The 5 steps of iD Veritas
All external identities in iD Veritas
Manually enter all external identities into iD Veritas, upload a CSV overview or connect iD Veritas to your supplier’s database (via an API). This creates one central source of clean data of your organisation’s external identities.
The lifecycle of external identities
External identities join your organisation; their role or function may change over time and at a certain point, their contract ends. iD Veritas lets you manage and automate the complete lifecycle (also known as the Joiner-Mover-Leaver process) of your external identities.
What does this look like in practice? iD Veritas automatically sends your IAM solution a notice when the end date of an external identity’s contract approaches, so the IAM solution can withdraw the corresponding access and rights. Safe and controlled!
Connecting to your IAM solution
iD Veritas can be connected to any Identity and Access Management solution on the market. iD Veritas uses open standards (such as an API) to send and receive information to and from your IAM solution. Your IAM partner can handle this connection between iD Veritas and your IAM solution. If you don’t have an IAM partner, then The Identity Managers are here to help you.
Outsourcing the work to your resourcing partners
You have the option of outsourcing the management of external identity data to your resourcing partners. For example, you can outsource administrative tasks such as the entry, modification and deletion of external identities. All your organisation has to do after that is validate the information that was entered. Easy and efficient!
Maintaining control and oversight
Thanks to the security-by-design architecture and privacy-by-default functionality for the absolute separation of data, you can safely manage the identity data of your external identities. Standard functionalities such as a recertification process and extensive reporting possibilities not only put you firmly in control but enable you to demonstrate it as well. This makes it a lot easier to comply with laws and regulations.
Security-by-design architecture with least privilege role model
Connection to all IAM solutions via open standards (API)
Data from external identities to IAM solution in real time
IAM user ID for external users to be used throughout the data chain
Standard recertification (attestation) and approval process