Blog
READI Product Release: Advancing Governed Identity Automation
Identity Automation Governance: Strengthening Control and Visibility Identity automation is only as strong as the...
If you have been evaluating identity governance solutions, you have probably seen the pitch: “We have 500+ connectors.” Or 800. Or 1,200. The number keeps climbing, and the implication is clear. More connectors means more coverage. More coverage means better governance.
It sounds right. It is not.
Connector count has become a proxy metric for a problem it does not actually solve. The real challenge in identity governance is not how many systems you can connect to out of the box. It is how quickly you can close the gaps that remain after the box is open, and whether those connections hold up over time.
Large connector libraries create an impression of completeness. But most enterprises that have gone through an IGA deployment know the reality: a significant percentage of their application portfolio does not map to any pre-built connector. These are the internal tools, the legacy platforms, the acquired company systems, the department-level applications that handle sensitive access but have no modern API.
These are also the applications that auditors ask about. They are the ones that show up as gaps in access reviews. They are the systems where orphaned accounts persist because nobody built an automated offboarding workflow for them.
A library of 1,000 connectors does not help when the 30 applications that keep you up at night are not in it.
There is a deeper structural issue with the traditional connector model. Each connector in a library is essentially a standalone integration. It maps fields. It handles pagination. It manages authentication. It transforms data. And it does all of this independently of every other connector in the library.
This means the same engineering patterns get rebuilt hundreds of times. Authentication handling, error recovery, schema normalization, rate limiting, retry logic. Each connector is its own island of integration code, tested in isolation, maintained in isolation, and eventually deprecated in isolation.
When you need a connector that does not exist, you are starting from scratch. The patterns that were solved in the 500 connectors already in the library do not transfer. You are back to custom development, professional services engagements, and multi-month timelines.
The better question to ask a vendor is not “how many connectors do you have?” It is “how long does it take to connect an application you have never seen before?”
Building a connector is a project. Maintaining a connector is a program.
Applications change. APIs get versioned. Endpoints get deprecated. Authentication schemes rotate. Schemas evolve. Every change in a target application creates a potential break in the connector that integrates with it. Multiply that across hundreds of connectors and you have a permanent maintenance burden that grows with every addition to the library.
Most teams underestimate this. They budget for the initial build and assume the connector will remain stable. Then a vendor pushes a breaking API change, the connector fails silently, and the next audit reveals three months of access data that never made it into the governance platform.
The cost of a connector is not what it takes to build it. It is what it takes to keep it running over its lifetime. And the more connectors you have, the more surface area you are exposed to.
Organizations that have lived through this cycle start to realize that the architecture of connectivity matters more than the volume of it. A platform that provides durable, maintainable patterns for connectivity will outperform a library of fragile, bespoke integrations every time.
One of the promises of large connector libraries is that they enable delegation. Connect the application, and business users can manage access, run certifications, and handle approvals without IT involvement.
In practice, delegation requires far more than a working connector. It requires clean data, clear entitlement definitions, and workflows that business users can actually operate. A connector that pulls raw role data from a legacy HR system does not enable delegation. It creates a certification campaign where managers are rubber-stamping access they do not understand.
True delegation is an outcome of a well-architected identity foundation. It requires normalized identity data, meaningful access definitions, and governance workflows that translate technical access into business language. These are platform capabilities, not connector features.
When delegation is treated as a checkbox (“we connected the app, so now business users can certify it”), the result is governance theater. Access reviews get completed on schedule, but nobody is actually making informed decisions.
The organizations that make real progress on identity governance share a common approach. They stop optimizing for connector count and start optimizing for three things:
Speed to connect. How fast can we bring a new application under governance? Not days or weeks. Hours. The ability to rapidly integrate an unfamiliar application, with or without a modern API, is the capability that determines whether governance keeps pace with the business.
Durability of connections. Once an application is connected, does the integration hold up? Does it handle changes gracefully? Can it be maintained by the team that operates it, not just the team that built it? Connections that break silently are worse than no connection at all, because they create a false sense of coverage.
Depth of governance. Connection is not governance. Governance requires clean identity data, automated provisioning and deprovisioning, access certification workflows, and remediation capabilities. A platform that delivers all of these as part of the connectivity model will close governance gaps. A connector library that stops at read-only data extraction will not.
The next time a vendor leads with connector count, ask these questions instead:
How long does it take to connect an application that is not in your library?
What happens when a connected application changes its API?
Can business users actually govern access through your platform, or just see it?
How do you handle applications that have no API at all?
What is the ongoing maintenance model for connectors, and who owns it?
These questions shift the conversation from volume to value. They expose whether a solution is built to handle the messy reality of enterprise application portfolios, or whether it is optimized for a demo that shows 1,000 logos on a slide.
Governance gaps are not resolved by bigger libraries. They are resolved by flexible platforms that provide rapid ways to close connectivity and automation gaps, and that keep those connections reliable over time.
That is the standard worth evaluating against.
Insights, best practices, and real-world stories from the front lines of identity transformation.
Identity Automation Governance: Strengthening Control and Visibility Identity automation is only as strong as the...
I’ll be honest – for a long time, I really didn’t like PowerShell. That’s saying...
A chilling reminder that in identity security, what you can’t see can hurt you. The...