Orchestrating the Digital Enterprise: A Unified Framework for Bulk Identity Lifecycle Governance and Access Control via Low-Code Interfaces

Arora Goldy

Citation: Arora Goldy, "Orchestrating the Digital Enterprise: A Unified Framework for Bulk Identity Lifecycle Governance and Access Control via Low-Code Interfaces", Universal Library of Engineering Technology, Volume 03, Issue 01.

Copyright: This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

The article examines a unified framework for bulk management of the digital identity lifecycle and access control in an enterprise environment, based on low-code interfaces and a serverless, client-side execution model. The relevance of the work is driven by the increasing fragmentation of the SaaS landscape and the relocation of the line of defense into the domain of Digital Identity, against which traditional IGA platforms remain costly and inertial to deploy. At the same time, manual Joiner, Mover, Leaver (JML) processes create a risk window due to onboarding delays and the untimely revocation of access. The purpose of this study is to design and validate an architectural–algorithmic approach that enables bulk operations under API quotas and limits, while preserving data sovereignty and minimizing the transfer of PII to third parties. Scientific novelty lies in substantiating the linkage of: (1) distributed logic execution in the context of a user session, (2) a Unified Object Model as a dependency graph of user–group–alias entities, and (3) transactional batching with optimistic concurrency and idempotent handling of partial successes. It is demonstrated that the proposed framework (illustrated via Ok Goldy in Google Workspace) reduces the duration of JML operations by 98–99%, enables near-instantaneous bulk access suspension, and enhances auditability through centralized tabular traceability. The article is intended for IAM/IGA architects, Google Workspace administrators, and information security/IT leaders seeking economically efficient and compliance-oriented approaches to JML automation.


Keywords: Identity Governance and Administration, Low-Code Automation, Serverless Architecture, Joiner-Mover-Leaver, Google Workspace.

Download doi https://doi.org/10.70315/uloap.ulete.2026.0301016