorized access remains after someone leaves the organization.
Role Requirements
Procedure Scope: Administrators
Required Group Membership: Admin.Security
Handbook Reference
Package: Tenant Foundations
Domain: TBD
Modifies: TBD
When to Perform this Operation
As Needed: Proactive or in Response to User/Security
Technical Description and Importance
Offboarding an internal user is an essential step in ensuring that no unauthorized access remains after someone leaves the organization, whether through resignation, contract completion, or other circumstances. This process includes disabling their account to prevent login attempts, removing administrative permissions to eliminate elevated access, unassigning them from any shared or work-related groups, and revoking licenses they were using. Without completing these steps, leftover access or unused licenses could pose security risks or waste resources, making thorough offboarding critical to maintaining a secure and organized environment. A clear and repeatable offboarding process not only prevents accidental errors but also ensures that access is efficiently managed and resources are ready for reassignment when needed.
Management Options
- Offboard an Internal User
Offboard an Internal User:
Purpose
Securely and completely remove user accounts and access across all organizational systems.
Use Case
A departing employee's account needs to be fully deactivated, administrative permissions removed, group memberships rescinded, and licenses unassigned to prevent unauthorized access and free up resources.
Operation | Action | Target |
Offboard an Internal User | Remove/Disable | User Account, Permissions, Groups, Licenses |
Offboard an Internal User
This operation revokes the users' ability to login with the account, along with assigned permissions and licenses within Entra ID.
1. Disable Account
2. Remove Permissions
3. Remove from Groups
4. Remove Licenses
Need Assistance?
Reach out to your Customer Success Manager to discuss how a Sittadel cybersecurity analyst can assist in managing these tasks for you. New to our services? Inquire about arranging a consultation to explore optimizing your Azure environment for painless management.