
RSA Identity Governance and Lifecycle
User provisioning and governance tools
Identity management software
- Features
- Ease of use
- Ease of management
- Quality of support
- Affordability
- Market presence
Take the quiz to check if RSA Identity Governance and Lifecycle and its alternatives fit your requirements.
Contact the product provider
Small
Medium
Large
- Banking and insurance
- Healthcare and life sciences
- Information technology and software
What is RSA Identity Governance and Lifecycle
RSA Identity Governance and Lifecycle is an identity governance and administration (IGA) product used to manage user access across enterprise applications. It supports access request workflows, approvals, role and entitlement governance, and lifecycle processes such as joiner/mover/leaver provisioning. The product is typically used by IAM teams, security governance, and compliance stakeholders to enforce access policies and produce audit evidence. It is commonly deployed in environments that require structured access certifications and integration with multiple directories and business applications.
Strong governance and certifications
The product supports access reviews (certifications) and policy-based governance to help organizations validate who has access to what and why. It provides workflow-driven approvals and attestation features that map to common audit and compliance requirements. These capabilities are central for enterprises that need repeatable, documented controls rather than ad hoc provisioning. It is positioned for governance depth compared with lighter identity management tools focused mainly on authentication or basic directory management.
Lifecycle provisioning workflows
RSA Identity Governance and Lifecycle supports joiner/mover/leaver processes to automate access changes as users enter, change roles, or leave the organization. It can orchestrate requests, approvals, and fulfillment steps to reduce manual ticket handling. This helps standardize access changes across multiple systems and reduces reliance on individual administrators. The workflow approach is suited to organizations with formal HR-driven identity processes.
Role and entitlement management
The product includes role modeling and entitlement governance to structure access around business roles and least-privilege principles. It helps identify and manage entitlements across connected systems, supporting separation-of-duties and policy checks where configured. This can improve consistency versus managing access solely through application-specific groups. It is useful when organizations need a centralized view of entitlements for audit and remediation activities.
Implementation can be complex
IGA deployments typically require significant upfront work to model roles, map entitlements, and integrate target systems, and this product is no exception. Organizations often need dedicated IAM expertise to design workflows, certification campaigns, and governance policies. Time-to-value can be longer than simpler identity management tools that focus on a narrower scope. Ongoing maintenance is also required as applications and entitlements change.
Connector coverage varies by system
Effectiveness depends on the availability and maturity of integrations to directories, HR systems, and business applications in the environment. Some applications may require custom integration work or intermediate provisioning methods, which can increase cost and operational effort. Integration gaps can limit automation and force partial manual fulfillment. Buyers should validate required targets and provisioning actions during evaluation.
Less focused on modern CIAM
The product is designed primarily for workforce identity governance rather than customer identity and access management (CIAM) use cases. Organizations needing developer-centric identity building blocks or consumer-scale authentication features may require additional products. It may not be the best fit for teams prioritizing lightweight, API-first identity components over governance workflows. This can lead to a multi-product architecture for broader identity needs.
Seller details
RSA Security LLC
Bedford, Massachusetts, USA
1982
Private
https://www.rsa.com/
https://x.com/RSAsecurity
https://www.linkedin.com/company/rsa-security/