Every vendor now touts "lifecycle automation." But dig deeper-most mean, "automation for the 20% of apps that offer SCIM," leaving the other 80% of your stack stuck on tickets and spreadsheets.
Meanwhile, your real world looks like this:
- New hires start on Monday but wait days for access to GitHub, Notion, and half the SaaS your teams actually use.
- Internal moves quietly pile on permissions-nothing gets removed.
- Offboarding means scrambling across 30+ apps, hoping you didn't miss Salesforce, an HR portal, or an AI bot with production access.
Joiner-Mover-Leaver (JML) automation should end this mess. Done right, it shifts identity governance from quarterly fire drills to continuous, reliable control.
The JML lifecycle tracks how identities are created, changed, and removed as people join, move within, or leave an organization1openiam.com-and by 2026, that lifecycle covers contractors, bots, and AI agents, not just employees.
Security cares for good reason. Industry data shows identity and access management (IAM) misconfigurations cause a third of breaches-average cost: $4.9M. Over 80% of organizations report at least one breach linked to IAM errors2gitnux.org. A 2026 identity survey found that two-thirds of IT leaders see moderate to high workflow friction around JML processes, driven by inconsistent identity controls3delinea.com.
This guide is for:
- IT and security leaders in SaaS-heavy companies (50-2,000 employees)
- Lean IT teams (1-10 people) beyond manual provisioning
- Organizations facing real audits (SOC 2, ISO 27001, HIPAA, DORA) with no IAM department
We'll cover:
- What matters most in JML automation
- How legacy IGA, SCIM-only tools, and complete platforms compare
- Unvarnished reviews of SailPoint, Entra ID Governance, Okta, and Iden
- A direct comparison table and a practical decision framework for 2026
Quick recommendations (TL;DR)
If you want the bottom-line advice, start here:
Best for fast-growing, SaaS-heavy orgs with lean IT (50-2,000 employees): Iden
Complete, universal identity governance (SCIM, API, or neither), fine-grained control, agentic workflows. Built for small teams.Best for Microsoft-centric orgs: Microsoft Entra ID Governance
Solid JML automation where Entra/M365 dominate-especially if your core is all Microsoft.Best for Okta-first companies: Okta Lifecycle Management + Okta Identity Governance
Good JML automation for SCIM/Okta-provisioned apps when Okta is your main identity layer.Best for giant, highly regulated enterprises: SailPoint Identity Security Cloud / IdentityIQ
Deep, extensible IGA with mature JML. Heavyweight to implement; needs real IAM staff.Best interim solution for small teams: DIY (HRIS + SSO + scripts/workflows)
A practical stopgap if your stack is small and audit needs are light. Quick to build, but will not scale.
Details on each below.
What to look for in a Joiner-Mover-Leaver automation solution
Don't get distracted by surface features. The real JML failures happen because people evaluate tools on one metric ("does it have SCIM?") instead of the requirements that matter.
1. Coverage: does it reach your actual stack?
The important question isn't "does it support SCIM?"-it's:
How much of our real app estate can this solution automate?
Check:
- SCIM vs non-SCIM: Can it automate apps without SCIM or robust APIs? (Notion, Figma, custom tools, legacy systems, OT/ICS, provider portals)
- On-prem and legacy: AD-joined servers, old business systems
- New species of identities: Bots, AI agents, service accounts
Most SSO-focused tools only automate about 20% of your apps-leaving 80% manual. Without closing that gap, you're buying partial relief, not real automation.
2. Depth: how fine-grained is the control?
JML isn't just about creating and deleting accounts. The real pain is in movers-the need to right-size access:
- Channel-level in Slack/Teams
- Repo-level in GitHub/GitLab
- Project-level in Jira, Asana, or internal systems
- Cloud and OT/ICS environments by environment
Ask:
- Can it manage access down to channel/repo/project?
- Does it enforce least-privilege and SoD during moves?
- Is it easy to codify policy for birthright, time-bound, and exception access?
3. Automation and agentic workflows
Static rules and quarterly reviews can't compete with continuous attacks.
Look for:
- Policy-driven JML tied to HRIS/directory events
- Event-driven movers that recalculate access on department, manager, or project changes
- Automated reviews-flagging anomalies, not just sending spreadsheets
- Agentic workflows (AI-driven, autonomous):
- Auto-approve low-risk requests via policy
- Escalate outlier or risky patterns
- Package audit evidence continuously
4. Governance, audit, and compliance
Auditors will ask:
- Who had access, when, and why?
- Who approved it?
- What changed as people changed roles or left?
Critical features:
- Immutable audit logs for every identity event
- Policy-backed approvals-not just "VP said so"
- Continuous reviews that actually remove unused access
- SoD modeling for risk combos
5. Time-to-value and upkeep
A JML project that takes 12-18 months is a relic by go-live. Your org will already have reorged twice.
Assess:
- Time-to-live for your first set of apps
- How much admin time it takes
- How tough it is to add new apps and identities later
Iden's benchmarks: 24-hour deployments, 47 minutes to first automation, 175+ apps. Use those as sanity checks.
6. Cost, SCIM tax, and total cost of ownership
Don't just compare license prices. Also include:
- Forced enterprise upgrades just for SCIM ("SCIM tax")
- Professional services/integration work
- Internal FTEs to maintain the platform
- Zombie licenses and overprovisioned access never cleaned up
Iden data: customers can cut up to 30% SaaS spend through automated license reclamation and avoiding SCIM-only upgrades. Legacy solutions may seem cheap on paper but balloon with services and internal staffing.
Option 1: SailPoint (Legacy enterprise IGA-robust, but heavy)
SailPoint (IdentityIQ on-prem and Identity Security Cloud SaaS) is the classic enterprise IGA.
What it offers
- Pre-built lifecycle events for JML, powered by workflow engines to drive provisioning/deprovisioning across connected systems4documentation.sailpoint.com
- Wide connector catalog (SaaS, on-prem, and enterprise)
- Strong SoD controls and certifications for regulated industries
It's powerful-if you have the resources to wrangle it.
Pros
- Deep, extensible governance for complex, global estates
- Solid for highly regulated industries
- Mature certification and policy frameworks
Cons
- Heavy, months-long implementations (often need consultants)
- Requires steady IAM expertise/admin time
- High licensing and support costs for midmarket
- Long-tail SaaS/non-API apps often still require custom work
Best for
- 10,000+ employee orgs
- Places with entrenched SailPoint/IAM teams
- JML as a piece of a broader IGA program
Pricing snapshot
- Model: Quote-based, enterprise subscription
- Extras: Professional services/integrators are standard
- TCO: Great for massive orgs, overkill for 50-2,000 employees
Option 2: Microsoft Entra ID Governance (For the Microsoft-first world)
If you're deep in Microsoft 365 and Entra ID, start here.
What it offers
- Lifecycle Workflows directly model JML-creating accounts, managing group memberships, cleaning up access when someone leaves5learn.microsoft.com
- Tight links to Entra ID, M365, and HRIS sources
- Policy-driven flows triggered by HR or directory changes
Pros
- Logical fit if Entra ID is your main directory/SSO
- Strong on Microsoft workloads (Teams, SharePoint, Azure)
- Native audit, reporting, conditional access integration
Cons
- Non-Microsoft apps depend on SCIM/custom integrations
- Long-tail SaaS, OT/ICS, custom tools often manual or script-only
- Licensing is convoluted (varies by plan/region)
Best for
- Microsoft-centric orgs with modest SaaS outside M365
- Teams already invested in Entra features
Pricing snapshot
- Lifecycle Workflows need Entra ID Governance/Suite licenses for covered users5learn.microsoft.com
- Bought as Entra add-ons; per-user rates vary
Option 3: Okta Lifecycle Management + Okta Identity Governance
For Okta-centered orgs, this is the logical extension.
What it offers
- Lifecycle automation for JML, triggered by HR/directory events-drives provisioning/deprovisioning via Okta Workflows6okta.com
- Workflow builder for complex logic/custom API calls
- Governance adds access requests, certifications, policy-driven assignments
Pros
- Strong automation for apps in Okta Integration Network (with SCIM/provisioning)
- Tight fit if already on Okta SSO/MFA
- Flexible low-code workflows
Cons
- Still focused on SCIM-enabled apps; others need custom work/remain manual7reddit.com
- Separate SKUs for LCM, Identity Governance, workflows-all different prices
- Small teams may find Workflows a maintenance burden
Best for
- Orgs already on Okta
- Teams with dev/admins comfortable building flows/connectors
Pricing snapshot
- Public pricing: Okta Lifecycle Management and Identity Governance ~$9-$11/user/month, annual minimums, workflow tiers8assets.applytosupply.digitalmarketplace.service.gov.uk
- More features = more SKUs
Option 4: DIY JML-HRIS + SSO + scripts/workflow tools
Many lean teams roll their own:
- HRIS (Workday, BambooHR, Personio, etc.) as the source of truth
- SSO (Okta, Entra) for SCIM/provisioned apps
- Power Automate, Zapier, scripts for "the rest"
This works for:
- Small orgs (<20 apps)
- Minimal compliance
- Enthusiastic engineers ready to maintain it
But beyond 50-60 apps and real audits, DIY hits these walls:
- Fragile one-off automations reliant on tribal knowledge
- No single view across identities, roles, entitlements
- Manual review/evidence hunts every quarter
Pros
- Lowest upfront cost
- Max flexibility for edge cases
- Good experimentation lab before buying real IGA
Cons
- High operational risk-scripts break, owners leave
- No clear way to govern bots/AI agents
- Painful compliance and evidence collection
Best for
- Early-stage teams (<50 people, light audit pressure)
- Technical teams happy building/owning everything
Pricing snapshot
- Mainly internal time
- Real TCO: outages, offboarding gaps, audit scrambles
Option 5: Iden-Complete JML automation for the whole stack
What about the 80% of your stack outside the SCIM bubble?
Iden delivers complete identity governance for 50-2,000-employee, SaaS-native orgs with lean IT.
What it offers
- Coverage
Iden connects to any app-SCIM, API, or neither-using universal connectors. 175+ apps out of the box; 48-hour custom connector delivery for new ones. - Fine-grained movers
Goes beyond group shuffling:- Adjusts access at channel, repo, project levels
- Re-evaluates on team, role, or location changes
- Applies SoD rules before access is granted
- Agentic workflows & zero upkeep
- Policy-driven, AI-native orchestration
- Automated provision/deprovision everywhere
- Continuous compliance, license cleanup, audit evidence
Reference numbers: customers typically see 80% fewer manual access tickets, save 120 hours/quarter on reviews, and cut up to 30% SaaS spend by reclaiming licenses and skipping SCIM-only upgrades.
Pros
- Universal coverage: reaches the 80% of apps left manual elsewhere
- Fine-grained control: channel, repo, project, module permissions-not just groups
- Fast deployment: live usually within 24 hours, often running automations in under an hour
- No SCIM tax: standard app plans, no forced enterprise upgrades
- Built for lean IT: 1-10 person teams-no IAM admin needed
- Unified view: all identities, human and non-human; bank-grade security, immutable logs
Cons
- Newer than legacy giants; rare connectors may need a short build cycle (typically within 48 hours)
- Overkill for <50 employees, <10 apps, no audit pressure
Best for
- 50-2,000-employee, SaaS-centric orgs, globally distributed
- Lean IT swamped by access tickets and offboarding risk
- Companies facing (or scaling) real audits, without an IAM team
Pricing snapshot
- "Modern IGA, live in days, ~$5/user/month, no pro services needed" for the target segment
- No SCIM-only upgrades required; TCO benefit is ticket reduction and SaaS waste elimination
Comparison table: JML automation options in 2026
High-level-validate in your own environment.
| Solution | Stack coverage | Granularity | Deployment effort | Ideal org size | JML strength | Pricing / TCO |
|---|---|---|---|---|---|---|
| Iden | Universal (SCIM/API/none; 175+ apps) | Fine-grained (channel/repo/project/module) | ~24 hours; self-serve | 50-2,000, SaaS-heavy | Strong on joiner/mover/leaver, incl. non-human | ~$5/user/mo; no SCIM tax; low services |
| Microsoft Entra ID Governance | Strong M365; ok for covered SaaS; weak for others | Group/role, finer if app supports | Project rollout; complex for big tenants | 500+, Microsoft-first | Strong JML for MS workloads | Add-on Entra licenses; TCO shines if all-Microsoft |
| Okta LCM + OIG | SCIM/OIN strong; limited otherwise | Group/role, finer if API | Base rollout + ongoing workflows | 500-10,000, Okta-first | Strong JML where covered | ~$9-11/user/mo + SKUs; TCO rises with complexity |
| SailPoint (ISC/IQ) | Broad (SaaS/on-prem); custom for old/legacy | Very granular, rich SoD | 6+ months; consultant/IAM staff | 10,000+, regulated | Very strong if fully built | High license + pro services + FTE |
| DIY (HRIS+SSO+scripts) | What you build; often patchy | Depends on code/flows | Ongoing eng/support | Early stage / few apps | Patchy-onboarding ok, movers/leavers weak | Low license, high hidden cost |
How to choose: a practical decision framework
1. Company size and IT capacity
- <200 people, <20 apps, light compliance:
DIY (HRIS+SSO+workflows) is workable-briefly. Document everything. Don't expect to scale. - 200-2,000 people, 40-150 apps, lean IT:
This is where SCIM-only tools fall apart. Complete platforms like Iden save you from endless point-tool glue. - >5,000 people, heavy legacy/on-prem, IAM team:
SailPoint or similar may fit-often plus a connector tool for better coverage.
2. App landscape
- Microsoft-first, few SaaS:
Entra ID Governance is a good native option. - Okta-first, SCIM-friendly SaaS:
Okta LCM + OIG fits naturally. - SaaS-heavy, lots of "rogue" apps, OT/ICS, portals:
You need universal coverage. That's Iden's lane.
3. Compliance needs
SOC 2 / ISO 27001 / HIPAA / DORA coming:
Prioritize:- Immutable logs
- Continuous reviews
- SoD modeling
- Clean evidence exports
No audits yet:
Don't over-optimize for certifications, but avoid architectures doomed at first audit.
4. JML pain points
Ask your team:
- Where are delays worst-joiners, movers, or leavers?
- Where did real-world failures happen?
Patterns:
- Joiners: Optimize for tight HRIS sync, birthright access, fast onboarding.
- Movers: You need event-driven, fine-grained re-evaluation-beyond groups.
- Leavers: Universal deprovision, license clean-up, catch zombie accounts.
Iden is optimized for all three but stands out where movers/leavers are the real pain.
Our 2026 recommendation
If you're a growing, SaaS-heavy company (50-2,000 employees) running lean IT, your challenge isn't "no SCIM"-it's:
- 60-80% of your stack is manual
- Movers accumulate permissions; nobody reviews
- Offboarding means hope-and-pray
A truly complete, AI-native platform with universal coverage and fine-grained control is now the pragmatic answer. That's Iden: closing the 80% gap, managing every joiner, mover, and leaver-including forgotten and long-tail apps-without extra hires or SCIM ransom.
If your entire world is Entra or Okta and your SaaS stack is modern and SCIM-friendly, their JML tools may be enough for now. Just audit what's left manual, and know how you'll answer the next "who had access, when, and why?" question.
Either way, by 2026 the bar is raised: JML must be continuous, stack-wide, and provable. Spreadsheets are over.
FAQ
What exactly is Joiner-Mover-Leaver (JML) automation?
JML automation controls everything for an identity that joins, moves, or leaves:
- Creating accounts and "birthright" access on day one
- Adjusting access as roles or departments change
- Revoking entitlements, reclaiming licenses, deprovisioning on exit
Executed properly, it covers every identity-human and non-human, for all your apps (not just SCIM ones).
Isn't this just SSO provisioning?
No. SSO provisioning typically:
- Only works for SCIM-enabled apps
- Is group-/role-focused
- Misses bots, long-tail, and internal tools
JML automation ties in HR, triggers on moves, covers all apps, and delivers end-to-end governance.
How long to implement proper JML automation?
It depends:
- Legacy IGA (SailPoint): Months plus consulting
- Entra/Okta: Weeks-months to go live broadly
- Iden: About 24 hours to deploy and under one hour to first automation for typical customers
The more universal your connectors, the faster to value.
What about contractors, bots, and AI agents?
These "new species of identities" are now first-class:
- Contractors/vendors often outside HRIS
- Bots and AI run critical processes
Look for solutions that treat non-humans as equals, apply policy-driven JML flows, and offer real-time oversight3delinea.com.
Isn't automating 20-30% of apps "good enough"?
Automating the easy 20-30% reduces some work-but most friction (and audit risk) is in the other 70-80%: long-tail SaaS, legacy, OT/ICS, internal tools. That's where offboard failures and audit disasters happen.
If your JML tool can't reach those, you're flying blind. That's not governance-it's theater.


