Skip to content

Lifecycle

JML is the backbone of identity lifecycle management. Every person event triggers a predictable set of group changes.

  1. Create user in the appropriate OU (/w2/w2-probation for new W-2 employees).
  2. Add to People roster (prv-org-people-w2-active or appropriate variant).
  3. Add to Team based on role/function.
  4. Subscribe to Mail lists (announce, department news, all-staff).
  5. Grant Role memberships as approved (time-boxed for elevated roles).
  6. Provision system access via role group membership.
  7. Promote from probation to active OU when onboarding + device compliance is met.
  1. Update primary_department and primary_team within 1 business day.
  2. Remove from old Team. Add to new Team.
  3. Swap mail list subscriptions (old department news → new department news).
  4. Review Role memberships — remove roles that no longer apply; add new ones with approval.
  5. Update drive access if team-level drive bindings change.
  1. Suspend account. Move to offboarded OU.
  2. Remove from all Role groups (access revocation).
  3. Remove from all Teams (except offboarded rosters).
  4. Move to offboarded People roster (prv-org-people-w2-offboarded etc.).
  5. Transfer content ownership (Drive files, Calendar).
  6. License to archive tier (or zero).
  7. Retain Vault holds per legal/compliance requirements.
  8. Remove from all Mail lists.

All access changes follow the R-A-F-V pattern:

  1. Request — Ticket with justification, scope, and requested duration.
  2. Approve — Owner of the role group (or delegate) approves.
  3. Fulfill — Add to role group. Document in ticket.
  4. Verify — Confirm access works. Close ticket.
  • Default duration: 90 days for elevated roles. Renew with re-approval.
  • Admin roles: Maximum 30 days. Require dual approval.
  • Breakglass: Emergency-only. Two-person rule. Evidence required.
  • No permanent elevated access without quarterly attestation.
CategoryExamplesApprovalLead Time
StandardNew team, new mail listTeam ownerSame day
NormalNew role group, new customer engagementPLT + relevant owner1-2 business days
SensitiveAdmin role grant, new department, tenant changePLT + SEC + Exec3-5 business days
EmergencyBreakglass, incident responseTwo-person ruleImmediate (post-incident review)
  1. Open ticket with category, justification, and scope.
  2. Get required approvals.
  3. Implement change.
  4. Evidence (screenshots, GAM output, IaC commit).
  5. Close ticket with verification.

Every quarter, the following reviews must complete:

ReviewOwnerWhat to Check
Group ownershipPLTEvery group has >= 2 owners
Role attestationRole ownersMembers are still justified
OAuth/MarketplacePLT + SECAllowlists are current
OU policy driftPLTPolicies match canonical settings
Breakglass testPLT + SECKeys work, process documented
External membersSECZero externals on TEAM/STRICT
Automation scopesPLTDWD scopes still minimal
Mail list hygienePLTAllowlists, moderation, directory
  • Primary: On-call personnel receive alerts via prv-{owner}-alerts-* groups.
  • Escalation: If on-call can’t resolve, escalate via Slack/PagerDuty (not email).
  • Post-incident: Document in ticket. Review alert routing effectiveness.