Skip to content


Welcome to the guide for, your comprehensive Identity as a Service (IDaaS) platform. This platform is designed to provide a seamless and secure identity management solution for your organization. Whether you're a developer integrating our APIs, or an organization looking to streamline your identity management, this guide will provide you with the necessary steps and information to get started.

In this guide, we will walk you through the process of setting up your environment, explain the features and capabilities of our platform from various perspectives, and provide you with an understanding of our mission and values. We will also delve into the specifics of Customer Identity and Access Management (CIAM), a crucial component of our platform.

Let's get started on your journey with

Get Started

Log in or sign up and create your own environment in minutes.

Identity Platform

From your organization its perspective, provides an advanced identity platform fully configurable using the web interface or via APIs.

From a technology perspective, is build as a multi-tenant solution built to scale out.

From a user perspective, is a user friendly platform he might not even know about. Registration and login processes run smoothly and provides the user with the access he needs while his information is kept secure. can function stand-alone or act as a broker towards other identity providers such as social login providers or your company its identity provider such as ADFS. Integrates perfectly with existing services and websites by embracing identity and accesss management standards.


Our mission is to build a powerful identity platform that supports organization in building to most user friendly and secure logging in and registration flows, for both customers and employees.

Customer Identity and Access Management (CIAM)

Customer Identity and Access Management (CIAM) is how organization provide customers access to their web services as well as how they keep in control.

In comparison to Workforce Identity and Access Management, CIAM is usually more focused on user experience and usually less concerned with complex authorization schemes. facilitates a wide range of CIAM use cases, for example by providing you with complete control over the user interface, support for custom domains and integration with third party identity providers such as Facebook and Google.

Workforce Identity and Access Management

Your organizations can only operate efficient, effective and secure with proper Identity and Access Management controls in place. allows you to connect your enterprise applications to a central services that ensures users are authenticated securely and access your application landscape according to your organization's policies. integrates in your existing Identity and Access Management approach. You may manage it with your Identity Governance and Administration (IGA) tooling and you can integrate it with Externalized Access Management (EAM) tools for policy decision enforcement.