Skip to content
English

Our products

Businesses are challenged with cybersecurity and compliance like never before, and good, easy-to-understand products are required to secure your organization, people, systems and information.

Lowres-1457717514

Identity Management

Our solution was originally established on the basis that we didn't want to build a new database of users when most customers already had it established in their Microsoft Active Directory.

Today, we call it a hybrid approach to Identity Management. In concrete terms, this means that we hit the ground running with new customers, as our service is established as an addition to the existing infrastructure.

This gives you 100% insight into Microsoft Active Directory (for better or worse), but you also get an IAM solution established so that you can control all future changes in your Microsoft Active Directory.

This includes creating and deleting users, maintaining master data and organization, as well as activity log and audit log of all changes, either directly or via payroll or HR data.

Access Management

Employees work from all locations and at all times today. There are consultants, project hires, new user types like robots and AI agents, and all types of access must be secured.

Access Management has become a discipline that requires systems and automation that can be trusted but also documented.

ID Connect is built on a role-based approach to access management. Roles can be audited and assigned in different ways. For example, it can be by user, employment or organization.

Regardless of how your access policies are structured, they are based on the principles of system owners and function managers used in the most commonly used regulations.

Lowres-690361170

The technical foundation

A demo focuses on usability based on use cases and features.
But also use a demo to gain an understanding of the technical benefits of the solution.

  • Multi-Tenant SaaS Architecture
    The solution is cloud-native with no technology debt, where centralized patching and operations ensure scalability and instant access to new features for all customers
  • Hybrid AD Synchronization
    Establishes secure Site2Site VPN to on-premises MS-AD and integrates indirectly with Azure AD (Entra ID) for centralized identity management in hybrid environments
  • HR-Driven Automation
    Uses the HR system as an authoritative data source via API integrations, automating the user lifecycle (Joiner/Mover/Leaver) based on validated hiring data for proper provisioning
  • Granular RBAC Modeling
    Maps technical security groups to business-oriented functional roles that are automatically assigned based on organizational structure and job types for precise access management
  • Governance and Audit-Tracking
    Built-in logging ensures full traceability of all rights changes, supporting Zero Trust principles and documenting compliance with NIS2 and GDPR
  • Standards and eID Integration
    Leverages open standards and API services and prepares integration to European Digital Identity Wallets via eID Hub for cross-border identity management

Book a demo

We talk a lot about usability, which is hard to write yourself out of. If our solution seems like something you can use, start by booking an online demo.