RSA® Education Services Blog

RSA Governance & Lifecycle Implementer 2: Configuration

Frequent Contributor Frequent Contributor
Frequent Contributor
0 0 1,591

G&L Imp 2.png


Access Training
for RSA Employees

Access Training
for Customers



If you need further assistance, contact us

If you are an RSA Partner, please Click Here

Course Description

These training and hands-on labs describe how to configure RSA Governance and Lifecycle and establish a well-defined foundation to maximize the efficiency of the lifecycle capabilities, simplifying the responsibilities of RSA G&L administrators and end-users.

This training focuses on implementing RSA G&L in an organization’s environment by defining how RSA G&L mitigates the Identity Lifecycle risks and demonstrating how to configure RSA G&L features, enforcing compliance with the organization’s policies.


Delivery Type

  • Self-paced with Labs


  • 3 Days


Prerequisite Knowledge

Prior to attending this class, students are encouraged to complete the Foundation Training Courses:

In addition to 


Learning Objectives

Upon completion of this training, the student should be able to: 

  • Configure the Access Request Manager to help streamline various system processes related to submitting requests, approving, and fulfilling of requests.  
  • Configure the password management component to allow for self-service password resets, and set the criteria for identity confirmation. 
  • Create and Customize workflows to fulfill the organization’s policies. 
  • Create several rules to oversee various use cases such as the Joiner Mover Leaver process, Segregation of Duties, and more.  
  • Maximize overall efficiency by streamlining all system interactions and functions with the BRM for managing roles and set Role-Based Access Control measures. 


Course Outline

Module # 

Module name 

Learning Objectives / What Student will be able to Do Upon Completing this Module 

Module 1


  • Identify main Application Modules 
  • Demonstrate the Functional Elements of RSA G&L. 
  • Identify main Business Roles that will interact with G&L and their Responsibilities, focusing on the Implementer Users. 
  • Demonstrate high-level Architecture of the RSA G&L cloud system. 
  • Navigate the platform to perform basic operations, and view basic info on the system. 

Module 2

Access Request Manager

  • Demonstrate the phases of a change request. 
  • Configure the ARM general change request settings to fulfill business requirements. 
  • Customize the change request interface to fulfill the organization’s requirements. 
  • Configure Password Management Settings. 

Module 3


  • Define the Workflow types. 
  • Demonstrate the Workflow Architect tool.  
  • Define the Workflow Nodes and their functionalities and capabilities. 
  • Demonstrate workflow customization options. 
  • Customize workflows to meet the organization’s requirements. 

Module 4


  • Demonstrate a general overview of the Rules and their functionality in RSA G&L.  
  • Differentiate between Rule Types available in RSA G&L. 
  • Define the Rule Components and Configurations. 
  • Demonstrate the different actions that can be triggered by a rule. 
  • Customize Rules and policies to ensure compliance with the organization’s regulations. 

Module 5

Roles & Business Role Manager

  • Identify the Role Object and its advantages. 
  • Demonstrate the Role types available in RSA G&L. 
  • Adjust Business Role Manager Configurations based on Organization’s requirements. 
  • Create roles, assign privileges, add users, discover roles, and merge roles. 
  • Utilize Role Analytics to increase the efficiency of the Role. 


Access Training
for RSA Employees

Access Training
for Customers



If you need further assistance, contact us