IGA Glossary

Lifecycle Management(ILM)

Lifecycle management (also called identity lifecycle management) is the process of managing user accounts and their access from the moment someone joins an organization through role changes and eventually to their departure. It covers creating accounts, assigning access, updating permissions when roles change, and revoking everything when someone leaves.

What is identity lifecycle management?

Every person in your organization has an identity lifecycle. It starts when they are hired and ends when they leave. In between, things change: they get promoted, switch departments, take on new projects, go on leave, and come back. Each of these events affects what systems and data they should be able to access.

Identity lifecycle management is the practice of keeping user accounts and access rights in sync with these real-world events. When someone joins, they need the right accounts, group memberships, licenses, and application access from their first day. When they change roles, their old access should be adjusted and new access granted. When they leave, everything should be shut down quickly and completely.

This sounds straightforward, but in practice it is one of the most challenging and error-prone areas of IT management. The difficulty scales with the size of your organization. At 20 people, you can manage it with a checklist and good memory. At 200, manual processes start failing. At 500, they are unsustainable.

The joiner-mover-leaver framework

Lifecycle management is often described using the joiner-mover-leaver model. Each stage has distinct requirements and challenges.

Joiners

A new employee starts on Monday. They need an Entra ID account with the correct attributes (name, department, title, manager, location), the right Microsoft 365 licenses, membership in the correct security groups and distribution lists, access to relevant applications (Salesforce, Jira, Slack, internal tools), a working email address and Teams account, and appropriate permissions in SharePoint and shared drives.

If any of this is missing, the new hire sits idle on their first day while IT scrambles to set things up. That is a poor experience for the employee and a real cost to the business. The goal is to have all of this ready before the person walks through the door (or logs in remotely).

Movers

Someone transfers from marketing to product management. Their department and title attributes in Entra ID need updating. They should be removed from marketing-specific groups and applications and added to product management groups and applications. Their SharePoint and Teams access should reflect the new role.

The mover scenario is often the hardest to manage. It is easy to add new access for someone's new role. It is much harder to remember to remove access from their old role. Over time, this creates access creep — users accumulate permissions far beyond what they need, violating the principle of least privilege and creating security risks.

Leavers

An employee resigns or is terminated. The offboarding process should disable or delete their Entra ID account promptly, revoke all application access, remove them from all groups, transfer or archive their email and files, revoke any active sessions and tokens, reclaim licenses for reassignment, and notify relevant managers and system owners.

Speed matters here. A delayed offboarding means a former employee retains access to company systems. For voluntary departures, that might just be an audit finding. For involuntary terminations, it is a genuine security risk.

Why manual lifecycle management fails

Most organizations start with manual processes for lifecycle management. IT gets a ticket or an email saying "new hire starting Monday" and works through a checklist. This works at small scale but breaks down for several reasons.

Human error is the most obvious. People forget steps. A new hire might get their Entra ID account but miss being added to a critical security group. An offboarded employee might have their account disabled but their access to a third-party SaaS app overlooked.

Inconsistency follows close behind. Different IT team members follow the process differently. One person adds users to all the right groups; another misses a few. Over time, employees in the same role end up with different access levels.

Delays compound the problem. If IT is busy, that new hire ticket might sit in a queue for hours or days. Offboarding requests might not be processed until the next business day.

And there is no audit trail. With manual processes, it is hard to prove what was done and when. When an auditor asks to see evidence of timely offboarding, pulling that information from email threads and ticket systems is painful.

Automating lifecycle management

Automation addresses most of these problems. The idea is to connect your HR system (the source of truth for who works at your company) to your identity provider (Entra ID) and let lifecycle events trigger automatic provisioning and deprovisioning actions.

Automated lifecycle management works like this: HR creates or updates an employee record, which is the trigger event. The identity governance platform detects the change and determines what actions are needed based on predefined policies. Accounts and access are provisioned automatically — the Entra ID account is created, group memberships assigned, licenses allocated, and application access granted, all based on the employee's role and department. Role changes trigger access updates, with old access removed and new access added. Departures trigger deprovisioning, disabling the account, revoking access, and initiating the offboarding workflow.

This approach eliminates manual steps, ensures consistency, and creates a clear audit trail of every change.

Lifecycle management in Microsoft Entra ID

Entra ID provides some native lifecycle management capabilities.

Entra ID Lifecycle Workflows (P2 feature) allow you to configure automated workflows triggered by employee events. You can define what happens when someone joins, changes roles, or leaves.

HR-driven provisioning supports inbound provisioning from HR systems like Workday and SAP SuccessFactors directly into Entra ID.

Dynamic groups automatically adjust group memberships based on user attributes, handling a portion of the access assignment work.

These native features are useful but have limitations. They require P2 licensing, the workflow capabilities are still maturing, and managing complex lifecycle scenarios across many applications can require significant configuration effort.

How Adcyma approaches lifecycle management

Adcyma was built specifically for lifecycle management in Entra ID environments. It connects to your tenant and provides a governance layer that handles the joiner-mover-leaver process with minimal manual intervention.

For joiners, Adcyma ensures that new employees receive the correct access from day one based on their role and department. For movers, it detects attribute changes and adjusts access accordingly — adding what is needed and removing what is not. For leavers, it triggers a complete deprovisioning process that revokes access across connected systems.

The platform was designed for mid-sized companies that need proper lifecycle management but do not want to spend six months implementing an enterprise IGA solution. It deploys quickly, works directly with Entra ID, and does not require a dedicated identity team to operate.

For IT managers who are tired of manual onboarding checklists and offboarding tickets, automated lifecycle management is one of the highest-impact improvements you can make. It reduces security risk, saves time, and gives you the audit trail that compliance frameworks demand.

See how Adcyma handles this:

Explore Lifecycle Management

Put these concepts into practice

Adcyma makes identity governance simple for companies using Microsoft Entra ID. See how these terms translate into actual features.