fitgap

RSA Identity Governance and Lifecycle

Features
Ease of use
Ease of management
Quality of support
Affordability
Market presence
Take the quiz to check if RSA Identity Governance and Lifecycle and its alternatives fit your requirements.
Pricing from
Contact the product provider
Free Trial unavailable
Free version unavailable
User corporate size
Small
Medium
Large
User industry
  1. Banking and insurance
  2. Healthcare and life sciences
  3. Information technology and software

What is RSA Identity Governance and Lifecycle

RSA Identity Governance and Lifecycle is an identity governance and administration (IGA) product used to manage user access across enterprise applications. It supports access request workflows, approvals, role and entitlement governance, and lifecycle processes such as joiner/mover/leaver provisioning. The product is typically used by IAM teams, security governance, and compliance stakeholders to enforce access policies and produce audit evidence. It is commonly deployed in environments that require structured access certifications and integration with multiple directories and business applications.

pros

Strong governance and certifications

The product supports access reviews (certifications) and policy-based governance to help organizations validate who has access to what and why. It provides workflow-driven approvals and attestation features that map to common audit and compliance requirements. These capabilities are central for enterprises that need repeatable, documented controls rather than ad hoc provisioning. It is positioned for governance depth compared with lighter identity management tools focused mainly on authentication or basic directory management.

Lifecycle provisioning workflows

RSA Identity Governance and Lifecycle supports joiner/mover/leaver processes to automate access changes as users enter, change roles, or leave the organization. It can orchestrate requests, approvals, and fulfillment steps to reduce manual ticket handling. This helps standardize access changes across multiple systems and reduces reliance on individual administrators. The workflow approach is suited to organizations with formal HR-driven identity processes.

Role and entitlement management

The product includes role modeling and entitlement governance to structure access around business roles and least-privilege principles. It helps identify and manage entitlements across connected systems, supporting separation-of-duties and policy checks where configured. This can improve consistency versus managing access solely through application-specific groups. It is useful when organizations need a centralized view of entitlements for audit and remediation activities.

cons

Implementation can be complex

IGA deployments typically require significant upfront work to model roles, map entitlements, and integrate target systems, and this product is no exception. Organizations often need dedicated IAM expertise to design workflows, certification campaigns, and governance policies. Time-to-value can be longer than simpler identity management tools that focus on a narrower scope. Ongoing maintenance is also required as applications and entitlements change.

Connector coverage varies by system

Effectiveness depends on the availability and maturity of integrations to directories, HR systems, and business applications in the environment. Some applications may require custom integration work or intermediate provisioning methods, which can increase cost and operational effort. Integration gaps can limit automation and force partial manual fulfillment. Buyers should validate required targets and provisioning actions during evaluation.

Less focused on modern CIAM

The product is designed primarily for workforce identity governance rather than customer identity and access management (CIAM) use cases. Organizations needing developer-centric identity building blocks or consumer-scale authentication features may require additional products. It may not be the best fit for teams prioritizing lightweight, API-first identity components over governance workflows. This can lead to a multi-product architecture for broader identity needs.

Seller details

RSA Security LLC
Bedford, Massachusetts, USA
1982
Private
https://www.rsa.com/
https://x.com/RSAsecurity
https://www.linkedin.com/company/rsa-security/

Tools by RSA Security LLC

RSA SecureID
Outseer Fraud Manager
RSA Identity Governance and Lifecycle
RSA SecureID Plus

Popular categories

All categories