Sesame

Corma connects to Factorial to enable Sesame practices around Access Reviews and Automated User Provisioning and Identity Access Management (IAM) as a service

What is Sesame?

Sesame is a modern HR software platform designed to help companies digitize and simplify their people management processes. Built for small and medium-sized businesses, Sesame brings together time tracking, shift management, employee records, document management, and performance evaluation into one accessible and easy-to-use system — helping HR teams move away from spreadsheets and manual processes toward a more organized and efficient way of managing their workforce.

What is Access Management in Sesame Integration?

Access management in the Sesame context means linking your Sesame workforce data directly to your business applications to control who can access what, based on their role, team, and employment status.When Sesame data connects to your applications, the process becomes automatic. A new hire in the Sales department receives access to CRM tools, Microsoft 365, and communication platforms without IT manually creating each account. When that same employee transfers to Marketing or leaves the company, their access rights update instantly.

This connection between employee lifecycle events and application permissions is crucial for security. The relationship between Sesame data — job titles, departments, start dates, termination dates — and application access rights determines whether your organization maintains proper control or leaves security gaps that put sensitive data at risk.

Common Access Management Challenges

Without proper integration, access management becomes a manual, error-prone process that creates significant risks:

Manual access provisioning delays and errors-When Sesame sends an onboarding notification and IT manually creates accounts across dozens of applications, delays happen. New employees wait hours or days for access, while rushed IT teams make mistakes — giving the wrong permissions or missing applications entirely.

Inconsistent permissions across different systems-People change roles, get promoted, or move between teams. Without automatic synchronization, their old permissions stick around while new ones get added. This permission creep means employees accumulate access they no longer need, violating the principle of least privilege.

Security risks from orphaned accounts-Employees who leave but retain active accounts represent one of the most common causes of data breaches. Without synchronization between Sesame and your access controls, terminated employees maintain the possibility of accessing sensitive systems long after their departure.

Difficulty tracking who has access to what-Across multiple applications, identity providers, and shadow IT tools that employees adopt without approval, visibility becomes nearly impossible. Companies simply cannot answer the fundamental question: who has access to what?

Compliance audit complexities-Regulatory frameworks like GDPR, SOC2, and ISO 27001 require proof that access follows the principle of least privilege, that offboarding removes access properly, and that regular access reviews happen. Manual or disconnected systems make audits time-consuming and error-prone.

How Corma Solves Access Management

Corma transforms Sesame into the authoritative source for all access decisions, giving you complete control over employee permissions across every connected application.

Automatically syncs employee roles with application access rights-When Sesame assigns someone to a specific role or team, Corma's integration ensures they receive the corresponding software access immediately. A new Engineer gets development tools, project management access, and collaboration platforms based on predefined templates — no manual intervention required.

Removes access immediately when employees leave-Corma uses Sesame offboarding dates to trigger automatic access revocation across all connected applications. For apps with SCIM or API support, accounts are deactivated automatically. For others, Corma sends notifications to ensure nothing slips through.

Enforces role-based permissions consistently across all systems-By mapping organizational roles to specific permission sets, Corma ensures consistent access control. Everyone in the same role gets the same access — no more, no less. This consistency eliminates the ad-hoc permission granting that leads to security vulnerabilities.

Tracks access changes automatically for audit and compliance-Every change — onboarding, offboarding, role updates, license modifications — gets logged automatically. When compliance auditors arrive, you have a complete record of who had access to what and when changes occurred.

Provides real-time visibility into who has access to what-Corma's dashboard shows each user's Sesame status compared to their identity provider status, active applications, licenses, and last activity. Filters help you find mismatches, anomalies, and orphaned accounts before they become problems.

Proof That Corma Works

Over 100 companies — including Brevo and Skello — use Corma to automate IT, HR, and Finance processes, reducing manual on- and offboarding while managing SaaS licenses effectively.

Customers report significant reductions in manual access review work, fewer discrepancies when Sesame status changes, and dramatically reduced orphaned accounts. Organizations that previously spent days preparing for compliance audits now generate reports in minutes.

The flexibility to handle both fully automated provisioning and notification-based workflows for applications without API support means companies achieve comprehensive coverage across their entire application portfolio.

Frequently Asked Questions

How quickly can Corma integrate with Sesame?

Basic setup takes approximately ten minutes. Connect your identity provider, link Sesame, and core visibility begins immediately. Most customers achieve full automation within days, not months.

Do we need technical expertise to implement Corma Sesame integration?

No. The platform is designed to be intuitive, with prebuilt connectors for Sesame and other major identity platforms. Your existing IT team can handle implementation without specialized training.

How does Corma ensure data security during the integration process?

Corma requests minimal scopes for integrations, stores credentials encrypted, and can revoke access at any time. Data flows are managed with enterprise-grade security practices.

Can Corma handle complex organizational hierarchies and role changes in Sesame?

Yes. Since Sesame supplies team, department, and role hierarchies, Corma maps these to permission templates. When people move between teams or roles, access adjusts automatically.

Related Integrations

Check out other integrations that could help you on managing your software licences and accesses!