- Create and implement optimized workflows for your entire identity management
- Define and implement your account lifecycle: creation, update, deactivation, archiving
- Implement LemonLDAP::NG and/or FusionDirectory to secure and simplify your user and service account management
- Modernize your LDAP directory architecture
- Set up integration, pre-production and production environments in your infrastructure
- Create workflows and access rules for applications and systems
- Migrate your identity management data
- Integration, pre-production and production environments
- Custom documentation of deployed environments
Identity and access management
Identity and access management or Identity Access Management (IAM) is a security discipline that allows the right entities (people or objects) to use the right resources (applications or data) when they need them, without interference, using the devices they want to use.
Intermediate
8 hours of assistance,
Recommended for less than 3000 users.
Expert
20 hours of assistance,
Recommended from 3000 users.
Premium
40 hours of assistance,
Recommended for large organizations.
Next steps
Discover all of our associated services:
Identity federation implementation
Definition of functional and technical specifications, deployment and configuration of services.
Training courses
Follow our training courses to acquire best practices for administering identity and access management services.
Change support
Thanks to a human-centered approach, the objective is to facilitate the adoption of new tools, limit resistance and ensure a smooth transition.
Setting up a Multi-Tenant Identity Provider
Allows multiple organizations to coexist within a single instance while maintaining their own users, groups, roles, and settings.
Deploying and Configuring Apache Guacamole
Securely access and/or delegate access to your computers or servers from anywhere.
Deploying and Configuring RustDesk
Open source remote desktop solution with self-hosted server options. Perfect alternative to TeamViewer for secure, private, and customizable remote access.
Deploying and Configuring Psono
Self-hosted open source password manager for businesses. Access can be shared encrypted with your team. Features to manage your data and access your passwords easier than ever.