• Download a trial
  • Sales
  • Support
  • Login
logo
  • Home
  • Products
  • Solutions
  • Partners
  • About Us
  • Consulting
  • Resources
Request a Quote
  • Workforce Identity
  • Customer Identity
  • Comparison
  • Subscriptions

All Features

Overview of all features in Workforce Identity

User Onboarding and Offboarding

Automate joiner, mover, leaver processes

Access Request

Access requests with multi-step approvals

User Access Reviews

Save time with user access reviews

Self-Service Portal

Self-service portal for all end user activities

Segregation of Duties

Detect and remediate SoD violations

Password Management

Enforce password policies and enable synchronization

Single Sign-On (SSO)

Enable SSO using standards - SAML, oAuth, OIDC

Authentication and MFA

Improve security with adaptive authentication and MFA

3rd Party IdP Integration

Integrate with your existing identity provider

Integration API

Use the REST API to add identity into your applications

Connector Library

Integrate on-premise and SaaS applications

Modern Architecture

Microservice architecture that supports deployment using RPM, Kubernetes or OpenShift

Workforce Identity Concepts

All Features

Overview of all features in Customer IAM

Authentication and MFA

Improve security with adaptive authentication and MFA 

Single Sign-On (SSO)

Enable SSO using standards - SAML, oAuth, OIDC

Password Management

Enforce password policies and enable synchronization

Modern Architecture

Microservice architecture that supports deployment using RPM, Kubernetes or OpenShift

Customer Identity Concepts

Community vs Enterprise

Summary of the differences between the Community and Enterprise editions

Subscription Benefits

Overview of the benefits provided by an OpenIAM subscription

  • Integrations
  • Verticals
  • Workforce Use Cases
  • CIAM Use Cases
  • Compliance

Active Directory

Manage identity in Active Directory

Azure (O365)

Manage identity in Office365

SAP

Manage identity in SAP S/4 Hana

SAP SuccessFactors

Manage identity in SAP SuccessFactors

Workday

Manage identity in Workday

Education

Manage identity for students, staff and alumni

User Access Requests

Empower end users and improve compliance with user access requests

Strong Authentication

Improve security with adaptive authentication and MFA

Single Sign-On (SSO)

Improve customer experience with SSO

NIS2

Achieve compliance with the EU directive for cybersecurity frameworks.

DORA

Comply with the Digital Operational Resilience Act for the EU.

HIPAA

For healthcare organizations seeking HIPAA compliance.

  • Partners

Current Partners

Our Current Partners

  • About Us

About OpenIAM

Learn about OpenIAM

Press Releases

References to OpenIAM press releases

OpenIAM in the Media

References to OpenIAM in the media

Careers

Learn about open positions at OpenIAM.

  • Consulting

Proof of Value

Customized engagement to confirm defined proof of value objectives

Jump Start

Customized engagement to rapidly deliver a solution into production

Solution Implementation

Engagement with the objective to deliver a complete IAM solution based on customer requirements

  • Resources

Videos

Collection of videos describing how OpenIAM can be used to solve common use cases

Community Portal

Collaborative community portal to learn more about OpenIAM

CE Documentation

Documentation for the Community Edition

Blog

Musings on identity penned by the OpenIAM team

Webinar Calendar

Upcoming webinars and training sessions

Workforce Identity Concepts

Customer Identity Concepts

IGA vs AM

How does IGA differ from AM?

Identity governance and administration (IGA) involves the administrative management of accounts & permissions before and after a user has logged into the IAM system, rather than at the moment of access. On the other hand, access management (AM) steps in during real-time use, working when users are trying to log in to access resources, ensuring the right people get access to the right things at the right time. 

IGA involves processing requests for access, approval workflows and logs what kind of access has been given thus aiding in compliance. It acts as a central hub of user identities and access rights.  

Access Management (AM) becomes active when user accesses a resource. AM provides a seamless experience for users through less friction by leveraging authentication methods such as single sign-on (SSO) that enable one login to access multiple systems.  It also enhances security by enabling MFA to secure access and ensuring right authorization polices are enforced.

What is identity governance and administration (IGA)?

Corporate information security, risk management, compliance teams, and IT organizations utilize Identity Governance and Administration (IGA) solutions to manage digital identities and access permissions across many platforms. IGA solutions assist firms in increasing security, simplifying processes, streamlining onboarding, and complying with government rules, industry standards, or company policies.

IGA capabilities are just one component of a unified identity security platform, which also includes identity and access management (IAM) and privileged access management (PAM) services.

Identity governance and administration (IGA) includes entitlement management, user lifecycle management, access certification, access request workflows and reporting. IGA enables businesses to proactively integrate identity management activities into a cohesive strategy. 

Benefits of identity governance and administration (IGA)

Identity governance and administration (IGA) is vital for managing user identities and assuring the security, compliance, and efficiency of key resource access. Here are the main benefits of using IGA. 

  • Scalable access: Because it is automated, access can be readily scaled to numerous environments and permissions. This allows for speedier provisioning, even as the number of users increase.
  • Streamlined user lifecycle management: Automation simplifies staff onboarding and offboarding. When workers change positions, their permissions change immediately—just alter their role, and all apps and databases will establish the appropriate access level.
  • Automatic tracking of access requests: A centralized vantage point provides visibility into potential breaches, giving you more control over users, devices, and networks. This makes problems easier to identify and fix.
  • Enhanced reporting: Reports and analytics contain information from throughout the IT ecosystem, making audits easier. Automated reporting reduces mistakes and enables more accurate decision-making.

Key functions of IGA

  • Identity lifecycle management: IGA handles the whole lifecycle of a user's identity, from onboarding (provisioning) to offboarding (deprovisioning), ensuring that users have the appropriate access for their position.
  • Access request and approval workflows: IGA offers a systematic method for users to seek access to particular resources, with automatic approval workflows that include appropriate managers or stakeholders.
  • Role management: IGA assists the organization in defining and managing user roles, ensuring that roles are given based on responsibilities and that roles are evaluated on a regular basis.
  • Access review and certifications: Audits and certifications should be performed on a regular basis to ensure policy and regulatory compliance. IGA automates periodic access evaluations to ensure that users have proper access to resources.
  • Compliance and reporting: IGA delivers thorough reporting on access restrictions, user activities, and governance procedures to assist organizations in meeting regulatory obligations such as GDPR, SOX, and HIPAA.

What is access management (AM)?

Access Management (AM) operates when users are actively accessing the IAM system. It guarantees that authorized users have the necessary permissions to access the resources they require. 

AM solutions incorporate an identity provider (IdP) and impose runtime access rules for cloud, contemporary standards-based, and conventional web applications. AM aims to provide a simplified and uniform user experience by enabling single sign-on (SSO) access. AM provides security features to safeguard user sessions throughout runtime, including MFA and adaptive authentication. Finally, AM may give identity context for other cybersecurity solutions, promoting identity-first security.

Benefits of access management (AM)

Access management is an information security technique that grants users access to essential resources as needed. It has three main concepts: identity, authentication, and authorization. These three procedures work together to guarantee that specific users have the necessary access to execute their duties while protecting critical resources and information from unauthorized users.

  • Multi-factor authentication: Multi-factor authentication (MFA) requires the user to present at least two pieces of evidence to validate their identity. This reduces the possibility of identity theft. 

  • Single sign-on (SSO): AM provides single sign-on (SSO) capabilities, which allows users to log in once and access various apps without having to re-enter credentials. This enhances the user experience by minimizing password fatigue and lowering the likelihood of users repeating weak passwords across many services.
  • Adaptive authentication: AM allows for adaptive authentication functionality based on contextual information such as user location, device and behavior. This guarantees that access is provided or restricted based on the amount of risk, improving the overall security of the system.
  • Improved user experience: AM enhances the user experience by simplifying the login process using SSO and seamless authentication, letting users access numerous resources more quickly and effectively. This leads to more productivity and less irritation with cumbersome login processes.

Key functions of AM

  • Authentication and authorization: AM verifies a user's identity (authentication) and ensures that they have the required permissions to access specified resources (authorization). Multi-factor authentication (MFA) and single sign-on (SSO) are popular methods used in AM to improve security and user comfort.
  • Session management: AM controls user sessions, ensuring that authenticated sessions are safe, and that session timeouts or re-authentication requirements are enforced as needed.
  • Federated identity: AM allows users to access resources across domains or organizations by establishing trust between identity providers and service providers, frequently through protocols like as OAuth, OpenID Connect, or SAML.
  • Access policies: AM applies access controls based on the user's role, location, device, and time of access.

How IGA and AM work together

While IGA and AM have unique duties, they work together to provide a secure identity and access management system. IGA offers the governance structure that ensures users are given appropriate access permissions based on their responsibilities, while AM enforces those access rules in real time when users interact with systems and applications.

Let’s Connect

Managing identity can be complex. Let OpenIAM simplify how you manage all of your identities from a converged modern platform hosted on-premises or in the cloud.

For 15 years, OpenIAM has been helping mid to large enterprises globally improve security and end user satisfaction while lowering operational costs.

Download a Trial Contact Sales
footer-top-logo
openIAM-white-logo

All modules of our IAM platform share a common infrastructure allowing customers to see one unified identity solution versus a collection of disparate products.

  • linkedin-icon
  • facebook-icon
  • twitter-icon
  • youtube-icon

sales@openiam.com

(858)935-7561

Copyright © 2025 OpenIAM. All rights reserved.
  • Privacy Policy