How Provisum Works

A structured, AI-assisted approach to enterprise role mapping

Data Ingestion

Source system data (users, roles, permissions) is uploaded via CSV or direct connector. Provisum normalizes and validates the data before processing.

AI Persona Generation

Claude analyzes permission patterns across all users and clusters them into security personas — groups of users with similar access profiles. Each persona represents a distinct access pattern.

Intelligent Role Mapping

Personas are mapped to target roles using a least-access algorithm. The AI suggests optimal mappings that minimize excess permissions while maintaining business function coverage.

SOD Conflict Analysis

Every mapping is checked against your SOD rulebook. Between-role and within-role conflicts are identified, classified by severity, and routed to the right resolver.

Structured Approval Workflow

Mappings flow through a department-scoped approval chain: mapper → approver → compliance. Each step is audited. SOD conflicts must be resolved before approval.

Provisioning-Ready Output

Approved mappings are exported in formats ready for your target system — provisioning CSVs, Excel reports, PDF audit packages, and SOD exception documentation.

Principles
  • Least access by defaultEvery mapping minimizes permissions to only what's needed
  • AI transparencyEvery AI decision shows its reasoning and confidence level
  • Audit-readyFull trail of who did what, when, and why
  • Human in the loopAI suggests, humans decide. No autonomous role assignments.