Skip to main content

MiSP Role Share Requests

Granting access for an MiSP to service your account

Updated over a week ago

Overview

Your Managed Integration Service Provider (MiSP) may request access to your iPaaS.com account to provide support and management services. These requests allow you to grant specific permissions while controlling your account security.

Understanding Role Share Requests

When an MiSP needs to access your account, they send a role share request that includes:

  • Details about the requesting MiSP.

  • Specific permissions they need.

  • Purpose of the access request.

  • Duration of access (if applicable).

You can perform the following actions:
​

  • Delete the request

  • Approve the request.

  • Deny the request.

  • View the request details.

Managing Access Requests

Reviewing Requests

When you receive a role share request, carefully review:

  • MiSP identity - Verify this is your authorized service provider.

  • Requested permissions - Ensure they match the services you need.

  • Access scope - Check what parts of your account will be accessible.

Approving or Denying Requests

To respond to a role share request:

  1. Verify the request is legitimate and expected.

  2. Review permissions to ensure they're appropriate.

  3. Approve to grant access or Deny if the request seems suspicious.

  4. Monitor the MiSP's activity once access is granted.

Security Best Practices

Security Note: Only approve requests from MiSPs you have contracted with and trust.

Before approving:

  • Confirm the request directly with your MiSP.

  • Verify the permissions match your service agreement.

  • Check that the access duration is appropriate.

After approving:

  • Monitor account activity regularly.

  • Revoke access when services are complete.

  • Review and update permissions as service needs change.

Managing Active Shares

Once you've granted access to an MiSP, you can:

  • View active permissions and modify them if needed.

  • Monitor MiSP activity in your account.

  • Revoke access immediately if concerns arise.

  • Update permission levels as service requirements change.

Did this answer your question?