Identity Governance and AdministrationReviews and Ratings
What are Identity Governance and Administration?
Gartner defines identity governance and administration (IGA) as the solution to manage the identity life cycle and govern access across on-premises and cloud environments. To accomplish this, IGA tools aggregate and correlate disparate identity and access rights data, and provide full capability controls over accounts and associated access.
Identity Security Cloud is a software designed to help organizations manage and secure digital identities across various systems and applications. The software provides automated identity lifecycle management, access controls, and compliance features to enable organizations to streamline user provisioning and deprovisioning, enforce access policies, and monitor user activities. Identity Security Cloud integrates with a range of business applications and infrastructure, supporting secure single sign-on, password management, and risk-based access decisions. The software addresses business requirements for mitigating identity-related security risks, maintaining regulatory compliance, and improving operational efficiency by centralizing identity governance and administration.
Saviynt Identity Cloud is a software that provides identity governance and administration capabilities for organizations. The software enables enterprises to manage user identities, access, and entitlements across cloud, hybrid, and on-premises environments. It offers features including automated provisioning and deprovisioning, access requests, risk-based access reviews, compliance reporting, and integration with a range of applications and systems. The software addresses business challenges related to security, compliance, and risk by ensuring that only authorized users have appropriate access to critical resources and data while supporting regulatory requirements and audit readiness.
ManageEngine ADManager Plus is a software designed for Active Directory management and reporting. It enables IT administrators to automate user provisioning and de-provisioning tasks, manage groups, computers, and other directory objects, and create predefined reports on users, security groups, and permissions. The software provides role-based access control and workflow management to streamline operations and maintain compliance with organizational policies. ADManager Plus addresses business needs related to user lifecycle management, audit readiness, and ensuring security across Windows networks by simplifying routine tasks and minimizing the risk associated with manual processes.
Oracle Identity Governance is a software designed to manage user identities and access across enterprise environments. It provides functionalities for automating provisioning, managing the lifecycle of identities, conducting certification and compliance, and handling access requests. The software addresses business needs related to regulatory compliance and risk management by helping organizations ensure that access to systems and data is appropriately controlled and auditable. Oracle Identity Governance integrates with a range of applications and systems to deliver centralized identity administration and offers self-service features, workflow customization, and reporting tools to support governance processes.
ManageEngine AD360 is an identity and access management software designed to streamline user lifecycle management, access governance, and security administration in Windows Active Directory, Microsoft 365, and other enterprise applications. The software features tools for user provisioning and de-provisioning, password management, access controls, and compliance audits. It automates routine administrative tasks and provides reporting to support organizational security and regulatory requirements. AD360 assists businesses in managing user identities efficiently, enhancing authentication workflows, and meeting policy standards for data protection and access.
Okta Lifecycle Management is a software designed to automate the onboarding and offboarding of users, streamline the provisioning and deprovisioning of access to applications, and manage user identities within organizations. The software enables centralized control over user account creation, updates, and termination across various systems, ensuring that users have appropriate access based on their roles. Okta Lifecycle Management supports integrations with multiple directories and cloud applications, enforces security policies, and helps maintain compliance by providing detailed audit trails. This software addresses the challenge of manual identity management processes, reducing the risk of errors and unauthorized access, and assisting organizations in increasing operational efficiency and security during user transitions.
One Identity Manager is an identity and access management software designed to help organizations manage user identities, entitlements, and security policies across diverse IT environments. The software enables automation of account creation, modification, and removal, as well as governance over access privileges and compliance with regulatory requirements. It provides capabilities for role-based access control, workflow-driven provisioning, and auditing to help organizations reduce risk and maintain consistent business processes. By centralizing identity lifecycle management and integrating with various applications and directories, the software addresses operational efficiency and security challenges related to user access in complex enterprise infrastructures.
Omada Identity is a software focused on identity governance and administration, providing organizations with tools to manage user access and permissions across systems and applications. The software automates user lifecycle processes, including onboarding, role assignment, and deprovisioning, to enhance security and enable regulatory compliance. It offers features such as role-based access control, workflow automation, policy enforcement, and reporting to address business challenges related to mitigating access risks and ensuring that access rights are aligned with organizational policies. The software aims to help organizations reduce manual work, prevent unauthorized access, and facilitate audits by offering a centralized platform for identity management and access reviews.
RadiantOne Identity Data Platform is a software designed to unify and manage identity data across diverse systems and sources within an organization. The software integrates identity information from directories, databases, and cloud platforms, providing a centralized view for identity governance and access management. It enables organizations to streamline authentication and authorization processes by consolidating fragmented identity silos, supporting identity synchronization and virtualization. RadiantOne Identity Data Platform aims to address business challenges related to identity complexity, compliance, and security by enhancing the consistency and reliability of identity data for applications and services, facilitating interoperability and scalability for identity-driven initiatives.
IBM Security Verify Governance is a software designed to manage identity governance and administration within organizations. It provides capabilities for access certification, role management, policy enforcement, and segregation of duties. The software enables businesses to automate user access and entitlement reviews, ensuring that appropriate access rights are granted and maintained in accordance with organizational policies. Through integration with various applications and systems, it supports regulatory compliance and internal security requirements by monitoring and reporting on user activities and access risks. IBM Security Verify Governance addresses the need for consistent and auditable control over digital identities, facilitating secure access while minimizing operational risk.
Microsoft Entra ID is an identity and access management software designed to help organizations securely manage user identities and control access to applications and resources. The software offers features such as single sign-on, multifactor authentication, and conditional access policies to facilitate secure authentication and authorization processes. Entra ID enables centralized administration of users, groups, and devices, supporting hybrid environments with integration across cloud-based and on-premises applications. It addresses the business need for secure access management by providing tools for identity governance, monitoring, and reporting on user activities. The software helps organizations reduce security risks associated with unauthorized access and streamlines user lifecycle management.
RSA Governance & Lifecycle is a software designed to manage identity and access governance within organizations. The software offers features for automating user access requests, policy management, and compliance reporting. It enables centralized administration of user identities, streamlines approval workflows, and delivers tools for detecting and mitigating access-related risks. RSA Governance & Lifecycle supports integration with various enterprise applications and systems to facilitate seamless provisioning and de-provisioning of access. The software helps organizations address regulatory requirements by providing audit trails and enforcement of security controls, aiming to reduce manual processes and enhance oversight across identity management functions.
Netwrix Directory Manager is a directory management solution that automates and delegates user, group, and access lifecycle tasks across Active Directory, Microsoft Entra ID, and Google Workspace. It enables organizations to streamline provisioning, deprovisioning, and modification processes, enforce least privilege with time-bound access, and maintain directory hygiene with lifecycle policies and attestation. Workflow-driven delegation allows non-IT staff to manage requests securely while maintaining centralized oversight. The solution integrates with ITSM tools and supports self-service password reset, Microsoft Teams governance, and application provisioning. Built-in auditing, reporting, and policy enforcement help reduce risk, improve efficiency, and support compliance.
Symantec IGA is a software designed to manage identity governance and administration for organizations. The software provides capabilities for automating user provisioning, managing access rights, and enforcing security policies across various IT systems. It supports integration with different applications, directories, and platforms, enabling centralized control over user identities and entitlements. Symantec IGA addresses compliance requirements by providing tools for policy enforcement, access certification, and audit reporting. The software aims to reduce manual processes associated with identity management and helps minimize security risks by ensuring that users have appropriate access based on their roles and responsibilities within the organization.
SAP Access Control is a software designed to help organizations manage and monitor user access across enterprise systems. The software features automated access risk analysis, role management, and compliant provisioning to reduce unauthorized access and segregation of duties conflicts. It facilitates policy enforcement through workflow-based approval processes and periodic access review cycles. SAP Access Control also integrates with identity management solutions to streamline user provisioning and deprovisioning. This software assists businesses in meeting governance and compliance requirements by enabling detailed audit trails and continuous monitoring of access-related activities, helping address regulatory demands and internal policies associated with access governance.
Saviynt Application Access Governance software provides organizations with the capability to manage and secure user access to applications across enterprise environments. The software enables automated provisioning and deprovisioning of user accounts, continuous monitoring of user entitlements, and enforcement of access policies. It integrates with various on-premises and cloud applications, allowing centralized oversight of application access and adherence to compliance requirements. The software supports risk-based access controls, helping organizations identify and remediate inappropriate permissions, reduce potential security threats from excessive access, and facilitate audits. Its reporting features assist in demonstrating policy compliance and access history for governance purposes.
Omada Identity Cloud is a software designed to manage identity governance and administration for organizations. The software provides features for automating user provisioning, access certification, and role management. It enables organizations to enforce policies related to user access rights and supports compliance with regulatory requirements. Omada Identity Cloud integrates with various IT systems to centralize identity lifecycle management, reduce manual processes, and help minimize the risk of unauthorized access. The software offers analytics and reporting tools to support audit and decision-making processes, aiming to address challenges related to access control and identity management across complex enterprise environments.
OpenText Identity Manager software provides identity management capabilities that automate user provisioning, access management, and identity lifecycle processes across diverse IT environments. The software enables organizations to centrally manage user identities, access permissions, and policy enforcement, helping streamline administrative tasks and maintain compliance with regulatory requirements. It facilitates integration with a variety of systems, applications, and directories, supports role-based access controls, and offers workflows for request and approval management. OpenText Identity Manager addresses the business need for secure and efficient management of digital identities, reducing manual effort, and supporting organizations in ensuring that the right individuals have appropriate access to resources throughout the user lifecycle.
Pathlock Cloud provides fine-grained identity security and governance for business-critical applications, helping organizations reduce risk, lower compliance costs, and maintain audit and IPO readiness.
It enables organizations to quickly implement controls, analytics, and automated workflows to ensure comprehensive, granular, and efficient compliance across their diverse application landscape.
Supporting over 140 applications, Pathlock Cloud allows businesses to manage all aspects of application governance from a single platform—including user provisioning and temporary access elevation, continuous user access reviews, risk analysis, control testing, transaction monitoring, and audit preparation.
Lumos Next-Gen IGA is an identity governance and administration software designed to help organizations manage user access and entitlements across various applications and systems. The software provides features such as automated provisioning and deprovisioning of users, access reviews, policy management, and compliance reporting. It enables organizations to enforce security policies, maintain regulatory compliance, and reduce the risk of unauthorized access by ensuring that users have appropriate permissions aligned with their roles. The software supports integration with cloud and on-premises applications, offering centralized visibility into user identities and access activities, assisting in streamlining identity lifecycle management and improving audit readiness.
Show More Details
Features of Identity Governance and Administration
Updated November 2025
Mandatory Features:
Identity life cycle management and identity data integration (including with multiple sources)
Entitlement management and data integration (e.g., discovery, entitlement catalog management, and entitlement data enrichment, including descriptions, owners and sensitivity ratings)
Policy and role management
Auditing, reporting and basic analytics (descriptive and diagnostic analytics), including risk scoring
Provisioning via automated connectors (including some options for apps that don’t use System for Cross-Domain Identity Management [SCIM]) and via integration to IT service management (ITSM)/ticketing systems to trigger manual fulfillment flows
Access certification (also called attestation or review)
Access request processing and workflow orchestration
Peer Lessons Learned for Identity Governance and Administration
Published February 2025
These lessons focuses on the responses to the questions: “If you could start over, what would your organization do differently?” and “What one piece of advice would you give other prospective customers?”