Facilitate fast, safe, and compliance-ready user account management to secure access and manage all the internal and external users..
IAM user management allows client admins to manage user access to resources and permissions.
Create a custom role or assign a system-defined role to the user for operational efficiency.
Manage access control by specifying permissions to business-critical data and resources.
Access multiple sites under a single login for corporate and administrative roles.
Admin users can configure site specific custom roles and access to meet site requirements.
Automate CCP/PCP determination based on the customisable risk matrix.
Import the external users data with the system bulk upload feature.
Ensure data confidentiality by efficient identity management and access control for enhanced security.
Custom role enable organizations to manage site specific access management locally.
IAM provides a highly customizable platform for the clients to configure custom and system- defined roles and access. Create user groups, assign application privileges and control the access to create, delete, edit, and modify.
IAM ensures that specific roles will only have specific privileges and access inside the modules. Allows clients to define roles and access based on policies. IAM provides confidence that only authorized, authenticated users are able to interact with the systems and data they need to effectively perform their job roles.
IAM allows the client to enable and disable users based on the requirements. Account lockouts are also enforced by IAM if incorrect credentials are entered after a set limit.
Manage password reset, expiry and configuration through the password management settings. Make passwords secure and unique by setting longer or complex passwords that require a
combination of letters, symbols and numbers.
IAM allows users to have the flexibility to create login with the registered email, user Id or phone number as login type respectively.
Create new users or bulk upload the existing users list.
Assign user roles and access to application modules which the user needs to be a part of.
System notifies users with the credentials by email or sms notification to the registered email or phone number along with the temporary password.
Users can log in with the temporary login credentials and create their own password.
Users can modify profile information and change password as needed
Based on the role, access and module subscription, user would be able to navigate in to the application