Loading...
This recipe identifies orphan roles in OvalEdge — roles that are not assigned to any user and do not have object-level permissions on jobs, dashboards, glossary terms, schemas, or tables. Detecting these roles helps maintain a leaner access management model and prevents the accumulation of redundant or unused roles.
Orphan roles accumulate over time as organizations restructure teams, migrate systems, or change access policies. These unused roles create hidden risks, inflate system complexity, and mislead governance teams. This recipe identifies all roles not assigned to any user, not referenced in policies, and not used in audit logs.
Step 1 — Read roles, users, and mapping tables
Load all roles, users, assignments, and policy references.
Step 2 — Identify roles with no assigned users
Spot roles never mapped to any user profile.
Step 3 — Identify roles unused in any policy
Check policy-role relationships to detect dead mappings.
Step 4 — Cross-check audit logs
Confirm roles have not been used in access events.
Step 5 — Assign severity
Rank roles based on governance sensitivity.
Step 6 — Output orphan role register
Provide cleanup-ready dataset for IAM and governance teams.
| Insight Category | What the recipe discovered | Business Impact |
|---|---|---|
| Unused roles | 12 roles have zero user assignments. | Cleanup reduces IAM complexity & audit scope. |
| Policy gaps | 4 roles are referenced in no policies. | Ensures only meaningful roles remain active. |
| High-risk roles | Some roles have elevated privileges but no owners. | Requires immediate investigation. |
Make sure the following ingredients are available: