External users or non-employees, including vendors, partners, customers, consultants, and
contractors need access to digital resources/authoritative systems in most modern
organizations. It can be challenging to perform a manual, tedious, and time-intensive process to
create accounts in various systems they need to access and difficult to manage and monitor when
given access to your systems and network. Because of their short engagements, organizations
struggle to gain full visibility into access risk of over-assignment of permissions or missed-deprovisioning.
To efficiently manage external user identities, External Identity Access and
Governance - EIAG® provides a simplified and secure platform that streamlines external user
onboarding and automates provisioning/deprovisioning, ensuring efficient access governance
It helps you improve your IT security posture by securely authorizing external users, ensuring
the right level of granting access rights and entitlements across multiple directories and
application target systems both on premises and in the cloud. Our External Identity Access and
Governance - EIAG® solution provides a superior digital experience for your external identities,
enabling self-registration, request-based application access and their entitlements, password
reset, and access revoke functionalities.
Engage internal custodians to manage external identities or external
custodians, who are third-party associates to onboard their own managed users.
Let your custodians manage external accounts and entitlement access throughout
the lifecycle of their engagement.
Enable custom controls and policies to automate provisioning/deprovisioning
of accounts and entitlements across multiple directories and target systems. Also
allow end users to raise self-request provisioning/deprovisioning, which will
further get approvals from custodians/data owners based on the way workflows
Ensure your custodians have complete visibility of access provided to
external identities and allow them to properly manage and remove access in a
timely fashion. On the other hand, create policies to periodically perform access
reviews and revoke access based on business needs.
Automate interactions with custom email alerts and notifications for all
the events and have greater insight into the data using intuitive dashboards and
Key Product Features
External Identity Lifecycle Management
Establish an authoritative source to manage external identity lifecycle from creating identities,
provisioning in target applications or systems,
and modifying or suspending accounts.
Get a streamlined process to manage application entitlements in line with the connected target
systems. Provide entitlement membership provisioning through on-demand requests from Custodians
or end users, while having custom workflows in place to apply proper scrutiny to requests and
grant access for a limited period.
Workflow-driven Access Control
Get improved decision-making capabilities through intuitive drag-drop workflows for setting up
new external user accounts and granting entitlements based on the type of external organization
Identity and Access Reviews
Periodically revalidate external user accounts and their access privileges with fine-grained
access reviews performed by custodians/data owners, ensuring custom recertification intervals,
approvals, notifications, and remediate actions.
Multiple Authentication Mechanisms
Get full control over authentication and authorization by implementing risk-based multi-factor
authentication and secure encryption technologies. Also, it makes extremely easy to incorporate
multiple authentication options (including third-party mechanisms) based on your application
Quickly configure and go live using out-of-the-box integrations with prominent market products
that you’ve already invested in. You can also develop custom connectors based on standard
connectors with customized schemas, operations, actions, and reconciliation methods.
ISSQUARED helps organizations modernize the external identity governance and achieve compliance
See how our customers have used EIAG® Platform to simplify the most complex external identity
challenges and met their security goals.