Builds comprehensive identity governance and lifecycle management processes including joiner-mover-leaver automation, role mining, access request workflows, periodic recertification, and orphaned account remediation using IGA platforms. Activates for requests involving identity lifecycle management, JML processes, role-based access provisioning, or identity governance program design.
75
71%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Passed
No known issues
Optimize this skill with Tessl
npx tessl skill review --optimize ./skills/building-identity-governance-lifecycle-process/SKILL.mdQuality
Discovery
100%Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.
This is a strong skill description that clearly defines a specialized domain with concrete actions and explicit trigger conditions. It uses appropriate third-person voice, lists multiple specific capabilities, and includes both abbreviated and full-form trigger terms. The description effectively balances comprehensiveness with conciseness.
| Dimension | Reasoning | Score |
|---|---|---|
Specificity | Lists multiple specific concrete actions: joiner-mover-leaver automation, role mining, access request workflows, periodic recertification, and orphaned account remediation. These are clearly defined, domain-specific capabilities. | 3 / 3 |
Completeness | Clearly answers both 'what' (builds identity governance processes including specific capabilities) and 'when' ('Activates for requests involving identity lifecycle management, JML processes, role-based access provisioning, or identity governance program design'). The trigger clause is explicit. | 3 / 3 |
Trigger Term Quality | Includes strong natural keywords users in this domain would use: 'identity lifecycle management', 'JML processes', 'role-based access provisioning', 'identity governance', 'joiner-mover-leaver', 'recertification', 'IGA platforms'. Good coverage of both acronyms and full terms. | 3 / 3 |
Distinctiveness Conflict Risk | Highly specialized niche in identity governance and lifecycle management. The specific terminology (JML, IGA, recertification, orphaned accounts) makes it very unlikely to conflict with other skills. This is a clearly distinct domain. | 3 / 3 |
Total | 12 / 12 Passed |
Implementation
42%Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.
The skill demonstrates deep domain expertise in identity governance with highly actionable, executable code examples covering the full JML lifecycle. However, it is severely over-engineered for a SKILL.md — the massive inline code blocks, glossary of well-known terms, and lack of progressive disclosure make it a poor fit for the context window. It would benefit enormously from being restructured as a concise overview with references to detailed implementation files.
Suggestions
Extract the large code blocks (HR connector, role mining engine, access request engine, orphaned account detector) into separate referenced files (e.g., HR_CONNECTOR.md, ROLE_MINING.md) and keep only a brief summary with key patterns in the main SKILL.md.
Remove the Key Concepts glossary table — Claude already knows these identity governance terms and definitions waste tokens.
Replace the full class implementations with concise code snippets showing only the critical patterns (e.g., lifecycle state transitions, risk-level classification logic) and link to complete implementations.
Add explicit validation checkpoints between workflow steps, such as 'Verify HR delta sync returns expected employee count before proceeding' and 'Validate birthright role definitions with business owners before enabling auto-provisioning.'
| Dimension | Reasoning | Score |
|---|---|---|
Conciseness | Extremely verbose at ~500+ lines. The identity lifecycle state machine, HR connector, role mining engine, access request engine, and orphaned account detector are all fully fleshed out classes that Claude could generate on demand. The glossary table defines terms like 'Authoritative Source' and 'Orphaned Account' that Claude already knows. Much of this content is reference-level detail that doesn't need to live in a SKILL.md. | 1 / 3 |
Actionability | The code examples are concrete, executable Python with real class structures, method implementations, and data models. The access request workflow configuration, role mining logic, and orphaned account detection are all copy-paste ready with clear interfaces and realistic field mappings. | 3 / 3 |
Workflow Clarity | The 5 steps provide a logical sequence for building an identity governance program, and the scenario section outlines a practical approach. However, there are no explicit validation checkpoints between steps (e.g., 'verify HR connector returns expected data before proceeding to role mining'), and no feedback loops for error recovery in what is a complex, multi-system integration process. | 2 / 3 |
Progressive Disclosure | This is a monolithic wall of content with no references to external files. The HR connector code, role mining engine, access request workflow, and orphaned account detector could each be separate reference files. Everything is inline, making the skill overwhelming and poorly structured for quick reference. | 1 / 3 |
Total | 7 / 12 Passed |
Validation
81%Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.
Validation — 9 / 11 Passed
Validation for skill structure
| Criteria | Description | Result |
|---|---|---|
skill_md_line_count | SKILL.md is long (692 lines); consider splitting into references/ and linking | Warning |
frontmatter_unknown_keys | Unknown frontmatter key(s) found; consider removing or moving to metadata | Warning |
Total | 9 / 11 Passed | |
888bbe4
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.