No results found. Try different keywords.
Enter at least 3 characters to search...
Home » Security License » WALLIX License » WALLIX IAG
WALLIX IAG (Identity and Access Governance) helps organizations control identity and access governance by ensuring the right users have the right access at the right time, with full visibility and auditability.
What it does : WALLIX IAG (Identity and Access Governance) manages and audits user access rights, ensuring compliance and reducing identity-related risks.
License type : Subscription-based (user/identity-based)
Typical term : 1 year · 3 years · 5 years
Activation method : Online or offline activation via license file
Who needs it : Organizations that need structured identity governance, access reviews, and compliance visibility across users and systems
The WALLIX IAG license defines how identity governance and access control processes are applied across your environment. Instead of simply managing access, it focuses on reviewing, validating, and governing who has access and why. In most environments, licensing is tied to the number of identities being managed. This includes employees, contractors, and third-party users who require access to systems and applications. The license determines how many identities can be tracked, reviewed, and governed within the platform.
WALLIX IAG is typically used alongside other WALLIX components, such as Bastion, to provide a complete view of both access control and access governance. While Bastion controls sessions, IAG ensures that access rights themselves are continuously reviewed and justified. Getting the licensing scope right matters here. If it’s undersized, access reviews may not cover all users. If it’s oversized, you may be paying for identities that aren’t actively managed. A properly sized license keeps governance processes accurate and manageable.
WALLIX IAG is built to answer a simple but critical question: who has access to what, and should they still have it?
In practice, it continuously evaluates user permissions across systems and highlights access that may be unnecessary, outdated, or risky. This is especially important in environments where users accumulate permissions over time.
One of the key capabilities is access certification. Managers or system owners can regularly review user access and confirm whether it should remain or be removed. This helps keep permissions aligned with actual roles.
Another important aspect is visibility. Instead of scattered access data across multiple systems, WALLIX IAG provides a centralized view, making it easier to understand and control identity risks.
When combined with access control tools, it completes the cycle, ensuring that access is not only controlled but also regularly reviewed and justified.
WALLIX IAG helps organizations bring structure to identity governance by making access visible and reviewable. Instead of relying on assumptions, teams can clearly see who has access and whether it’s still appropriate. A major benefit is reduced risk. By identifying excessive or outdated permissions, the platform helps prevent misuse and limits potential attack paths. It also supports compliance efforts. Regular access reviews and audit-ready reports make it easier to meet regulatory requirements without manual effort. Over time, this approach leads to cleaner access models, where permissions stay aligned with actual roles and responsibilities.
Operating Environment
Technical requirements
Activating WALLIX IAG follows a similar process to other Wallix solutions, especially when it is deployed alongside Bastion or other components.
After installation, the platform generates a context file that reflects your environment and deployment details. This file is then submitted through the WALLIX licensing portal or support channel. Based on this information, WALLIX issues a signed license file that is specific to your setup. Once uploaded into the platform, the license activates identity governance capabilities according to your subscription.
This process works in both connected and air-gapped environments. In restricted networks, the context file and license file can be transferred securely without requiring direct internet access. After activation, administrators can begin configuring identity sources, defining governance policies, and launching access certification campaigns. It’s also important to verify that the number of managed identities aligns with the licensed capacity to ensure full coverage.
WALLIX IAG pricing is mainly driven by the number of identities being managed. As the number of users increases, the scope of governance and review processes grows accordingly.
Other factors, such as the number of integrated systems, complexity of workflows, and compliance requirements, can also influence pricing.
Subscription length plays a role as well, with longer terms typically offering better value.
The most accurate pricing comes from aligning the solution with your identity governance needs and environment complexity.
After you request a quote