Role Mining Stage 2
Needs curation

Percent of entitlements ready for usage profiling

Ready entitlements 0 Curated and eligible for Stage 2 analysis
Sampled users 0 Users observed across the ready-access footprint
Avg ready access 0 Mean ready entitlements per user in scope
Stage 2 coverage 0% Share of the catalog ready for usage profiling

Profile Scope Filters

Narrow the Stage 2 analysis to a specific owner, a sensitivity band, or only high-risk ready access.

Showing all entitlements currently available to Stage 2.

Restrict the profile to ready access with high-risk indicators only.

Stage 2 Readiness Funnel

Track what is already clean enough for usage analysis and what still blocks downstream clustering and candidate generation.

Readiness pulse
0% of entitlements in the current scope are ready for Stage 2 usage profiling.

Catalog curation signals will appear here as live data loads.

In scope 0
Still blocked 0
01 Ready
0

Curated, non-baseline access already eligible for user profiling and pattern discovery.

0% of scope
02 Owner gaps
0

These entitlements still lack accountable ownership and cannot move cleanly into Stage 2 analysis.

0% of scope
03 Risk tags
0

Sensitivity labeling is still missing, which hides high-impact overlap in downstream usage patterns.

0% of scope
04 Annotation
0

Descriptions are incomplete, which makes the resulting access footprint harder for analysts to interpret.

0% of scope
05 Baseline review
0

These items still need a baseline decision before the usage sample can stay narrow and role-focused.

0% of scope
The goal is a narrow, explainable feed for discovery: broad birthright access stays out, sensitive overlap stays visible, and repeated user-to-access patterns become strong enough to seed candidate roles without manufacturing noise.

Sampled User Coverage

See which users sit closest to the center of the ready-access footprint and where concentrated access should be reviewed before pattern discovery.

Coverage pulse 0 sampled users are currently shaping the ready-access footprint in this scope.

User distribution insight will appear here once the Stage 2 sample is loaded.

High-risk users 0
Avg ready access 0
Top cluster 0
Ranked sample
Users shaping the current ready-access footprint

The strongest repeated access holders rise to the top as filters change, making it easier to inspect clustering bias before discovery.

Top users refresh as the current scope changes.

User Ready Access Latest Refresh Risk Action

Analyst Checklist

Short checks that improve the quality of Stage 2 output fastest.

  • Review concentrated users Users appearing across many ready entitlements often shape early clusters; confirm their access is business-real and not inherited noise.
  • Validate sensitive overlap High or privileged access needs clear stewardship before the same footprint is used to propose role patterns.
  • Watch for baseline bleed-through If broad-access groups still appear in user patterns, route them back to the catalog for baseline tagging before discovery.
  • Prepare discovery input Once coverage is credible, this page becomes the handoff checkpoint for Discover Patterns and candidate role generation.

Sensitivity Mix In Scope

Understand how much of the ready-access footprint is standard, moderate, or high-sensitivity before mining starts.

A balanced mix is usually easier to cluster than a feed dominated by broad privileged access or unclassified entitlements.

User Concentration Distribution

Compare how heavily ready entitlements are distributed across the most represented users in scope.

  • High concentration A few users dominate the ready footprint. Validate whether this signals real job-based access or unresolved shared administrative noise.
  • Even distribution Access repeats more consistently across the user base, which is usually a better starting point for clustering and candidate generation.
User detail

Ready-access profile in the current Stage 2 scope.

Ready access 0
Highest risk Standard
Owners involved 0
Latest refresh --
Profile signal

Select a user from the coverage table to inspect ready-access concentration and risk overlap.

Owners represented
Sensitivity mix
Entitlements in scope
IAM/IGA Portal — Internal Use Only. See documentation for policies. Copyright © 2026. All rights reserved.