Logo

WALLIX IAG

WALLIX IAG (Identity and Access Governance) helps organizations control identity and access governance by ensuring the right users have the right access at the right time, with full visibility and auditability.

Quick benefits

WALLIX IAG (Identity and Access Governance) license

WALLIX IAG At a glance

What it does : WALLIX IAG (Identity and Access Governance) manages and audits user access rights, ensuring compliance and reducing identity-related risks.

License type : Subscription-based (user/identity-based)

Typical term : 1 year · 3 years · 5 years

Activation method : Online or offline activation via license file

Who needs it : Organizations that need structured identity governance, access reviews, and compliance visibility across users and systems

License Overview

The WALLIX IAG license defines how identity governance and access control processes are applied across your environment. Instead of simply managing access, it focuses on reviewing, validating, and governing who has access and why. In most environments, licensing is tied to the number of identities being managed. This includes employees, contractors, and third-party users who require access to systems and applications. The license determines how many identities can be tracked, reviewed, and governed within the platform.

WALLIX IAG is typically used alongside other WALLIX components, such as Bastion, to provide a complete view of both access control and access governance. While Bastion controls sessions, IAG ensures that access rights themselves are continuously reviewed and justified. Getting the licensing scope right matters here. If it’s undersized, access reviews may not cover all users. If it’s oversized, you may be paying for identities that aren’t actively managed. A properly sized license keeps governance processes accurate and manageable.

Product Overview

WALLIX IAG is built to answer a simple but critical question: who has access to what, and should they still have it?

In practice, it continuously evaluates user permissions across systems and highlights access that may be unnecessary, outdated, or risky. This is especially important in environments where users accumulate permissions over time.

One of the key capabilities is access certification. Managers or system owners can regularly review user access and confirm whether it should remain or be removed. This helps keep permissions aligned with actual roles.

Another important aspect is visibility. Instead of scattered access data across multiple systems, WALLIX IAG provides a centralized view, making it easier to understand and control identity risks.

When combined with access control tools, it completes the cycle, ensuring that access is not only controlled but also regularly reviewed and justified.

WALLIX IAG (Identity and Access Governance) technical core

Core technical flow

  1. User identities and access rights are collected from connected systems
  2. Access data is centralized and correlated
  3. Policies define governance rules and review cycles
  4. Access certification campaigns are initiated
  5. Managers review and approve or revoke access
  6. Changes are applied and logged for audit and compliance

Options & Tiers

Plan / Model Best for Key inclusions What affects price
Standard IAG deployment Most organizations Identity governance + access reviews Identity count, term
Compliance-focused setup Regulated environments Certification workflows + reporting Scope, complexity
Enterprise deployment Large organizations Scalable identity governance Architecture size
Multi-system integration Complex environments Broad system coverage Integration scope

Features & Benefits

WALLIX IAG helps organizations bring structure to identity governance by making access visible and reviewable. Instead of relying on assumptions, teams can clearly see who has access and whether it’s still appropriate. A major benefit is reduced risk. By identifying excessive or outdated permissions, the platform helps prevent misuse and limits potential attack paths. It also supports compliance efforts. Regular access reviews and audit-ready reports make it easier to meet regulatory requirements without manual effort. Over time, this approach leads to cleaner access models, where permissions stay aligned with actual roles and responsibilities.

Operating Environment

Technical requirements

How activation works

Activating WALLIX IAG follows a similar process to other Wallix solutions, especially when it is deployed alongside Bastion or other components.

After installation, the platform generates a context file that reflects your environment and deployment details. This file is then submitted through the WALLIX licensing portal or support channel. Based on this information, WALLIX issues a signed license file that is specific to your setup. Once uploaded into the platform, the license activates identity governance capabilities according to your subscription.

This process works in both connected and air-gapped environments. In restricted networks, the context file and license file can be transferred securely without requiring direct internet access. After activation, administrators can begin configuring identity sources, defining governance policies, and launching access certification campaigns. It’s also important to verify that the number of managed identities aligns with the licensed capacity to ensure full coverage.

Pricing Considerations and Quote Workflow

WALLIX IAG pricing is mainly driven by the number of identities being managed. As the number of users increases, the scope of governance and review processes grows accordingly.

Other factors, such as the number of integrated systems, complexity of workflows, and compliance requirements, can also influence pricing.

Subscription length plays a role as well, with longer terms typically offering better value.

The most accurate pricing comes from aligning the solution with your identity governance needs and environment complexity.

After you request a quote