AKKU

User Lifecycle Management

Overview

Through the App Management and User Management sections of the Akku dashboard, administrators can perform automated user account lifecycle management across third-party applications. This ensures that account creation, role assignments, and access revocations happen seamlessly. By integrating provisioning capabilities, administrators can ensure that users are granted access to the right applications with appropriate permissions - automatically and securely.

In this section of the user guide, we will cover the following:

  • Configuring Provisioning for apps
  • Groups, Roles, and OU Mapping
  • Functional Testing
  • App and User Deletion

Navigation Path

Dashboard
User Lifecycle Management
Screenshot
User Lifecycle Interface

App Manager

You will see available apps for integration, with each card including the app logo, description, and a Setup button.

Screenshot
User Lifecycle Interface

App Provisioning Configuration

Click on the “Configure” button for an existing app from My Apps, or else click on the "Setup" button for an app from the App Store section.

Let us take Google as an example here for configuration from the App Store.

You will be asked whether you would like to configure SSO or Provisioning.

In this chapter, we will look at the process to configure Provisioning for an app.

Screenshot
User Lifecycle Interface
1

Connector Details - General Details:

Connector ParameterValue
Connector NameGOOGLE
DescriptionGoogle Provisioning
Service Provider Domainhttps://mail.google.com/mail
Authentication TypeBearer Token
Token TypeService Token
Connector TypeRest API
Note: Default values will be auto-filled for these fields.
Screenshot
User Lifecycle Interface

Click on Next to proceed.

2

Connector Details - Authentication:

Enter the following details in the respective fields:

Credential TypeInstructions
Service TokenEnter the credential issued by the target application
Username/EmailEnter the admin email address or service account email

Click on the “Test” button to validate the credentials and access

Based on the details entered, you will receive either a success or an error message

Screenshot
User Lifecycle Interface
3

How to Get Service Token and Username/Email for Provisioning Authentication:

Service Token

This is usually an API token or access credential issued by the target application (e.g., Google Admin Console, Jira Admin, etc.).

In this example, we will retrieve the service token for Google Workspace.

  1. Log in to Google Cloud Console with an admin account

  2. Navigate to APIs & Services > Credentials

  3. Click Create Credentials > Service Account

  4. Provide a name and role (usually “Admin” or “Directory Admin”)

    Screenshot
    User Lifecycle Interface
  5. Once created, go to the Keys tab of the service account

  6. Click Add Key > Create new key > JSON

  7. This JSON file contains your private key and client email - upload this to Akku or extract the token depending on how Akku supports integration

    Screenshot
    User Lifecycle Interface
  8. This key/token becomes your Service Token.

Note: Some platforms provide OAuth2 tokens or API keys instead — check the documentation for that specific app.

Username / Email

This is the admin email address or service account email that has provisioning rights in the connected application.

For Google, use the primary admin email or the client email from the service account.

4

Connector Details - Authentication (contd.):

Enter the Service Token and Username/Email retrieved in the previous step into the appropriate fields of the Authentication form under Connector Details on Akku.

Next, click on the “Test” button to authenticate the credentials entered.

If everything is correct, you will see a success message.

Click on the “Done” button to proceed.

Screenshot
User Lifecycle Interface

Groups, Roles, and OU Mapping

When provisioning users from Akku to external applications like Google Workspace, it's important to maintain proper alignment between your internal identity structure and the destination application’s structure. Akku simplifies this by allowing you to map Groups, Roles, and Organizational Units (OUs) directly from its interface.

Even when the source (Akku) and target (e.g., Google) names are the same, explicit mapping ensures clarity, maintainability, and auditability.

1

Mapping - Groups

Map Akku IAM user fields to the app's user schema:

SystemMapping Instruction
Source - AkkuSelect the group to be mapped in Akku
Target - GoogleSelect the group to be mapped in Google
Screenshot
User Lifecycle Interface

Once mapped, you will see a message saying “Group mapping updated successfully”.

You can also click on the “+” button to add more custom mappings, depending on app support.

Click Next to proceed.

2

Mapping - Roles

SystemMapping Instruction
Source - AkkuSelect the role to be mapped in Akku
Target - GoogleSelect the role to be mapped in Google
Screenshot
User Lifecycle Interface

Once mapped, you will see a message saying “Role mapping updated successfully”.

You can also click on the “+” button to add more custom mappings, depending on app support.

Click Next to proceed.

3

Mapping - OU (Organizational Unit)

SystemMapping Instruction
Source - AkkuSelect the organization unit to be mapped in Akku
Target - GoogleSelect the organization unit to be mapped in Google
Screenshot
User Lifecycle Interface

Once mapped, you will see a message saying “OU mapping updated successfully”.

You can also click on the “+” button to add more custom mappings, depending on app support.

Click Next to proceed.

4

Final Review - User Data Mapping:

Review all mapped attributes and then click on the “Confirm” button to complete the provisioning setup.

Screenshot
User Lifecycle Interface
NOTE : once you confirm a popup shows “ Provisioning configuration completed successfully “
Screenshot
User Lifecycle Interface
5

Post-Configuration

You will now see the Gmail app under My Apps with the status displayed for Single Sign-On as “Configure”, and for Provisioning as “Inactive”.

Click on the status button for Provisioning, and select the “Active” option.

Once SSO is also configured, the Gmail provisioning will be fully complete and functional, and you will see a notification that says “Provision engine activated successfully”.

Screenshot
User Lifecycle Interface

Functional Testing

  1. Go to User Management > Users
  2. Assign a user to the application you just configured
  3. Click Sync Now or wait for automatic sync (based on schedule)
  4. Log in to the application admin console and verify that the user has been created or updated

App and User Deletion - Deprovisioning Best Practices in Akku

Deleting an App from My Apps (SSO & Provisioning)

Before removing an application from My Apps, follow these steps to ensure a clean removal without leaving orphaned accounts or access permissions.

1

Deactivate Provisioning

  • Go to App Management > My Apps
  • Locate the app you wish to remove
  • Under Provisioning, select Inactive
  • You will see a confirmation message that says “Provisioning engine deactivated successfully”
Screenshot
User Lifecycle Interface
2

Delete the App from SSO

  • After deactivation, click on SSO Configuration for the app
  • Click on the Delete option and confirm the action
Screenshot
User Lifecycle Interface
Screenshot
User Lifecycle Interface
Important: Deleting an app without deactivating provisioning first may result in residual access permissions for users on the service provider's side (e.g., Google Workspace).

Deleting an App from My Apps (SSO & Provisioning)

When removing a user from Akku IAM, provisioning deactivation is also required to ensure their external app accounts (like Google, Jira, etc.) are removed as part of the deprovisioning workflow.

  1. Navigate to Users > User List
  2. Locate the user to be deleted, and click on the Select button beside their name
  3. Ensure that all app provisioning (if configured) for this user is revoked:
    • Go to Connected Apps > Provisioning
    • Confirm if the provisioning is active - if yes, then remove or deactivate it
  4. Now, delete the user

This ensures that the user's access and identity mappings in all connected applications are properly removed, maintaining security and compliance.

Screenshot
User Lifecycle Interface