{"id":3751,"date":"2022-09-12T15:12:38","date_gmt":"2022-09-12T19:12:38","guid":{"rendered":"http:\/\/www.jumpcloud.com\/blog\/?p=3751"},"modified":"2023-05-11T16:11:53","modified_gmt":"2023-05-11T20:11:53","slug":"identity-management-lifecycle","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/identity-management-lifecycle","title":{"rendered":"What is Identity Lifecycle Management?"},"content":{"rendered":"\n<p>Identity lifecycle management (ILM) is the act of managing users\u2019 digital identities and access levels from day 1 of their employment all the way through their departure date.<\/p>\n\n\n\n\n<div class=\"promotion-banner-small is-flex-direction-column has-items-aligned-flex-start has-items-aligned-center-tablet\">\n    <div class=\"promo-small-image is-hidden-mobile\">\n        <img decoding=\"async\" src=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/08\/20210811-WB-PracticalTipsManagingIdentityLifecycle-1200x628-1-aspect-ratio-160-110.jpg\" alt=\"JumpCloud\">\n    <\/div>\n    <div class=\"promo-small-content\">\n        <p class=\"is-type-body-tiny is-type-weight-bold is-important promo-small-title\">\n                    <\/p>\n        <p class=\"is-type-body-default is-important\">\n            Check out our webinar on practical tips for managing the user identity lifecycle.        <\/p>\n    <\/div>\n    <div class=\"promo-small-cta\">\n        <a href=\"https:\/\/jumpcloud.com\/resources\/practical-tips-user-life-cycle-management\" data-promo=\"ULM\/ILM Webinar\" class=\"button is-primary-green promo-small-banner-link\">Watch Webinar<\/a>\n    <\/div>\n<\/div>\n\n\n\n\n<p>Before we get any deeper into identity lifecycle management (also sometimes referred to as user lifecycle management), let\u2019s back up and define a few related terms: <em>digital identity<\/em> and <em>identity lifecycle<\/em>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is a Digital Identity?<\/h2>\n\n\n\n<p>A digital identity is a cluster of information used across cyberspace that represents an individual person, organization, application, or device. In this article, a digital identity will be specifically referring to that of an <em>individual user<\/em>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is an Identity Lifecycle?<\/h2>\n\n\n\n<p>An identity lifecycle refers to the entire process that starts when a user\u2019s digital identity is created and assigned access to resources, and continues with authentication of that identity, updates to credentials and attributes, ending when that identity is retired or deleted entirely.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is the Identity Lifecycle Management Process?<\/h2>\n\n\n\n<p>The overarching identity lifecycle management process is simply the management of each of the processes and steps outlined directly above. Essentially, it\u2019s a handful of identity and access related processes that are meant to keep the user behind the identity and organizational resources safe.<\/p>\n\n\n\n<p><strong>To reiterate, those identity and access related processes are:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Onboarding: <\/strong>Creating a new digital identity and provisioning access to resources.<\/li>\n\n\n\n<li><strong>Ongoing access tweaks: <\/strong>Changing access levels during role changes or other events in a timely manner.<\/li>\n\n\n\n<li><strong>Monitoring and reporting: <\/strong>Keeping track of who has access to what, how, and when, to ensure that <a href=\"https:\/\/jumpcloud.com\/blog\/what-is-it-compliance\">compliance standards<\/a> are met and security expectations are adhered to.<\/li>\n\n\n\n<li><strong>Offboarding: <\/strong>Deprovisioning resource access from a digital identity of a departing employee in a timely manner.<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"512\" height=\"181\" src=\"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/09\/flow-chart.png\" alt=\"flow chart showing the lifecycle management process\" class=\"wp-image-68885\" srcset=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/09\/flow-chart.png 512w, https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/09\/flow-chart-300x106.png 300w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure>\n\n\n\n<p>Now that we\u2019ve defined all of the relevant terms that come up when discussing identity lifecycle management, this article will now dig into the following topics:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The challenges associated with ILM.<\/li>\n\n\n\n<li>The benefits of using an identity lifecycle management tool.<\/li>\n\n\n\n<li>The costs of ILM.<\/li>\n\n\n\n<li>Tools and solutions to help your organization handle ILM.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">What are the Challenges Associated with Identity Lifecycle Management?<\/h2>\n\n\n\n<p>Identity lifecycle management is not always a straightforward process. Sometimes workflows are not documented or even set in stone, existing tools don\u2019t have the capabilities needed to simplify those workflows, or integral team members have too much on their plate, and things slip through the cracks.<\/p>\n\n\n\n<p>There are many challenges that organizations face regarding ILM, including but not limited to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Onboarding and assigning access to a new user in a timely and complete manner.<\/li>\n\n\n\n<li>Managing contractors and seasonal employees on top of all other internal employees.<\/li>\n\n\n\n<li>Immediately updating access levels when role changes occur, and avoiding privilege creep.<\/li>\n\n\n\n<li>Finding time for the IT department to manually manage user lifecycles in conjunction with other priorities.<\/li>\n\n\n\n<li>Offboarding securely. <\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">1. Onboarding and Assigning Access Efficiently<\/h3>\n\n\n\n<p>Many organizations struggle with onboarding new users. A new employee needs access to role-appropriate resources in a timely manner on day one, which can be a big ask when a big class is being onboarded, or HR and IT have conflicting priorities. No matter the reason, when HR and IT are unable to make this a reality, productivity is nearly impossible and the employee experience suffers right from the start.&nbsp;<\/p>\n\n\n\n<p>On top of that, manual onboarding workflows, including identity creation and access provisioning, are time-consuming, especially for growing organizations, and things can often slip through the cracks. A lack of automation across the <a href=\"https:\/\/jumpcloud.com\/blog\/what-is-identity-management\">identity management<\/a> lifecycle can lead to huge consequences as time goes on.<\/p>\n\n\n\n<p>Further, determining what the correct access levels are for each employee joining the organization can be difficult when that access is assigned individually. Without preset permissions based on role as well as onboarding automation capabilities, this part of user lifecycle management becomes unnecessarily tedious and insecure.<\/p>\n\n\n\n\n<div class=\"promotion-banner-small is-flex-direction-column has-items-aligned-flex-start has-items-aligned-center-tablet\">\n    <div class=\"promo-small-image is-hidden-mobile\">\n        <img decoding=\"async\" src=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/06\/202206-WP-LP-BuildingABridgeBetweenHRAndIT-288x373-1-aspect-ratio-160-110.png\" alt=\"JumpCloud\">\n    <\/div>\n    <div class=\"promo-small-content\">\n        <p class=\"is-type-body-tiny is-type-weight-bold is-important promo-small-title\">\n                    <\/p>\n        <p class=\"is-type-body-default is-important\">\n            JumpCloud's open HRIS integration capabilities let both HR and IT pick the tools they need to get work done.        <\/p>\n    <\/div>\n    <div class=\"promo-small-cta\">\n        <a href=\"https:\/\/jumpcloud.com\/resources\/building-a-bridge-between-hr-and-it\" data-promo=\"Generic HRIS\" class=\"button is-primary-green promo-small-banner-link\">Learn More<\/a>\n    <\/div>\n<\/div>\n\n\n\n\n<h3 class=\"wp-block-heading\">2. Managing External Users<\/h3>\n\n\n\n<p>Another identity lifecycle management challenge many organizations face is the management of contractor and seasonal employee digital identities. Sometimes these external or short-term employees don&#8217;t exist within your organization\u2019s HRIS tool, but their identity and access still need to be set up, monitored, and eventually deprovisioned in your IT infrastructure.&nbsp;<\/p>\n\n\n\n<p>This divide between the HR and IT software can cause a few different issues as employees and contractors enter and leave your organization. If communication between these two departments is not clear and in-the-moment, identities and the access (or lack thereof) provisioned to them can either cause delays in productivity or create major gaps in security.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Adjusting Permissions When Roles Change<\/h3>\n\n\n\n<p>People are constantly changing roles at work. Whether it\u2019s a vertical or lateral change, permissions and access will likely need to be adjusted to keep that user productive and secure. The lack of proper identity lifecycle management that many organizations suffer from can result in an employee who has changed roles retaining too much access or not having enough to do their job.&nbsp;<\/p>\n\n\n\n<p>Privilege creep, in particular, is an issue that crops up in many organizations. Privilege creep is the gradual accumulation of access rights that go beyond what an employee needs to do their job. In short, over time, you might find that users have unnecessary access to organizational resources.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. IT Admin Time Management<\/h3>\n\n\n\n<p>Manually setting up, monitoring, and deprovisioning identities and access takes time. Layer on top of that \u2014 password resets, permission updates, and addressing access requests, and you\u2019ll find that there\u2019s simply not enough time in the day for IT to get it all done, especially when time is of the essence. It\u2019s not fair to pile manual tasks, especially ones that can be automated with a modern ILM tool, onto the day-to-day workload of IT when there are many other high priority tasks sitting in their queue.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Offboarding Securely<\/h3>\n\n\n\n<p>The last identity lifecycle management challenge we want to point out is secure offboarding. Earlier we mentioned that onboarding is a significant hurdle in many organizations, and so is offboarding. <a href=\"https:\/\/jumpcloud.com\/blog\/improper-offboarding-poses-significant-security-risks\">Improper offboarding poses serious threats<\/a> to organizational security and compliance, and without proper ILM in place, new security vulnerabilities are likely to pop up. This is typically due to human error and lack of communication between departments, resulting in ex-employees retaining access to company resources after their departure.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Mitigating These Identity Lifecycle Management Challenges<\/h3>\n\n\n\n<p>All of these challenges can be solved with the implementation of a modern identity lifecycle management tool that automates processes and integrates with other tools in your tech stack. Let\u2019s get into some of the benefits of using an ILM tool, to showcase exactly how adopting one can improve the entire process organization-wide.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What are the Benefits of Using an Identity Lifecycle Management Tool?<\/h2>\n\n\n\n<p>There are many benefits that can accompany identity lifecycle management tools, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Automation capabilities.<\/li>\n\n\n\n<li>Risk reduction and improved <a href=\"https:\/\/jumpcloud.com\/resources\/enabling-compliance-through-cloud-identity-management\">identity compliance<\/a>.<\/li>\n\n\n\n<li>Reduced overhead costs.<\/li>\n\n\n\n<li>Flexible integration capabilities with other useful tools.<\/li>\n<\/ul>\n\n\n\n<p>The important thing to note here is that not all ILM tools will include each one of these benefits. But, there are ILM tools out there that will provide all of these benefits, and more!<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Automation Capabilities<\/h3>\n\n\n\n<p>Arguably, the most important benefit of an identity lifecycle management tool is automation. This is because automating ILM processes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Lessens the number of manual and tedious processes for IT.<\/li>\n\n\n\n<li>Reduces the chance for human error, thus improving security and compliance.<\/li>\n\n\n\n<li>Reduces burnout.<\/li>\n\n\n\n<li>Reduces long-term costs associated with hiring many security and IT professionals to handle manual workloads.<\/li>\n\n\n\n<li>Enables productivity.<\/li>\n\n\n\n<li>Improves the employee experience.<\/li>\n\n\n\n<li>\u2026 and more!<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Access Automation<\/h4>\n\n\n\n<p>A modern ILM tool allows for access automation once an identity is created based on the role and group the identity is associated with. For example, IT adds a new user into their system as a new digital identity, and they place that identity into a group called \u201cMarketing\u201d which has certain resource access related to marketing tasks already provisioned to it. That\u2019s all it takes for that new user to get access to all of those resources!<\/p>\n\n\n\n<p>And later on, when that user departs from your organization, a member of the IT team simply removes their digital identity from that group, and all relevant access is revoked immediately upon removal.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Policy Automation<\/h4>\n\n\n\n<p>Another huge perk of an identity lifecycle management tool is <a href=\"https:\/\/jumpcloud.com\/policy-list\" target=\"_blank\" rel=\"noreferrer noopener\">automated policy management<\/a>. Some examples include:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Setting parameters so employees are required to update their devices within a certain time frame after an update is released.<\/li>\n\n\n\n<li>Creating stringent password policies, such as how often they need to be changed, how unique they must be, length, etc.&nbsp;<\/li>\n\n\n\n<li>Setting lockscreen policies that lock devices after a short period of time.<\/li>\n\n\n\n<li>Blocking the usage of removable storage devices.<\/li>\n<\/ul>\n\n\n\n<p>These are just some examples of useful policies that can be created in an ILM tool. To further automate, you\u2019d simply have to link these policies to the relevant device groups. The next time that a device is added to that group, the policies associated with it will then be pushed to that new device.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Risk Reduction and Improved Compliance<\/h3>\n\n\n\n<p>You can probably already see how an identity lifecycle management tool with automation capabilities reduces overall risk and improves compliance. By creating identities efficiently and provisioning access (either automatically or manually) based on attributes associated with that identity, greatly reduces risk that\u2019s inherent in a more frivolous ILM approach.&nbsp;<\/p>\n\n\n\n<p>On top of that, security and compliance can be significantly improved when you use an ILM tool to add <a href=\"https:\/\/jumpcloud.com\/blog\/what-is-single-sign-on-sso\">single sign-on (SSO)<\/a> and <a href=\"https:\/\/jumpcloud.com\/blog\/what-is-multi-factor-authentication-and-why-should-you-use-it\">multi-factor authentication (MFA)<\/a> as requirements for resource access. The best ILM tools also allow admins to monitor and report on all of this data for compliance audits and security checks. Having a simple way to view what identities exist, what they have access to, and what policies are pushed out to what devices, is all critical for remaining compliant.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Reduced Overhead Costs<\/h3>\n\n\n\n<p>Implementing a modern identity lifecycle management tool often allows you to get rid of existing single-use products in your tech stack. When the ILM tool you pick has a wide range of functions, there\u2019s no need to continue paying for or managing other tools that are now obsolete in your organization.<\/p>\n\n\n\n<p>On top of that, using your new ILM tool to automate processes frees your IT department up to deal with other important matters that can\u2019t be automated. By <a href=\"https:\/\/jumpcloud.com\/use-cases\/it-unification\">consolidating your technology stack<\/a> and reducing overall <a href=\"https:\/\/jumpcloud.com\/blog\/how-to-use-jumpclouds-tco-calculator\">IT expenses<\/a>, you\u2019ll see a much better return on investment (ROI) than you would have otherwise.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Integrations with Other IAM Tools<\/h3>\n\n\n\n<p>A great ILM solution will allow you to perform lifecycle management tasks in batches across multiple integrated apps, cutting down significantly on the time and money spent managing identity lifecycles across departments.<\/p>\n\n\n\n<p>For example, JumpCloud\u2019s identity lifecycle management platform seamlessly integrates with internal and external applications. Some of those <a href=\"https:\/\/jumpcloud.com\/partners\/technology-partners\" target=\"_blank\" rel=\"noreferrer noopener\">external integrations<\/a> include popular platforms such as Google Workspace, Microsoft 365, CrowdStrike, HRIS systems (BambooHR, Personio, Namely, Bob, Workday), and others.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What are the Costs Associated with Identity Lifecycle Management Solutions?<\/h2>\n\n\n\n<p>The costs of identity lifecycle management without a comprehensive tool in place are:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A substantial amount of wasted time on manual tasks.<\/li>\n\n\n\n<li>The monetary costs \u2014 both the upfront purchase and ongoing fees \u2014 of each one-off solution you use to try to manage identities and access.&nbsp;<\/li>\n\n\n\n<li>A negative user experience for employees that might cost you new hires.<\/li>\n<\/ul>\n\n\n\n<p>This can easily add up to thousands of dollars and wasted man-hours spent.<\/p>\n\n\n\n<p>However, the costs of a proper identity lifecycle management solution include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Purchasing it up front and any recurring fees.<\/li>\n<\/ul>\n\n\n\n<p>The bottom line is that the costs you\u2019ll incur by adopting an ILM solution are greatly outweighed by the time-savings you\u2019ll enjoy. Getting rid of all of those unnecessary tools you have will free up a healthy amount of budget!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What are Some Solutions and Tools for Identity Lifecycle Management?<\/h2>\n\n\n\n<p>There are a variety of identity lifecycle management solutions and tools that exist to help you streamline the process in your organization. They are often called identity and access management (IAM) tools, identity governance and administration (IGA) tools, user lifecycle management tools, identity lifecycle management tools, cloud directories, or a variety of other names.<\/p>\n\n\n\n<p>Some of these are more comprehensive ILM solutions, while others are partial solutions, but they\u2019re all meant to make the process easier. To wrap up, let\u2019s discuss IGA tools and JumpCloud\u2019s open directory platform that functions as a core directory and comprehensive identity lifecycle management solution.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Identity Governance and Administration<\/h3>\n\n\n\n<p>There are different types of <a href=\"https:\/\/jumpcloud.com\/blog\/what-is-identity-governance-and-administration-iga\">identity governance and administration<\/a> tools \u2014 some are comprehensive and are typically used in conjunction with another IAM tool such as a modern directory, while others are built into a modern directory. We\u2019re going to focus on the latter type, which usually looks like a cloud directory with comprehensive IAM functionality and light IGA capabilities, where you don\u2019t need to buy or integrate any extra tools to handle identity lifecycle management.<\/p>\n\n\n\n<p>Some key features of this kind of tool are:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Streamlined user\/identity lifecycle management via automation and grouping.<\/li>\n\n\n\n<li>Detailed event logging, analysis, and reporting.<\/li>\n\n\n\n<li>Improved compliance and reduced security risk.<\/li>\n\n\n\n<li>Scalable processes.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">JumpCloud\u2019s Identity Lifecycle Management Solution<\/h3>\n\n\n\n<p>One of the most comprehensive identity lifecycle management solutions on the market is the <a href=\"https:\/\/jumpcloud.com\/platform\/cloud-directory\" target=\"_blank\" rel=\"noreferrer noopener\">JumpCloud open directory platform<\/a>. It\u2019s a modern cloud directory, with a wide variety of IAM and IGA capabilities to help you manage, monitor, and secure users\u2019 digital identities and the access that they have.\u00a0<\/p>\n\n\n\n<p>JumpCloud\u2019s platform centralizes everything you need for proper ILM in a single location, allowing you to remotely manage identities and access on Windows, macOS, and Linux devices. Use it to provision, deprovision, and manage identities using SAML SSO, JIT provisioning, and SCIM, and enjoy easy-to-use, built-in monitoring and event logging capabilities.<\/p>\n\n\n\n\n<div class=\"promotion-banner-small is-flex-direction-column has-items-aligned-flex-start has-items-aligned-center-tablet\">\n    <div class=\"promo-small-image is-hidden-mobile\">\n        <img decoding=\"async\" src=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2022\/08\/remote-user-management-3-aspect-ratio-160-110.png\" alt=\"JumpCloud\">\n    <\/div>\n    <div class=\"promo-small-content\">\n        <p class=\"is-type-body-tiny is-type-weight-bold is-important promo-small-title\">\n                    <\/p>\n        <p class=\"is-type-body-default is-important\">\n            Use JumpCloud to ensure that your identity lifecycle management process is efficient, secure, and complete.        <\/p>\n    <\/div>\n    <div class=\"promo-small-cta\">\n        <a href=\"https:\/\/jumpcloud.com\/platform\/user-management\" data-promo=\"ULM Platform Page\" class=\"button is-primary-green promo-small-banner-link\">Learn More<\/a>\n    <\/div>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Automating the identity management lifecycle is one way to tackle the inherent challenges of running an identity management infrastructure.<\/p>\n","protected":false},"author":143,"featured_media":29184,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"categories":[23,2781],"tags":[],"collection":[2779,2780],"platform":[],"funnel_stage":[3016],"coauthors":[2533],"class_list":["post-3751","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-best-practices","category-how-to","collection-directory-services","collection-user-access","funnel_stage-top-funnel"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.3.1 (Yoast SEO v25.3.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Is Identity Lifecycle Management? - JumpCloud<\/title>\n<meta name=\"description\" content=\"Automating the identity management lifecycle is one way to tackle the inherent challenges of running an identity management infrastructure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/blog\/identity-management-lifecycle\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Identity Lifecycle Management?\" \/>\n<meta property=\"og:description\" content=\"Automating the identity management lifecycle is one way to tackle the inherent challenges of running an identity management infrastructure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/blog\/identity-management-lifecycle\" \/>\n<meta property=\"og:site_name\" content=\"JumpCloud\" \/>\n<meta property=\"article:author\" content=\"matt.renstrom\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-12T19:12:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-11T20:11:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2019\/02\/identity3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"780\" \/>\n\t<meta property=\"og:image:height\" content=\"455\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Brenna Lee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brenna Lee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/identity-management-lifecycle#article\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/identity-management-lifecycle\"},\"author\":{\"name\":\"Brenna Lee\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/359d7999806d5e67935965c2dd3d28e7\"},\"headline\":\"What is Identity Lifecycle Management?\",\"datePublished\":\"2022-09-12T19:12:38+00:00\",\"dateModified\":\"2023-05-11T20:11:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/identity-management-lifecycle\"},\"wordCount\":2305,\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/identity-management-lifecycle#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2019\/02\/identity3.jpg\",\"articleSection\":[\"Best Practices\",\"How-To\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/identity-management-lifecycle\",\"url\":\"https:\/\/jumpcloud.com\/blog\/identity-management-lifecycle\",\"name\":\"What Is Identity Lifecycle Management? - JumpCloud\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/identity-management-lifecycle#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/identity-management-lifecycle#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2019\/02\/identity3.jpg\",\"datePublished\":\"2022-09-12T19:12:38+00:00\",\"dateModified\":\"2023-05-11T20:11:53+00:00\",\"description\":\"Automating the identity management lifecycle is one way to tackle the inherent challenges of running an identity management infrastructure.\",\"breadcrumb\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/identity-management-lifecycle#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jumpcloud.com\/blog\/identity-management-lifecycle\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/identity-management-lifecycle#primaryimage\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2019\/02\/identity3.jpg\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2019\/02\/identity3.jpg\",\"width\":780,\"height\":455,\"caption\":\"picture of a man holding a tablet in front of his face\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/identity-management-lifecycle#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jumpcloud.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Identity Lifecycle Management?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jumpcloud.com\/#website\",\"url\":\"https:\/\/jumpcloud.com\/\",\"name\":\"JumpCloud\",\"description\":\"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.\",\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jumpcloud.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jumpcloud.com\/#organization\",\"name\":\"JumpCloud\",\"url\":\"https:\/\/jumpcloud.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"width\":598,\"height\":101,\"caption\":\"JumpCloud\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/359d7999806d5e67935965c2dd3d28e7\",\"name\":\"Brenna Lee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/214a89de1ff1ab98a35c1c487e188e63\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b7230ee01ee4a807220e76781b23f6d2c27a68fa734e0519236112b2257b0824?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b7230ee01ee4a807220e76781b23f6d2c27a68fa734e0519236112b2257b0824?s=96&d=mm&r=g\",\"caption\":\"Brenna Lee\"},\"description\":\"Brenna is a Content Writer at JumpCloud that loves learning about and immersing herself in new technologies. Outside of the [remote] office, she loves traveling and exploring the outdoors!\",\"sameAs\":[\"https:\/\/jumpcloud.com\/blog\",\"matt.renstrom\",\"stefano.tomasello@jumpcloud.com\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What Is Identity Lifecycle Management? - JumpCloud","description":"Automating the identity management lifecycle is one way to tackle the inherent challenges of running an identity management infrastructure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/blog\/identity-management-lifecycle","og_locale":"en_US","og_type":"article","og_title":"What is Identity Lifecycle Management?","og_description":"Automating the identity management lifecycle is one way to tackle the inherent challenges of running an identity management infrastructure.","og_url":"https:\/\/jumpcloud.com\/blog\/identity-management-lifecycle","og_site_name":"JumpCloud","article_author":"matt.renstrom","article_published_time":"2022-09-12T19:12:38+00:00","article_modified_time":"2023-05-11T20:11:53+00:00","og_image":[{"width":780,"height":455,"url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2019\/02\/identity3.jpg","type":"image\/jpeg"}],"author":"Brenna Lee","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Brenna Lee","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jumpcloud.com\/blog\/identity-management-lifecycle#article","isPartOf":{"@id":"https:\/\/jumpcloud.com\/blog\/identity-management-lifecycle"},"author":{"name":"Brenna Lee","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/359d7999806d5e67935965c2dd3d28e7"},"headline":"What is Identity Lifecycle Management?","datePublished":"2022-09-12T19:12:38+00:00","dateModified":"2023-05-11T20:11:53+00:00","mainEntityOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/identity-management-lifecycle"},"wordCount":2305,"publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/identity-management-lifecycle#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2019\/02\/identity3.jpg","articleSection":["Best Practices","How-To"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jumpcloud.com\/blog\/identity-management-lifecycle","url":"https:\/\/jumpcloud.com\/blog\/identity-management-lifecycle","name":"What Is Identity Lifecycle Management? - JumpCloud","isPartOf":{"@id":"https:\/\/jumpcloud.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/identity-management-lifecycle#primaryimage"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/identity-management-lifecycle#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2019\/02\/identity3.jpg","datePublished":"2022-09-12T19:12:38+00:00","dateModified":"2023-05-11T20:11:53+00:00","description":"Automating the identity management lifecycle is one way to tackle the inherent challenges of running an identity management infrastructure.","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/blog\/identity-management-lifecycle#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/blog\/identity-management-lifecycle"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/blog\/identity-management-lifecycle#primaryimage","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2019\/02\/identity3.jpg","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2019\/02\/identity3.jpg","width":780,"height":455,"caption":"picture of a man holding a tablet in front of his face"},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/blog\/identity-management-lifecycle#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jumpcloud.com\/"},{"@type":"ListItem","position":2,"name":"What is Identity Lifecycle Management?"}]},{"@type":"WebSite","@id":"https:\/\/jumpcloud.com\/#website","url":"https:\/\/jumpcloud.com\/","name":"JumpCloud","description":"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.","publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jumpcloud.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jumpcloud.com\/#organization","name":"JumpCloud","url":"https:\/\/jumpcloud.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","width":598,"height":101,"caption":"JumpCloud"},"image":{"@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/359d7999806d5e67935965c2dd3d28e7","name":"Brenna Lee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/214a89de1ff1ab98a35c1c487e188e63","url":"https:\/\/secure.gravatar.com\/avatar\/b7230ee01ee4a807220e76781b23f6d2c27a68fa734e0519236112b2257b0824?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b7230ee01ee4a807220e76781b23f6d2c27a68fa734e0519236112b2257b0824?s=96&d=mm&r=g","caption":"Brenna Lee"},"description":"Brenna is a Content Writer at JumpCloud that loves learning about and immersing herself in new technologies. Outside of the [remote] office, she loves traveling and exploring the outdoors!","sameAs":["https:\/\/jumpcloud.com\/blog","matt.renstrom","stefano.tomasello@jumpcloud.com"]}]}},"_links":{"self":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/3751","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/users\/143"}],"replies":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/comments?post=3751"}],"version-history":[{"count":3,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/3751\/revisions"}],"predecessor-version":[{"id":84524,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/3751\/revisions\/84524"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media\/29184"}],"wp:attachment":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media?parent=3751"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/categories?post=3751"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/tags?post=3751"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/collection?post=3751"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/platform?post=3751"},{"taxonomy":"funnel_stage","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/funnel_stage?post=3751"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/coauthors?post=3751"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}