Identity and Access Governance
Identity and Access Governance
Key Findings
IAG replaces Gartner terminology formerly known as "role life cycle management" and
"entitlement life cycle management." It covers a broader set of functions and is focused
on governing access use and identity administration rather than just roles.
The IAG market is one of the fastest growing in identity and access management (IAM),
driven by the need for better compliance intelligence and more effective governance.
IAG represents the most direct interface between IT and business users for their identity
governance requirements.
Recommendations
Document the existing IAG process(es), organizational structure and resources used in
the enterprise to evaluate current governance abilities.
Assess the current state of your identity data model and determine the changes that
may be required to effectively use IAG processes and technology.
Consider using IAG tools and services when establishing access governance is the key
deliverable.
© 2011 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its
affiliates. This publication may not be reproduced or distributed in any form without Gartner's prior written permission. The
information contained in this publication has been obtained from sources believed to be reliable. Gartner disclaims all
warranties as to the accuracy, completeness or adequacy of such information and shall have no liability for errors,
omissions or inadequacies in such information. This publication consists of the opinions of Gartner's research organization
and should not be construed as statements of fact. The opinions expressed herein are subject to change without notice.
Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice or
services and its research should not be construed or used as such. Gartner is a public company, and its shareholders may
include firms and funds that have financial interests in entities covered in Gartner research. Gartner's Board of Directors
may include senior managers of these firms or funds. Gartner research is produced independently by its research
organization without input or influence from these firms, funds or their managers. For further information on the
independence and integrity of Gartner research, see "Guiding Principles on Independence and Objecti vity" on its website,
http://www.gartner.com/technology/about/ombudsman/omb_guide2.jsp
TABLE OF CONTENTS
Analysis ....................................................................................................................................... 3
Background and Context.................................................................................................. 4
The Identity Data Model ...................................................................................... 5
IAG Workflow and Administration ........................................................................ 6
IAG Identity Data Use, Monitoring and Optimization............................................. 6
IAG Products and Services .................................................................................. 7
IAG Stand-Alone Vendors ................................................................................... 7
IAM Suite Vendor Products ................................................................................. 7
Identity Administration Vendors (With Some IAG Functionality)............................ 8
Other Vendors With IAG and IAI Functionality ..................................................... 8
The Impact ...................................................................................................................... 9
Conclusion....................................................................................................................... 9
Recommended Reading ............................................................................................................... 9
LIST OF FIGURES
Choosing IAM solutions mostly centers on the formal access request process. An effective
process is defined by the business and automated where it is most needed. Choice is also a
function of the software's ability to best represent an identity data model that most closely aligns
with the business view of identity information and its use. IAG represents a significant part of the
IT governance, risk and compliance (GRC) practice. As such, it is part of a structured set of
processes and activities with defined inputs and outputs, coupled with specific skill sets for
administrators and users alike. IAG software should be capable of integrating well with IT GRC
Access certification
Role management
Entitlement administration
The IAG market explored in this research delivers products to support these capabilities. IAG
customers can use some, many or all these capabilities in establishing IAG for their enterprises.
IAG is part of the IAM process, as defined in previous Gartner research (see "A Process View of
Identity and Access Management Is Essential"). The purpose of this research is to examine the
market for IAG tools, the features available in IAG tools, and how IAG tools fit in an IAM system.
IAG organizations will be addressed in future research.
In terms of function, distinct IAG tools have three major categories: creating an identity data
model, administering the access request process, and monitoring the process to ensure that
access complies with policies. The first category can be described as the construction of a
structured view of identity data in preparation for (and required by) the IAG process. It consists of
what Gartner refers to as the "atomic elements" of IAM:
Access policies to define how IAG interprets business requirements for access
Rules that are specific instructions to software for implementing access policies based
on the context from attributes
An example of a relationship is the definition of rule sets to execute policy, and the assignment of
attributes to identifiers to define the identity's context in light of those rules. A combination of the
rules and attributes during an access decision step can determine the entitlements used for that
access decision. The interplay between these elements is a constant and dynamic aspect of the
identity data model, and is a key measure of the success of an IAG tool implementation.
Those that are focused on building an identity data model through discovery, mining and
engineering, and focused on providing a workflow for requesting and administering
granular access.
Those that deliver one or more IAG functions as part of a broader IAM suite.
Those that have significant IAG functionality as part of another product within their suite.
Those that are focused on related areas of IAG and possess some IAG and IAI features,
but are not considered IAG products. Often, such products are associated with CCM or
segregation of duties.
The next section features a representative sample of these vendor types. It is not an exhaustive
list of vendors and their IAG products fitting the descriptions above, but it does provide an
understanding of market participation. Forthcoming in late 2011 is a more extensive Magic
Quadrant study of the IAG market that will focus primarily on the first two vendor types, and
provide more detail regarding vendor capabilities and market positions.
CrossIdeas (Rome)
Products: Ideas Core, Access Certifier, Role Constructor, Compliance Control for SAP-CCS
Omada (Copenhagen)
Products: Omada Identity Suite (includes Compliance Attestation Manager, Compliance Report
Center and Advanced Role-Based Access Control)
Quest (Aliso Viejo, California)
Products: Quest One Identity Manager, ActiveRoles Server
SAP (Walldorf, Germany)
Product: SAP NetWeaver Identity Management
Siemens (Munich)
Products: DirX Identity, DirX Audit
The Impact
The IAG market of products and services will continue to grow and expand rapidly as more
enterprises elevate the general IAM debate and choices to fulfill governance mandates for access
to critical IT systems and applications. Through 2014, IAG will represent the fastest growing
segment of the IAM market, outpacing user provisioning, access management and directory
services growth. New entrants will attempt to leverage existing IAM product implementations, as
well as expand IAG product capabilities in data management, policy management and workflow,
by partnering with more traditional vendors in those areas or by incorporating feature sets from
them. IAI value from IAG will grow as more-formal programs for identity data repository and use
analytics are applied, resulting in more use cases demanding IAI from governance.
Major IAM suite vendors are seeking to incorporate IAG administration and workflow functionality
into more traditional IAM products, such as user provisioning, leaving more complex features to
support the construction of identity data models and analytics for identity data use in other
product sets of their portfolios. This is likely to place increasing pressure on stand-alone IAG
vendors to innovate in an attempt to penetrate well-established customer bases of IAM suite
providers. Construction, rationalization and/or cleansing of identity data repositories will increase
as enterprises position themselves better to use IAG tools, and IAI derived from them, by fixing
problematic identity data models to more accurately reflect the way enterprises use identities.
New buying centers continue to rise as IAG directly addresses what business process and
application owners desire in governing access, focusing more on financial, auditing and risk
decision makers, coupled with IT assistance. The complexity of building a representative identity
data model and subsequent workflows will increase enterprise dependency on consulting and
integration services. Such services will continue to grow and expand as IAG takes its proper
place in addressing IT GRC concerns in the enterprise. Traditional IAM integrators are already
expanding and consolidating roles and experience in IAG, and developing good IAI.
Conclusion
Technology and service providers should recognize that enterprises have specific requirements
that mandate governance over access and the identity life cycle. Those requirements will
establish prerequisites for processes, people and infrastructure, and inform the enterprise of a
priority to deliver the changes necessary. There are indications that enterprises that have
deployed basic IAM systems are ready for IAG, as long as the prerequisites are identified and
prioritized. For many enterprises, IAG is, first and foremost, a fulfillment of governing the total
end-to-end process of access, including approval and certification. Providers must continue to
refine the definition of IAG in that context, and provide enterprises with a reasonable justification
for the steps required to realize IAG deployment and use.
RECOMMENDED READING
Some documents may not be available as part of your current Gartner subscription.
"Entitlement Life Cycle Management: The Evolution of Role Life Cycle Management"
REGIONAL HEADQUARTERS
Corporate Headquarters
56 Top Gallant Road
Stamford, CT 06902-7700
U.S.A.
+1 203 964 0096
European Headquarters
Tamesis
The Glanty
Egham
Surrey, TW20 9AW
UNITED KINGDOM
+44 1784 431611
Asia/Pacific Headquarters
Gartner Australasia Pty. Ltd.
Level 9, 141 Walker Street
North Sydney
New South Wales 2060
AUSTRALIA
+61 2 9459 4600
Japan Headquarters
Gartner Japan Ltd.
Aobadai Hills, 6F
7-7, Aobadai, 4-chome
Meguro-ku, Tokyo 153-0042
JAPAN
+81 3 3481 3670