Six IGA vendor demos in one quarter. Each opened with impressive dashboards. Compliance posture scores. Risk heat maps. Access certification workflows. Audit-ready reports. Executives nodded approvingly. Then came the real question: “How does this automate which users belong to which groups?” The sales engineer paused. They talked about access requests. They talked about approval workflows. They talked about access reviews where managers certify existing access. But group membership automation? Policy-based provisioning? Eliminating the manual work of adding users to the right resources based on their role? “Well, that would be configured in the IdP. We integrate with Okta.” In other words: that’s not their problem.Documentation Index
Fetch the complete documentation index at: https://docs.provisionr.io/llms.txt
Use this file to discover all available pages before exploring further.
The IGA Value Proposition
Identity Governance and Administration (IGA) vendors solve real problems. The market exists because organizations need access requests (a way for employees to request access to resources they don’t have), approval workflows (routing requests to the right people for authorization), access reviews (periodic certification that existing access is still appropriate), audit reporting (evidence for compliance requirements), and lifecycle orchestration (triggering processes when employees join, move, or leave). These are legitimate needs. Compliance frameworks like SOC 2, ISO 27001, and SOX require evidence of access governance. IGA vendors provide that evidence. The problem isn’t that IGA vendors are bad. The problem is what they optimize for.Built for Compliance, Not Operations
IGA vendors are built to satisfy auditors and executives. Their dashboards answer questions like “What is our compliance posture?” and “How many access requests are pending?” and “What percentage of access reviews are complete?” and “Can we demonstrate least privilege?” These are important questions. They’re not the questions IT administrators ask. IT administrators ask different questions: “How do I automate the 50 onboarding access grants we do every week?” and “How do I keep 15 Google Groups in sync with our team structure?” and “How do I handle the quarterly reorg without rebuilding all my automation?” and “How do I stop processing the same predictable access requests over and over?” IGA vendors don’t optimize for these questions. Their core value proposition assumes access requests and reviews are permanent fixtures. They make those processes more efficient, but they don’t eliminate them. The incentive structure is revealing: if an IGA vendor eliminated the need for access requests, they’d be undermining their own value proposition. “Fewer access request workflows are needed now” isn’t a compelling renewal conversation.The Access Request Treadmill (Revisited)
Consider a typical IGA workflow:- Employee needs access. They can’t do their job without access to a resource.
- Employee submits request. Through the IGA portal, they request access.
- Request is routed. Based on the resource, it goes to the appropriate approver(s).
- Approver reviews. Manager or resource owner evaluates the request.
- Access is granted. IGA triggers provisioning (often via the IdP).
- Access is reviewed. Periodically, the access is recertified.
The Policy Engine Gap
Our founder has has sat through those same IGA demos. And he kept asking the same question: “I understand the access request approvals, but where’s the entitlement policy engine?” Not the approval policy. Not the review policy. The membership policy — the thing that says “users with these attributes belong in this group.” The answers were revealing:- “That would be set up in the IdP group rules.”
- “We integrate with the IdP for provisioning.”
- “Our professional services team can help configure that.”
- “That’s on our roadmap.”
The Workflow Comparison
Compare how access works in a request-centric model vs. a policy-centric model: Request-Centric (Traditional IGA):- New hire joins the Sales team
- New hire discovers they can’t access the Sales shared drive
- New hire submits access request through IGA portal
- Request is routed to manager for approval
- Manager approves (because of course the sales person needs sales access)
- IGA triggers provisioning
- Access is granted (hours or days later)
- Quarterly access review recertifies this access
- Repeat for every resource, every new hire, forever
- Admin defines Ruleset: “Sales shared drive should contain users where department = Sales”
- New hire joins the Sales team
- Directory sync picks up the new user with department = Sales
- Policy engine evaluates all Rulesets—user matches Sales shared drive Ruleset
- Sync job provisions access
- Access is granted (minutes after directory sync)
- Audit queries the policy database for compliance evidence
What IT Admins Actually Need
Based on conversations with dozens of IT teams, here’s what they’re looking for:Policy management
A way to define “who belongs where” based on attributes, not individual requests. Rules that survive reorgs and renames.
Cross-system sync
The same policy should control Google Groups, Okta Groups, Slack channels, and GitLab access. One definition, multiple systems.
Visibility into what's automated
What’s managed by policy vs. what’s manual? Where are the gaps in automation?
Handling for edge cases
Policies cover the 90%. A way to handle the 10% exceptions without abandoning the automation.
Audit trails that don't require forensics
Who has access, why, when was it granted, based on what policy. Queryable, not reconstructed from ticket history.
The Coexistence Model
Here’s the reality: most organizations still need IGA. Compliance requirements aren’t going away. Access reviews are mandated by auditors. Sensitive access genuinely needs approval workflows. But IGA shouldn’t be the only tool. The model that works: IGA handles: sensitive access that requires human approval, compliance reporting and audit evidence, access reviews for high-risk resources, and exceptions that genuinely need manager judgment. Policy engine handles:- Baseline access that’s predictable by role
- Cross-system group membership
- Automatic provisioning and deprovisioning based on attributes
- The 90% of access that doesn’t need human approval
Vendors Don’t Want to Solve This
Here’s the uncomfortable truth: most IGA vendors don’t want to solve the policy problem. If policy-based automation reduces access request volume by 80%, that’s 80% fewer workflows running through their platform. That’s 80% fewer approval notifications. That’s 80% less “value” being demonstrated in their dashboards. Their business model depends on access requests being a permanent fixture. They’ll make requests faster. They’ll add AI to auto-approve routine requests. They’ll streamline the approval UX. But they won’t eliminate the need for requests, because requests are the product. This isn’t a criticism of the companies—they’re rationally following their incentives. But it means the policy problem won’t be solved by IGA vendors. It requires a different tool with different incentives.Finding the Missing Piece
IGA is not the enemy. Compliance matters. Audit trails matter. Approval workflows for sensitive access matter. But IGA isn’t the complete solution. The missing piece is policy-based automation—the thing that provisions 90% of access automatically so workflows are only needed for the exceptions. If an IGA investment isn’t reducing the operational burden on the IT team, it’s because IGA wasn’t designed for operational efficiency. It was designed for compliance. Those are different goals that require different tools. IT administrators deserve tools built for their actual work: keeping access in sync with organizational reality, automatically, without drowning in tickets. That’s what identity governance looks like when it remembers the IT admin.Ready for policy-based automation alongside IGA? See how Provisionr complements existing tools →