SaaS Identity Lifecycle Management
Click any control badge to view its details. Download SVG
Key Control Areas
Automated Provisioning and Onboarding
Role-Based Entitlement Mapping
Contractor and Temporary Access Governance
Access Reviews and Recertification
Deprovisioning and Offboarding
SaaS Application Inventory and Governance
Audit Trail and Compliance
When to Use
Organisation has more than 20 SaaS applications. Audit findings related to orphaned or excessive access. Contractor population exceeds 10% of total workforce. Previous security incidents involving former employee access. Regulatory requirements for access certification (SOX, PCI DSS, DORA). Help desk ticket volume for access provisioning and deprovisioning is high.
When NOT to Use
Small organisations with fewer than 10 SaaS applications may find manual lifecycle management sufficient. Organisations with purely on-premises infrastructure should consider SP-010 (Identity Management) instead. If the organisation has not yet implemented centralised authentication (SP-032), that should come first.
Typical Challenges
SaaS applications with no SCIM support require manual provisioning workarounds. Role explosion as the number of unique permission combinations grows with SaaS count. Contractor onboarding often bypasses HR systems, requiring separate authoritative sources. Access reviews suffer from 'rubber stamping' where managers approve all access without genuine review. Shadow SaaS adoption undermines centralised governance. Mergers and acquisitions introduce conflicting identity models that take months to reconcile.
Threat Resistance
SaaS Identity Lifecycle Management addresses the full spectrum of access accumulation and orphaned identity threats. Orphaned accounts after employee departure are eliminated through automated deprovisioning triggered by HR system events, closing the window of opportunity that attackers exploit for persistent access. Privilege creep from role changes is systematically detected through periodic access reviews that surface accumulated entitlements, preventing the gradual accumulation of unnecessary access that insiders or compromised accounts can leverage. Contractor access that persists beyond engagement end dates is controlled through mandatory expiry dates and sponsor attestation, addressing one of the most common audit findings in regulated industries. Shadow SaaS provisioning is contained through application inventory and acceptable use policies, reducing the attack surface of ungoverned identity stores. The pattern's emphasis on audit trails and compliance evidence provides the forensic foundation needed for incident response and regulatory reporting.
Assumptions
The organisation uses a centralised identity provider (IdP) for SSO across its SaaS estate. An HR information system (HRIS) or equivalent serves as the authoritative source for employee and contractor identity data. SaaS applications support SAML/OIDC for authentication and ideally SCIM for provisioning. The organisation has a defined role model or is willing to create one. Management is willing to participate in periodic access reviews.
Developing Areas
- SaaS sprawl discovery automation is improving but coverage gaps remain significant. CASBs detect traffic-based SaaS usage, SSO logs reveal federated application access, and expense report analysis finds paid subscriptions, but free-tier SaaS applications accessed from personal devices on personal networks remain invisible to all three methods. Estimates suggest 30-40% of SaaS applications in use at a typical enterprise are unknown to IT, and the proliferation of AI-powered tools adopted by individual employees is accelerating the shadow SaaS problem.
- SCIM provisioning adoption across SaaS vendors is uneven and inconsistently implemented. Major platforms (Salesforce, ServiceNow, Google Workspace, Microsoft 365) support SCIM well, but mid-market and vertical SaaS applications frequently offer partial SCIM implementations -- supporting user creation but not group management, or supporting disable but not attribute updates. The result is that organisations with 100+ SaaS applications typically achieve SCIM coverage for 40-60% of their estate, with the remainder requiring manual provisioning workarounds or custom API integrations.
- Offboarding completeness verification -- confirming that all SaaS access has actually been revoked after an employee departure -- lacks reliable automated tooling. SCIM deprovisioning confirms the API call succeeded but does not verify that the user cannot still access the application through cached sessions, API tokens, or OAuth grants created outside the IdP. Emerging identity governance platforms are building post-deprovisioning verification scans, but the absence of a standard API for querying active sessions across SaaS applications means verification remains incomplete.
- SaaS-to-SaaS integration visibility is a growing blind spot in identity governance. When a user grants Zapier access to their Salesforce and Slack accounts via OAuth, or connects a project management tool to a code repository, these SaaS-to-SaaS integrations create trust relationships that bypass centralised identity governance. The OAuth grants persist even after the user's access is revoked from the originating application, creating orphaned integration pathways. Mapping and governing these inter-application connections is an emerging capability that most identity governance platforms do not yet address.
- SaaS Security Posture Management (SSPM) is an emerging market category that extends identity lifecycle management to include configuration monitoring, permission analysis, and compliance verification across SaaS estates. SSPM platforms (Adaptive Shield, Obsidian Security, Valence) provide visibility into SaaS misconfiguration, excessive permissions, and data sharing that identity governance platforms miss. However, the market is fragmented, API coverage varies by SaaS vendor, and integration with existing IGA platforms is still maturing.
Related Patterns
Patterns that operate within or alongside this one. Click any to view.