RSA Identity Governance and Lifecycle Valuable Features
The functions of RSA Identity Governance and Lifecycle, especially the IGA, are quite strong with their custom forms and workflows integrated.
The user interface is very friendly and easy to use, making it a good product overall. However, it still has to be on-premise and the cloud version is not easily accessible, as dedicated instances are required and machines cannot be shared as multi-tenant for various customers.
The advanced policy features of RSA definitely help in defining certain policies such as segregation of duties.
That's particularly useful along with creating different access reviews.
Regarding access control in simplifying access management, RSA Identity Governance and Lifecycle has strong foundations of groups and roles, which help in defining all policies very easily.
This makes it very easy to integrate with other access management tools or privileged access management tools.
View full review »The most valuable feature of the solution stems from the fact that it is really easy to have connectors to search for on-prem applications and provide access based on roles. In my company, with the help of the solution, we set up job templates based on the HR data we get, and we also provide IT access, a part that we have included in a matrix based on what type of users we have.
View full review »RSA Identity Governance and lifecycles are good for the access certification and auditing sections.
View full review »Buyer's Guide
RSA Identity Governance and Lifecycle
August 2025

Learn what your peers think about RSA Identity Governance and Lifecycle. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
867,370 professionals have used our research since 2012.
The data collection is excellent and easy to do. It does not require a lot of configuration nor does it require rules to be written like other competitors do.
View full review »FR
Fahad Razzaq
Senior Network Engineer at Arwentech
The most valuable feature is the security, in particular, the One Time Password support.
View full review »- Roles
- Connectors for provisioning
- Re-accreditation or reviews
These help greatly to govern user access.
View full review »It's used for basic two-factor authentication.
View full review »It allows users to authenticate using two-factor authentication, which is becoming more and more of a regulatory requirement.
View full review »Random token generation.
View full review »Synchronization with Active Directory to import all your users makes getting started with the product very easy. In conjunction with software based tokens and some end user training, you can be up and running with a fresh deployment in a matter of days.
View full review »Buyer's Guide
RSA Identity Governance and Lifecycle
August 2025

Learn what your peers think about RSA Identity Governance and Lifecycle. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
867,370 professionals have used our research since 2012.