JML Lifecycle Expert and Microsoft Technology Consultant
MC-Teck are the JML Experts
What is JML?

JML is a “Joiner Mover Leaver” process which supports the lifecycle of your staff login accounts.

This begins with Joiner. When a colleague joins your business, the JML process will create their user object and make sure they have the relevant access they need to do their job.

When a colleague transitions to a new role, the Mover process will amend their access so that they can access the resources they need for this role, whilst simultaneously removing any access they no longer require, preventing access creep.

Finally, when a colleague leaves your business, the Leaver process will disable their accounts, remove all access and remove their licences; leaving your business in a secure state and keeping your licence costs to a minimum.

MC-Teck delivers JML onboarding and lifecycle processes, ensuring seamless user transitions, reduced risk, and consistent policy enforcement.

Why Do I Need a Mover Process?

When a colleague moves from one role to another, the Mover process comes into its own.

Without a Mover process, someone needs to manually review all of the security and email groups the colleague is a member of, remove any related to their old role, and add them to the appropriate ones for their new position. Depending on the size, complexity and age of your business, removing legacy access can be a very large task and one which is often either done incompletely or overlooked entirely.

Implementing an automatic Mover process simplifies this, making sure that these transitions are as smooth as possible and that access creep (retaining legacy access) is a thing of the past.

Having a Mover process in place also helps with project delivery as you can be sure that all accounts have up-to-date information. So if you are delivering a new finance system, you can be certain that those colleagues identified as finance by job role or department are exactly that. Without this information certainty, the project will take longer and cost more because of the time and effort required to clean up and validate the colleagues.

Identity and Access Management

Identity and Access Management (IAM) takes JML to the next level. Along with the processes included in JML, IAM can be used to provide access to systems and resources only for the duration of time required to perform a function.

It is also capable of obfuscating the login name to key systems, or generating temporary accounts for one time use, further securing your environment.

If you are interested in implementing a JML or IAM solution, or would just like to know more, please drop me a line and we can discuss how MC-Teck can help you achieve your aims.