How to Review or Remove My Access

How to Review or Remove My Access

OrangeAccess allows you to see the access you currently have and, when appropriate, request to remove it. This helps keep your access up to date and ensures compliance with University security policies.


Why Remove Access?

Regularly reviewing and removing access you no longer need is an important security practice. It:

  • Reduces risk by ensuring only the right people have the right access.

  • Keeps University systems compliant with audit requirements.

  • Helps you avoid clutter from old or unused roles.



2. Review Your Current Access

  1. On home page, select My Access.

  2. Your access is organized into the following categories: 📸 Screenshot: My Access page showing the different categories

  • Accounts – Your user accounts in different systems. (These cannot be changed in OrangeAccess.)

  • Entitlements – Fine-grained permissions within systems (for example, the ability to run specific reports).

  • Access Profiles – Predefined sets of access items, typically used for common job needs within a single application.

    Roles – Bundles of entitlements grouped by job function, often spanning multiple applications.

  • Applications – The overall systems and applications you have access to.


3. Request to Remove Access

  1. In the My Access list, locate the access you want to remove.

  2. Select Revoke Assignment next to the item.

  3. (Optional) Add a comment to explain why you no longer need this access.

  4. Select Revoke 📸 Screenshot: my access page showing a selected access request and the revoke access panel waiting for comments


4. What Happens Next?

  • In most cases, your removal request will be processed automatically.

  • In some situations, approval may be required (for example, if the access is highly sensitive).

    • If approval is needed, the request will route to your manager and the application/data owner.

  • You can always track the status of your request under the Pending Requests tile


Tip: Proactively reviewing and removing access you no longer need helps keep University systems secure and reduces unnecessary risk.