How does it work?

iD Veritas enables you to carry out the onboarding and offboarding process for external employees in an efficient, safe and controlled way. As a result, you’re in firm control of the entire lifecycle of external identities.

How does it work? Read the 5 steps below.

The 5 steps of iD Veritas

All external identities in iD Veritas

Manually enter all external identities into iD Veritas, upload a CSV overview or connect iD Veritas to your supplier’s database (via an API). This creates one central source of clean data of your organisation’s external identities.

The lifecycle of external identities

External identities join your organisation; their role or function may change over time and at a certain point, their contract ends. iD Veritas lets you manage and automate the complete lifecycle (also known as the Joiner-Mover-Leaver process) of your external identities. 

What does this look like in practice? iD Veritas automatically sends your IAM solution a notice when the end date of an external identity’s contract approaches, so the IAM solution can withdraw the corresponding access and rights. Safe and controlled!

iD Veritas - Hoe werkt het?

Connecting to your IAM solution

iD Veritas can be connected to any Identity and Access Management solution on the market. iD Veritas uses open standards (such as an API) to send and receive information to and from your IAM solution. Your IAM partner can handle this connection between iD Veritas and your IAM solution. If you don’t have an IAM partner, then The Identity Managers are here to help you.

iD Veritas - Hoe werkt het?

Outsourcing the work to your resourcing partners

You have the option of outsourcing the management of external identity data to your resourcing partners. For example, you can outsource administrative tasks such as the entry, modification and deletion of external identities. All your organisation has to do after that is validate the information that was entered. Easy and efficient!

iD Veritas - Hoe werkt het?

Maintaining control and oversight

Thanks to the security-by-design architecture and privacy-by-default functionality for the absolute separation of data, you can safely manage the identity data of your external identities. Standard functionalities such as a recertification process and extensive reporting possibilities not only put you firmly in control but enable you to demonstrate it as well. This makes it a lot easier to comply with laws and regulations.

Product features

Security-by-design architecture with least privilege role model

Connection to all IAM solutions via open standards (API)

Data from external identities to IAM solution in real time

IAM user ID for external users to be used throughout the data chain

Standard recertification (attestation) and approval process

Frequently asked questions

Is your question listed here? If not, please don’t hesitate to contact us.

Does iD Veritas work with my organisation’s IAM solution?

iD Veritas can be connected to any Identity and Access Management solution on the market. iD Veritas uses open standards (such as an API) to send and receive information to and from your IAM solution. This makes iD Veritas the optimal and purpose-built source system for all your external identities. Your IAM partner can handle this connection between iD Veritas and your IAM solution. If you don’t have an IAM partner, then The Identity Managers are here to help you.

Is iD Veritas a cloud application?

Absolutely. iD Veritas was born in the cloud and can be used as a SaaS service through a subscription. With a security-by-design architecture and privacy-by-default functionality, iD Veritas seamlessly connects to the optimal management of the lifecycle of external identities. In addition, iD Veritas is endlessly scalable and requires no maintenance by your organisation.

Can I work with my resourcing partners in iD Veritas?

External identities can be entered by your own organisation or securely by the parties you work with. If you collaborate with multiple parties, each of these parties can add and manage the data of external identities with their own account. The administrative tasks are carried out by your resourcing partners, while you remain in firm control. Of course, these parties only see their own data entered for your organisation. The security-by-design architecture means the data is stored completely separate database, specifically for your organisation.


iD Veritas - Logo

iD Veritas enables companies to make their on/offboarding processes safe and efficient.

Everything you need to know

How does it work?

Why iD Veritas?

Prices

More information

Contact

Contact

Stationsweg 387, 3925 CC Scherpenzeel NL

sales@id-veritas.com
+31 (0)88 998 2020