• Download a trial
  • Sales
  • Support
  • Login
logo
  • Home
  • Products
  • Solutions
  • Partners
  • About Us
  • Consulting
  • Resources
Request a Quote
  • Workforce Identity
  • Customer Identity
  • Comparison
  • Subscriptions

All Features

Overview of all features in Workforce Identity

User Onboarding and Offboarding

Automate joiner, mover, leaver processes

Access Request

Access requests with multi-step approvals

User Access Reviews

Save time with user access reviews

Self-Service Portal

Self-service portal for all end user activities

Segregation of Duties

Detect and remediate SoD violations

Password Management

Enforce password policies and enable synchronization

Single Sign-On (SSO)

Enable SSO using standards - SAML, oAuth, OIDC

Authentication and MFA

Improve security with adaptive authentication and MFA

3rd Party IdP Integration

Integrate with your existing identity provider

Integration API

Use the REST API to add identity into your applications

Connector Library

Integrate on-premise and SaaS applications

Modern Architecture

Microservice architecture that supports deployment using RPM, Kubernetes or OpenShift

Workforce Identity Concepts

All Features

Overview of all features in Customer IAM

Authentication and MFA

Improve security with adaptive authentication and MFA 

Single Sign-On (SSO)

Enable SSO using standards - SAML, oAuth, OIDC

Password Management

Enforce password policies and enable synchronization

Modern Architecture

Microservice architecture that supports deployment using RPM, Kubernetes or OpenShift

Customer Identity Concepts

Community vs Enterprise

Summary of the differences between the Community and Enterprise editions

Subscription Benefits

Overview of the benefits provided by an OpenIAM subscription

  • Integrations
  • Verticals
  • Workforce Use Cases
  • CIAM Use Cases
  • Compliance

Active Directory

Manage identity in Active Directory

Azure (O365)

Manage identity in Office365

SAP

Manage identity in SAP S/4 Hana

SAP SuccessFactors

Manage identity in SAP SuccessFactors

Workday

Manage identity in Workday

Education

Manage identity for students, staff and alumni

User Access Requests

Empower end users and improve compliance with user access requests

Strong Authentication

Improve security with adaptive authentication and MFA

Single Sign-On (SSO)

Improve customer experience with SSO

NIS2

Achieve compliance with the EU directive for cybersecurity frameworks.

DORA

Comply with the Digital Operational Resilience Act for the EU.

HIPAA

For healthcare organizations seeking HIPAA compliance.

  • Partners

Current Partners

Our Current Partners

  • About Us

About OpenIAM

Learn about OpenIAM

Press Releases

References to OpenIAM press releases

OpenIAM in the Media

References to OpenIAM in the media

Careers

Learn about open positions at OpenIAM.

  • Consulting

Proof of Value

Customized engagement to confirm defined proof of value objectives

Jump Start

Customized engagement to rapidly deliver a solution into production

Solution Implementation

Engagement with the objective to deliver a complete IAM solution based on customer requirements

  • Resources

Videos

Collection of videos describing how OpenIAM can be used to solve common use cases

Community Portal

Collaborative community portal to learn more about OpenIAM

CE Documentation

Documentation for the Community Edition

Blog

Musings on identity penned by the OpenIAM team

Webinar Calendar

Upcoming webinars and training sessions

Workforce Identity Concepts

Customer Identity Concepts

What is Zero Trust Architecture?

Zero Trust is a security methodology that assumes all systems, networks, and people are untrustworthy. It necessitates ongoing verification of devices, users, and apps. Zero Trust Architecture is built using interconnected solutions that adhere to Zero Trust principles. 

What is the Zero Trust model?

Zero Trust is a security strategy that requires all users, both within and outside the organization's network, to be continually authenticated, authorized, and verified before gaining access to network applications and data.

Zero Trust presupposes there is no typical network edge; networks might be local, cloud-based, or hybrid.

What are the three principles of Zero Trust?

The technical specifications of different frameworks and models may differ, but they all follow a basic set of Zero Trust principles: 

Continuous monitoring and validation

Zero Trust means that all network assets are inaccessible by default. To get access to any resources, users, devices, and workloads must pass continuous, contextual authentication and validation checks, which must be performed each time a connection is requested.

Dynamic access control rules make decisions on whether to authorize requests based on data points such a user's rights, physical location, device health status, threat intelligence, and odd behavior. Connections are constantly checked and must be reauthenticated to maintain the session.

The concept of least privilege

In a Zero Trust environment, users and devices have access to resources with the least privilege. This means they are granted the bare minimum of authorization needed to execute a job or perform their position. Those rights are withdrawn after the session ends. 

Managing permissions in this manner reduces threat actors' capacity to get access to other parts of the network.

Assume breach

In a Zero Trust infrastructure, security teams believe that hackers have already compromised network assets. Actions that security teams often do to minimize an ongoing cyberattack become regular operating procedures. These steps include network segmentation to limit the reach of an attack, network monitoring of every asset, user, device, process, and real-time response to anomalous user or device behaviors.

Zero Trust Architecture workflow

Zero Trust Architecture is based on the premise that no person or device should be trusted by default, even if they are located within the network perimeter. The procedure starts with strict user and device authentication, during which identities are validated using methods such as multi-factor authentication (MFA) and devices are reviewed for compliance with security regulations. Once an access request is sent, it is reviewed based on contextual criteria such as the user's role, location, and device health, while adhering to the concept of least privilege to ensure that users only access resources required for their work. The network is separated into smaller, isolated parts using micro-segmentation, which limits lateral movement and enforces tight security regulations on each segment. 

Continuous monitoring and behavioral analytics are used to detect odd activity or possible threats, and dynamic access choices are made in real time based on this information. Data is encrypted, and Data Loss Prevention (DLP) techniques prevent sensitive information from being accessed or moved unlawfully. When a threat is recognized, automatic responses are initiated to reduce the risk, followed by a full investigation and recovery procedure. The architecture is constantly enhanced, with security policies updated on a regular basis and users and devices revalidated to ensure the system's resilience against changing threats. 

Let’s Connect

Managing identity can be complex. Let OpenIAM simplify how you manage all of your identities from a converged modern platform hosted on-premises or in the cloud.

For 15 years, OpenIAM has been helping mid to large enterprises globally improve security and end user satisfaction while lowering operational costs.

Download a Trial Contact Sales
footer-top-logo
openIAM-white-logo

All modules of our IAM platform share a common infrastructure allowing customers to see one unified identity solution versus a collection of disparate products.

  • linkedin-icon
  • facebook-icon
  • twitter-icon
  • youtube-icon

sales@openiam.com

(858)935-7561

Copyright © 2025 OpenIAM. All rights reserved.
  • Privacy Policy