Best Identity Governance and Administration (IGA) Software for Salesforce (2024)

Compare the Top Identity Governance and Administration (IGA) Software that integrates with Salesforce as of August 2024

Sort By:

This a list of Identity Governance and Administration (IGA) software that integrates with Salesforce. Use the filters on the left to addadditional filters for products that have integrations with Salesforce.View the products that work with Salesforce in the table below.

What is Identity Governance and Administration (IGA) Software for Salesforce?

Identity Governance and Administration (IGA) software is software designed to manage and control user identities and access rights within an organization. It enables businesses to automate the provisioning, de-provisioning, and management of user accounts across various systems and applications. IGA software also provides tools for enforcing security policies, conducting access reviews, and ensuring compliance with regulatory requirements. By offering real-time visibility into who has access to what, the software helps organizations mitigate risks and prevent unauthorized access to sensitive data. Ultimately, IGA software enhances security, streamlines identity management processes, and ensures that access rights are aligned with organizational policies and business needs.Compare and read user reviews of the best Identity Governance and Administration (IGA) software for Salesforce currently available using the table below. This list is updated regularly.

Need help deciding?

Talk to one of our software experts for free. They will help you select the best softwarefor your business.

Get A Quote

Submitting...

  • 1

    Auth0

    Okta

    Auth0 by Okta takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is part of Okta, The World’s Identity Company™.Auth0 lets you quickly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control.Authenticate users across all applications with a customized, secure, and standards-based single login. Universal Login connects users to a central authorization server. Credentials aren’t transferred across sources, which boosts security and protects against phishing and credential stuffing attacks. OAuth 2.0 recommends that only external user agents (like the browser) be used by native applications for authentication flows. Auth0’s Universal Login achieves this while enabling SSO.

    Best Identity Governance and Administration (IGA) Software for Salesforce (2)

    803 Ratings

    Starting Price:$35 per month

    View Software

  • 2

    Okta

    Okta

    One platform, infinite ways to connect to your employees and customers. Build auth into any app. Create secure, delightful experiences quickly by offloading customer identity management to Okta. Get security, scalability, reliability, and flexibility by combining Okta’s Customer Identity products to build the stack you need. Protect and enable your employees, contractors, and partners. Secure your employees—wherever they are—with Okta’s workforce identity solutions. Get the tools to secure and automate cloud journeys, with full support for hybrid environments along the way. Companies around the world trust Okta with their workforce identity.

    Best Identity Governance and Administration (IGA) Software for Salesforce (4)

    7 Ratings

    View Software

  • 3

    Microsoft Entra ID (formerly known as Azure Active Directory) is a comprehensive identity and access management cloud solution that combines core directory services, application access management, and advanced identity protection. Safeguard your organization with a cloud identity and access management solution that connects employees, customers, and partners to their apps, devices, and data. Protect access to resources and data using strong authentication and risk-based adaptive access policies without compromising user experience. Provide a fast, easy sign-in experience across your multicloud environment to keep your users productive, reduce time managing passwords, and increase productivity. Manage all your identities and access to all your applications in a central location, whether they’re in the cloud or on-premises, to improve visibility and control.

    4 Ratings

    View Software

  • 4

    Rippling

    Rippling

    Rippling gives businesses one place to run HR, IT, and Finance—globally. It brings together all of the workforce systems that are normally scattered across a company, like payroll, expenses, benefits, and computers. For the first time ever, you can manage and automate every part of the employee lifecycle in a single system.Take onboarding, for example. With Rippling, you can hire a new employee anywhere in the world and set up their payroll, corporate card, computer, benefits, and even third-party apps like Slack and Microsoft 365—all within 90 seconds.

    2 Ratings

    Starting Price:$35.00 per month

    View Software

  • 5

    OpenIAM

    OpenIAM

    Identity Governance and Web Access Management. As new employees join your organization, you face the conundrum of ensuring that they are given rights to all the systems and resources they need to do their work on the day they join the firm. Similarly, when a person changes positions within the firm, access that is no longer relevant must be revoked and access that is needed for their new position must be granted. For the situation of users leaving the firm or being terminated, it is even more imperative that permissions be addressed. Access to sensitive applications and data must be disabled/removed in a timely manner with traceability to avoid the consequences of a disgruntled user.

    1 Rating

    View Software

  • 6

    AvePoint

    AvePoint

    AvePoint is the only full-suite data management solutions provider for digital collaboration platforms. Our AOS platform boasts the largest software-as-a-service user base in the Microsoft 365 ecosystem. Over 7 million users worldwide trust AvePoint to migrate, manage, and protect their cloud investments. Our SaaS platform is enterprise-grade with hyper scale, robust security and support. We are available across 12 Azure data centers, our products are in 4 languages, we offer 24/7 support and boast market-leading security credentials such as ISO 27001 and FedRAMP in-process. Our comprehensive and integrated product portfolio provides extra value to organizations leveraging Microsoft that want a consistent experience without the pain of having to manage multiple vendors. Automate governance to scale adoption and IT operations while simplifying oversight and collaboration. Reduce more risk by improving process, content security, and compliance across more collaboration platforms.

    View Software

  • 7

    RadiantOne

    Radiant Logic

    Make identity a business enabler with a unified platform that transforms your existing infrastructure into a resource for the entire organization.RadiantOne is the cornerstone of complex identity infrastructures.Harness your identity data with intelligent integration to drive better business outcomes, improve security and compliance posture, increase speed-to-market, and more. Without RadiantOne, companies must rely on custom coding, rework, and ongoing maintenance to make new initiatives work with existing environments. Expensive solutions can’t be deployed on time or on budget, negatively impacting ROI and causing employee frustration. Identity frameworks that can’t scale waste time and resources, with employees struggling to deploy new solutions for users. Rigid, static systems can’t meet changing requirements, leading to duplicate efforts and repeated processes.

    View Software

  • 8

    Access Auditor

    Security Compliance Corp

    Access Auditor automates user entitlement reviews and user access reviews. Access Auditor also alerts on changes in user access rights, and watches for separation of duties violations, and shows who has access to what. Users can be imported from any AD/LDAP, Database, or any REST API. Enterprise roles (RBAC) can be modeled and defined, allowing full RBAC reviews and provisioning.Access Manager leverages the same ease-of-use to automate the provisioning and management of user access rights. Any system with a database, LDAP, or REST API can be automatically managed via role based access controls.SCC’s powerful and simple approach to Identity Management enables a very rapid success at a low overall cost. With a 100% customer success rate, Access Auditor is the fastest and simplest solution available and can automate your user access reviews in under a week.

    View Software

  • 9

    EmpowerID

    EmpowerID

    EmpowerID is the award winning all-in-one identity management and cloud security suite developed by The Dot Net Factory, LLC dba "EmpowerID". Responsible for managing millions of internal and external cloud and on-premise identities for organizations around the globe, EmpowerID delivers the broadest range of ready to use IAM functionality. In-depth out of the box solutions include: single sign-on, user provisioning, identity governance, group management, role mining, delegated identity administration, password management, privileged access management, access management for SharePoint, and an identity platform for application developers. All solutions leverage a single sophisticated role and attribute-based authorization engine that handles complex organizations and even multi-tenant SaaS providers. We provide a highly scalable, fully customizable IAM infrastructure that delivers results in a more time and cost-efficient manner for your enterprise.

    Starting Price:$2 per user per month

    View Software

  • 10

    Avatier Identity Anywhere

    Avatier

    Introducing Identity Anywhere, the world’s first Identity Management solution based on Docker containers making it the most portable, scalable and secure solution on the market. Docker container technology allows Identity Anywhere to run anywhere: on any cloud, on premise or a private cloud instance hosted by Avatier. Avatier Identity Management products brings separately administered back office applications and assets together to manage them as one system. Now armed with a unified digital dashboard, C-level executives deliver measurable business growth and increased profits. Eliminate the #1 Help Desk request with military grade self-service password reset. Reduce Costs. Only pay for the cloud app licenses you need. Maximize company utilization with a phenomenal shopping cart experience. Avoid fines, lawsuits, negative publicity, and even jail time due to non-compliance.

    Starting Price:$5.00/one-time/user

    View Software

  • 11

    SecurEnds

    SecurEnds

    SecurEnds cloud software enables the world’s most forward-thinking companies to automate: User Access Reviews, Access Certifications, Entitlement Audits, Access Requests, and Identity Analytics. Load employee data from a Human Resources Management System (e.g., ADP, Workday, Ultipro, Paycom) using built-in SecurEnds connectors or files. Use built-in connectors and flex connectors to pull identities across enterprise applications (e.g., Active Directory, Salesforce, Oracle), databases (e.g., SQL Server, MySQL, PostreSQL), and cloud applications (e.g., AWS, Azure, Jira). Perform user access reviews by role or attribute as frequently as needed. Application owners can use delta campaigns to track any changes since the last campaign. Send remediation tickets directly to application owners to perform access updates. Auditors can also be granted access to review dashboards and remediations.

    View Software

  • 12

    Zilla Security

    Zilla Security

    Zilla gives security teams the visibility and automation required to ensure that your cloud applications are secure and compliant. With Zilla, you can be sure that all your application security settings are correct, permissions are appropriate and onboarded API-based integrations are not leaking critical data. A growing cloud footprint creates an ever-expanding web of data interactions. Automated access reviews are now critical to ensuring that users and API based integrations have the right access. Labor intensive spreadsheets or complex identity governance products with expensive professional services engagements are no longer the only way to achieve access compliance. Automated collectors make it a snap to bring in permission data from all your cloud services and on-premises systems as required.

    View Software

  • 13

    Lumos

    Lumos

    Lumos is the internal AppStore for companies. Accelerate access requests, access reviews, and license management through self-service. Cut down on support tickets with automated access requests, approvals, and provisioning. Gain visibility into all your SaaS apps and spend. Remove unused licenses with automated workflows. You're hiring more employees than ever before, and they’re working from everywhere. That means one thing, you’re getting bombarded with help desk tickets asking for access to apps and permissions (and emails asking if you’ve seen their help desk ticket. You have.) Set permissions and approve access for a specific length of time, all within Slack! Before a new hire starts, Lumos will notify their manager and help them set up all apps for their new employee. Not every employee needs access to every app. Avoid headaches by tailoring your AppStore based on employee roles.

    View Software

  • 14

    Fastpath

    Fastpath

    Fastpath’s cloud-based access orchestration platform allows organizations to manage and automate identity, access governance, and data and configuration changes – efficiently and cost effectively.Our intuitive cloud-based platform seamlessly integrates identity governance and GRC into one sophisticated yet easy-to-use solution. Effortlessly automate, control, and monitor access - from applications down to individual data records to dramatically reduce risk and compliance costs.Fastpath’s platform was designed by auditors who understand the complexity of securing business application access. That’s why we created a solution that reduces the time, cost and complexity associated with audit processes and reporting to prove compliance.

    View Software

  • 15

    BalkanID

    BalkanID

    Leverage AI to automate discovery & risk prioritization of entitlement sprawl. Streamline access reviews & certifications across the public cloud and SaaS landscape. Connect all third-party integrations to the BalkanID dashboard. Integrations are supported for the most commonly used SaaS apps. Single pane of glass for coarse and fine-grained entitlements, as well as outliers across SaaS and public cloud environments. Simplify the access review and certification process across the SaaS and public cloud landscape. Leverage data science and machine learning to provide visibility into entitlement risks across SaaS and public cloud environments. Discovery and prioritization of entitlement risks. Discover, normalize and attribute entitlement taxonomy and associated data sets, to ensure that while an access review can be high-level there is still detailed data (permissions, roles, groups, etc.) to support certification actions.

    View Software

  • 16

    Clarity Security

    Clarity Security

    Eliminate audit angst with 10-minute user access reviews, flexible provisioning/de-provisioning workflows, and audit-friendly reporting, all in one simple, scalable IGA platform. White-glove onboarding takes the burden of implementing a solution off of team members reducing the impact on other IT initiatives. Automated evidence collection into a downloadable ledger mitigates the need for wasted time gathering spreadsheets, screenshots, etc. Nested entitlements and Clarity Explorer provide insight into what’s giving users access and why they’re being granted that access. True role-based access control (RBAC) and automated workflows for full alignment with your organizational structure and needs. Unlike "traditional" manual methods, Clarity has everything you need to quickly upgrade your identity governance program and seamlessly adapt it as your organization grows. Fast reviews for certifying user access, entitlements, roles, application access, and more.

    View Software

  • Previous
  • You're on page 1
  • Next
Best Identity Governance and Administration (IGA) Software for Salesforce (2024)

FAQs

Which tool is used for identity governance and administration? ›

OneLogin. OneLogin is an identity management tool that simplifies the identification process by helping employees, partners, and customers access all company applications regardless of the device with just one click. It enforces identity policy and disables access quickly for the employees who leave the organization.

What is the IGA solution for identity? ›

IGA solutions are designed to help businesses improve oversight, eliminate human latency and error, and mitigate risk by automating routine digital identity and access rights management functions.

Which one is the recommended best practice for identity and access management? ›

Use Multi-Factor Authentication (MFA)

User authentication is an essential component of effective identity and access management best practices. After all, if you can't guarantee a user is who they claim to be, you may be putting your data at risk and unintentionally allowing access to an unauthorized user.

What is the difference between IGA and IAM? ›

In short, while IAM focuses on granting and managing access to systems and applications, IGA focuses on auditing and certifying what users do once they gain access to those systems.

Which IAM tool is best? ›

The top IAM tools for 2024, including IBM Security Identity and Access Assurance, Microsoft Azure Active Directory, Ping Identity, Google Cloud IAM, and ManageEngine ADManager Plus, offer unique strengths to address the evolving security landscape.

What does an IGA tool do? ›

Identity Governance and Administration (IGA) enables security administrators to efficiently manage user identities and access across the enterprise. It improves their visibility into identities and access privileges and helps them implement the necessary controls to prevent inappropriate or risky access.

What is the IgA good for? ›

Immunoglobulin A (IgA) is an antibody blood protein that's part of your immune system. Your body makes IgA and other types of antibodies to help fight off sickness. Having an IgA deficiency means that you have low levels of or no IgA in your blood.

What is the main function of IgA? ›

Immunoglobulin A (IgA) is the most abundant type of antibody in the body, comprising most of the immunoglobulin in secretions and a significant amount of circulating immunoglobulin. In secretions, it serves to protect the mucosal tissues from microbial invasion and maintain immune homeostasis with the microbiota.

What is the goal of IgA? ›

IGA encompasses policies, processes, and technology to ensure compliance, enhance security, and streamline management of identities, accounts, roles, and entitlements for access control and auditing. A principle function of IGA is the provisioning and deprovisioning of identities and accounts.

Which certification is best for identity and access management? ›

Top Identity and Access Management (IAM) Certifications to Boost Your Cybersecurity Skills
  • Cyber Security Courses -CISSP.
  • Offensive Security Certified Professional (OSCP)
  • ISO 27001 Information Security Management Systems – ISMS.
  • Certified Information Security Manager – CISM.
Feb 26, 2024

What are the 4 pillars of identity and access management? ›

The four pillars of identity and access management (IAM) are IGA, AM, PAM, and NAC. If that sounds like a bunch of random letters, don't worry—you're in the right place. At Lumos, we know how complicated cybersecurity can get, even for the IT heroes who keep tech stacks running.

What are the three stages of an identity and access management system? ›

There are three stages of an IAM system usually include the provisioning stage, where identities are created and access rights are assigned, the active management stage, which involves the ongoing management of user access and the deprovisioning stage, where access is revoked or modified.

What are the 5 types of IgA? ›

Access the links below for each of the five primary classes to view their properties:
  • IgA Antibodies (Immunoglobulin A)
  • IgD Antibodies (Immunoglobulin D)
  • IgE Antibodies (Immunoglobulin E)
  • IgG Antibodies (Immunoglobulin G)
  • IgM Antibodies (Immunoglobulin M)

What is IgA and why is IT important? ›

Identity Governance and Administration (IGA), also known as identity security, is at the center of IT operations, enabling and securing digital identities for all users, applications and data.

What is the difference between identity governance and administration and access management? ›

While IAM primarily focuses on granting access rights, IGA expands the purview by encompassing crucial identity governance aspects such as role-based access control, segregation of duties, and policy enforcement.

What is the Identity Governance and administration process? ›

It involves creating, managing, and deprovisioning user accounts and access rights across various systems and applications. This includes setting up accounts, assigning roles and permissions, and managing identities.

What is a governance tool? ›

Data governance tools are primarily software solutions designed to administer, monitor, control and report on the entire lifecycle of data. This would be from creation or acquisition through curation to finally archival or deletion.

What is Identity Governance and administration gartner? ›

Gartner states that, “IGA leads to improved identity process maturity, facilitated compliance and reduced risk of unauthorized access, and also provides more visible and efficient controls to the identity life cycle administration processes.” Also, “IGA also provides several ancillary functions, usually including ...

What is identity manager tool? ›

Identity Manager is an automated and policy-based solution that manages user access across IT environments, helping to drive effective identity management and governance across the enterprise.

References

Top Articles
Latest Posts
Article information

Author: Sen. Emmett Berge

Last Updated:

Views: 6515

Rating: 5 / 5 (60 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Sen. Emmett Berge

Birthday: 1993-06-17

Address: 787 Elvis Divide, Port Brice, OH 24507-6802

Phone: +9779049645255

Job: Senior Healthcare Specialist

Hobby: Cycling, Model building, Kitesurfing, Origami, Lapidary, Dance, Basketball

Introduction: My name is Sen. Emmett Berge, I am a funny, vast, charming, courageous, enthusiastic, jolly, famous person who loves writing and wants to share my knowledge and understanding with you.