OpenText home page.
Tech topics

What is Identity Governance and Administration?

Illustration of IT items with focus on a question mark

Overview

With the various identity governance tools on the market, it's not easy to assess what they offer compared to a full-function identity governance and administration (IGA) architecture. In reaction to a security directive, too often, teams take a narrow approach to managing user entitlements or fulfilling their organization's separation of duties requirements.

IGA goes beyond the visibility of entitlements, which is often taken as a snapshot at any point in time. Instead, it takes a holistic and integrative approach to its management. When built on a robust identity life cycle management infrastructure, IGA brings together critical components of an organization's identity and access management infrastructure to ensure that only the right people have access to sensitive information.

Identity Governance and Administration

What defines a complete Identity Governance and Administration solution?

A robust IGA solution distinguishes itself by offering the following benefits:

  • Delivers comprehensive view of accounts and resources—IGA needs to hold the identity, entitlement, and risk information of each resource being managed, as well as the identity and role of those accessing it.
  • Protect against rubber-stamping approvals—with a focus on guarding against unvetted approvals of permission requests, an effective IGA solution includes workflows designed specifically to inform the information and business owners, not IT admins. To raise the level of inspection of the request, it needs to offer all the relevant information about the requester and the resource designed for a quick read with effective productivity and risk indicators.
  • Robust attestation—offers accurate reports that confirm continuous compliance rather than just reporting snapshots in time. When needed, a well-designed IGA infrastructure can provide analytics that confirm actual access by specific groups of users. The design of the report should be quick to review and simple to generate and include in attestation reports. While this level of attestation offers confidence for security teams, it requires that access governance has tight integrations with the identity life cycle and access management components of the comprehensive IGA environment.

What specific value does a complete IGA environment have over other solutions?

While identity governance and administration manage entitlements and deliver strong attestation for the security auditors, it has the potential to be a foundational component of an organization's identity and access management infrastructure:

  • Entitlement management is the fundamental element of any organization's least privilege strategy. Least privilege security helps protect against internal threats as well as limit damage when someone's credentials have been compromised and exploited. When done correctly, it can be used to guide and invoke identity life cycle actions rather than work independently of it.
  • One of the steps of onboarding resources on a governance platform is defining their risk and risk criteria. Proper risk definitions of sensitive resources provide accurate information to the approvers and reviewers. They can also be consumed by the risk service to direct adaptive access management actions. Too often, criteria used for session-based access controls for potential authentication and authorization actions are limited to the user's context (geolocation, IP range, device ID, et.). Factoring in the risk of the resource itself offers a more granular and effective approach to adaptive access that can increase security while optimizing the user's experience. By limiting the number of times a user is interrupted for multi-factor authentication, friction is reduced, and the user's experience is optimized.

What is OpenText Identity and Access Management doing to make their IGA solution

While it’s most important to establish a solid IGA foundation, as described above, OpenText Identity and Access Management is continually pushing the envelope to make governance automation more encompassing and effective in helping information owners protect their data. Near-term identity governance and administration development directions within identity and access management infrastructures include:

  • Beyond providing the best information possible in a format that approvers and reviewers can quickly understand, the next generation of IGA brings together least privilege best practices and organizational policies to automate entitlement analysis. The automated elevation of risk scores of their sensitive information, as well as the users accessing them, highlights points of concern for review and potential security actions.
  • The intelligence-based automation scenario described in the previous bullet is best augmented with behavioral analytics of actual usage. This type of analytics can guide focus on specific identities and resources to reassess the risk they perpetrate on the organization.
  • While traditionally IGA hasn’t included governance of root access to systems, a more formal approach to securing access to server hosted data and executables is necessary. In that system administrators can potentially bypass various security mechanisms, the importance of securing root privileges is obvious. Beyond the ability to delegate and govern different levels of administration, these superusers have so much granted access that advanced monitoring of their system-related actions offers potential valuable forensic information.

A well-built IGA environment isn’t easy to implement. Getting buy-in at the executive level and the various business owners can be a long and uneven process. Pulling in the information owners to properly onboard their resources takes investment, as does keeping in touch with them for changes in their environment that require updates. But the value of this type of security investment pays huge dividends. It allows organizations to be more agile in their digital business operations while keeping their risk low.


Why should I invest in identity governance and administration?

Once you understand the comprehensive nature of IGA, the natural question is whether this level of investment is needed for your environment. While each organization may have unique requirements, here are some common considerations that may guide the depth and breadth of management:

While almost every organization needs to protect its financial and HR information, they may or may not have other types of sensitive data worthy of governance as well:

  • Customer information—this type of information varies widely. Organizations can be subject to various state or federal regulations even if they are collecting cookie information or social identities to personalize content. There are other worldwide mandates as well, such as the General Data Protection Regulation (GDPR). GDPR requirements merit an IGA level of protection because once a personal profile or financial information is retained, there will likely be a need for least privilege security. There is also coordination that needs to take place between the retailers and their service providers (PSPs) and industry partners. Unless these operations are small, it’s hard to imagine them meeting privacy mandates without a mature identity governance solution.
  • Intellectual property whether in the form of patent information, technical or business core competencies, or other trade secrets, a breach of them can pose a serious risk to the organization. Whether or not organizations automate their entitlement processes, a careful review of valued secrets is likely needed before developing a governance strategy.
  • Patient information—the healthcare industry’s digital transformation has forced providers to automate their entitlement management and attestation of their regulated information. The move to electronic healthcare records (EHR) and other protected health information (ePHI) has resulted in stringent, concrete, and punitive privacy government protections. It’s an industry plagued with the highest costing breaches compared to any other. Beyond monetary loss, health record breaches are detrimental to patient trust because they include their most sensitive information. Information spanning both health and financial information can be used to conduct fraud.
  • Financial services—as another highly regulated industry, financial services are subject to a series of regulations designed to prevent malicious collusion and violation of privacy. Privacy is needed to protect against fraud or other types of theft. It’s a safe assertion that every financial institution needs automated governance and would benefit greatly from a solution directly involving data owners.

Identity governance and administration FAQs

What is the difference between identity governance and identity management?
Identity management provisions access, while identity governance ensures access is appropriate, justified, and continuously enforced using policies, certifications, and audit controls across the identity lifecycle.

How does identity governance help with compliance and audits?
IGA enforces least-privilege access, maintains complete audit trails, and supports continuous certifications—so organizations can demonstrate compliance at any time, not just during audits.

Why do many identity governance projects stall or fail?
IGA projects often struggle due to slow application onboarding, rigid data models, and manual review processes. Successful programs focus on automation, flexibility, and real-time visibility across identities and entitlements.

Can identity governance respond to access changes in real time?
Yes. Modern IGA can detect access changes as they occur and automatically remediate them or trigger targeted re-certifications—reducing risk between review cycles.

What should organizations look for in an identity governance solution?
Look for an IGA platform that scales across hybrid environments, integrates with complex systems, supports continuous governance, and reduces manual effort for IT and business users.


How OpenText Delivers identity governance and administration

OpenText delivers identity governance and administration (IGA) as part of a comprehensive IAM platform designed for complex, hybrid enterprises. Rather than treating governance as a standalone layer, OpenText integrates lifecycle management, access governance, and event-driven controls to ensure access stays compliant as environments change.

Unified identity lifecycle and governance
OpenText combines identity lifecycle management with access governance to ensure users receive the right access when they join, change roles, or leave—and that access remains appropriate over time.

Event-driven, continuous governance
Unlike point-in-time reviews, OpenText supports event-driven governance. When access changes outside of approved processes, the system can automatically remediate the issue or trigger a targeted micro-certification—reducing risk between review cycles.

Faster application onboarding with flexible connectors
OpenText accelerates IGA deployments with low-code/no-code connectors that adapt to real-world data formats. This allows organizations to govern more applications—without brittle integrations or constant rework.

Built for hybrid and enterprise-scale environments
OpenText supports on-premises, cloud, and hybrid deployments—making it ideal for organizations with legacy systems, regulated environments, or complex identity infrastructures.

Audit-ready compliance by design
With continuous policy enforcement, full audit trails, and business-friendly certifications, OpenText helps organizations demonstrate compliance at any time—without disruptive audit scrambles.

Learn more about OpenText Identity Governance or the OpenText Core Identity Foundation SaaS platform.

Footnotes