Has your organization established an identity governance and administration (IGA) program or implemented an IGA platform solution? What do you consider to be key success factors when it comes to identity governance?

1.3k viewscircle icon5 Comments
Sort by:
Information Security Manager2 months ago

Our IGA journey began in 2012, and after four years, we chose Omada as our tool. Over the past eight years, we've learned that business processes drive IGA success, not technical aspects. Understanding how business processes operate, such as approval workflows and role definitions, is crucial. By aligning IGA with business inputs, we've successfully integrated major systems like Active Directory, Entra, ECC, and now S/4HANA.

Lightbulb on2 circle icon1 Reply
no title2 months ago

Agree to that specifically role based processes not position based processes. This goes quite neat with RBAC architecture than just having everything in PBAC (Policy Based) architecture that may lead to jungle of  customized user group policies

VP of Information Security2 months ago

In my experience, starting small is key to a successful IGA strategy. It's essential to identify critical risk areas, such as compliance-required applications and digital assets exposed to external threats. By categorizing and prioritizing these assets, you can manage the program more effectively and incrementally implement the right IGA solution.

Information Security Analyst2 months ago

We initiated a pilot program with seven applications but paused it to pursue a more advanced solution. Our current legacy system lacks support for open standards and doesn't offer adequate entitlement management or role management capabilities. We plan to restart the program with a new tool that better meets our needs.

1 Reply
no title2 months ago

We faced similar challenges with legacy systems complicating our IGA efforts. Interoperability is crucial, and we haven't yet achieved the desired results with our current identity governance tool. We're evaluating new tools to find a solution that aligns with our needs.

Content you might like

Targeted emails44%

Org-wide newsletters61%

Lunch & learn sessions49%

Posters, desktop screen-savers/wallpapers37%

Security champions across all lines of business19%

Other (please specify)1%

View Results

Yes45%

Some but not all46%

No7%

I don’t know

View Results