AccessHive Documentation
AccessHive Documentation
AccessHive is a Privileged Access Management (PAM) platform built for marketing agencies. It helps you govern platform identities, manage client access, automate user provisioning, and enforce compliance across your entire client portfolio – all from one place.
New to AccessHive?
Start with the Quick Start guide to connect Google Workspace and create your first identity in under five minutes.
Concepts
Learn how AccessHive works before diving into tasks.
| Topic | What you will learn |
|---|---|
| Identity Types | The five identity types and when to use each one |
| Platforms | Platform categories and which ones require a directory provider |
| Provisioning | The provisioning lifecycle, states, and identity health |
| Credential Vault | How credentials are encrypted, stored, and revealed |
| Governance | Approval policies, role-based access, and compliance |
| Identity Sources | Google Workspace, Microsoft Entra ID, and local directory |
| Access Requests | The request lifecycle and approval flow |
| Ownership Model | Agency-owned identities versus client-dedicated identities |
Guides
Step-by-step instructions for common tasks.
| Guide | What it covers |
|---|---|
| Agency Onboarding | Full first-time setup checklist (10 steps) |
| Creating Identities | Wizard walkthrough for all identity types and platforms |
| Client Management | Managing client accounts, portfolios, and team access |
| Platform Connections | Connecting and configuring marketing platforms |
| Platform Catalog | Browsing and adding platforms from the catalog |
| Google Workspace | Google Workspace (GWS) setup, provisioning, and sync |
| PAM Sessions | Credential checkout, session monitoring, and rotation |
| Managing Credentials | Storing, revealing, and rotating credentials |
| Role Templates | Reusable access patterns for teams |
| RBAC Mappings | Mapping directory groups to AccessHive roles |
| Access Requests | Request workflows and approvals |
| Approval Policies | Configuring approval workflows and escalation rules |
| Workflows | Automating identity lifecycle with workflow rules |
| Executive Dashboard | Agency-wide metrics, compliance scores, and alerts |
| Audit Trail | Viewing and exporting audit logs |
| Reports | Compliance reports and analytics |
| Permission Analysis | Reviewing and right-sizing access permissions |
| Agency Profile | Agency settings, branding, and PAM configuration |
| Users and Roles | Managing team members and assigning roles |
| Notifications | Configuring email and in-app notification preferences |
| Plan and Billing | Subscription management and billing details |
| Single Sign-On | Setting up SSO with your identity provider |
| Local Directory | Managing the built-in user directory |
| Identity Sources | Connecting directory providers |
| Proxy Identity | Intermediate accounts for individual-credential platforms |
| JML Automation | Joiner-Mover-Leaver lifecycle automation |
| Emergency Access | Break-glass credential access for urgent situations |
| Time-Bound Access | Temporary access grants with automatic expiration |
| SCIM Provisioning | Automated user provisioning via SCIM |
| SIEM Integration | Streaming audit data to security platforms |
| Auto-Remediation | Automatic detection and fixing of policy violations |
| Bulk Import | Importing identities and users via CSV |
| Settings | All configuration options |
| Self-Service Portal | End-user access portal |
| Troubleshooting | Common issues and fixes |
Reference
Detailed lookup tables for fields, states, jobs, and operations.
| Reference | What it covers |
|---|---|
| Identity Field Requirements | Required fields per identity type |
| Provisioning States | All provisioning statuses and transitions |
| API Endpoints | System operations for identity management |
| Background Jobs | Job types, lifecycle, and monitoring |