KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges.
Unlock the power of industry-leading insights and expertise. Gain access to our extensive knowledge base, vibrant community, and tailored analyst sessions—all designed to keep you at the forefront of identity security.
Get instant access to our complete research library.
Access essential knowledge at your fingertips with KuppingerCole's extensive resources. From in-depth reports to concise one-pagers, leverage our complete security library to inform strategy and drive innovation.
Get instant access to our complete research library.
Gain access to comprehensive resources, personalized analyst consultations, and exclusive events – all designed to enhance your decision-making capabilities and industry connections.
Get instant access to our complete research library.
Gain a true partner to drive transformative initiatives. Access comprehensive resources, tailored expert guidance, and networking opportunities.
Get instant access to our complete research library.
Optimize your decision-making process with the most comprehensive and up-to-date market data available.
Compare solution offerings and follow predefined best practices or adapt them to the individual requirements of your company.
Configure your individual requirements to discover the ideal solution for your business.
Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals.
Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible.
Looking Into IGA or life cycle management, which is about integrating HR and others to target systems. There are still a couple of vendors which provide a pure play identity provision solution compared to many vendors which have an integrated IGA system. It's more the technical baseline capability, which cares for bringing data from source to targets. So the technical flow of information from source system to target systems with connectors to both sites source and target systems is what lifecycle management or identity provisioning is about.
So it ensures this automated provisioning with the changes of identity and entitlements in target systems. What are the main capabilities here? One of the key and essential features is having connectors to the source and the target systems and systems in that space clearly differentiate by the breadth of connectors. So how many connectors to which types of systems do they have? Do they support all the new SAS services you're onboarding? Do they support specific systems? Maybe if you have a mainframe and other stuff and the connector death. So how deeply are they integrated?
If you take SAP a as a very complex authorization model with business roles and single roles and authorization, objects and transactions. So how deep can they integrate? These are very important aspects to look at. When you look at the capabilities, they also usually come with some level of data mapping and data integration capabilities. So unless you rely on a specific data integration platform, this might be where you map data, which comes from different HR system and other sources. And there's the importance of the automated provisioning flow.
So how can you automate the flow for the things which don't need an involvement of the users? How can you also reach out for involvement of users where required triggering the workflows for human interaction whenever required, And last, not least. There's also the concept of automated reconciliation, which is looking at, for instance, active directory and looking at what has changed since the system last provisioned to active directory.
And if there's something happening as a change directly in active directory, that is a situation which should be identified because there might be unauthorized changes, at least changes, bypassing your lifecycle and provisioning. And then you need to act on these, identify these, roll them back, or at least involve someone to identify whether this is correct. This is lifecycle management piece of IGA.