Identity management

Enforce easier, safer access to the network via Single Sign-On

Identity management through Perimeter 81 enables a stronger, user-centric security stance by transforming how your organization handles access and passwords.

Easy, secure employee logins

Easy, secure employee logins

Your employees can use Perimeter 81 to effortlessly sign in to networks and applications with Single Sign-On. Passwordless authentication eliminates the need for employees to manage their own credentials, which is the culprit in over 80% of corporate data breaches. Instead, they can enjoy one-click access to the networks and apps included in their policy.

Use your preferred Identity Provider (IdP)

Use your preferred Identity Provider (IdP)

Perimeter 81 integrates with identity providers like Azure AD and Google, and major SAML 2.0 solutions such as OneLogin and LastPass, enabling organizations to leverage secure identity management and one-click logins across their network with the tools they prefer. 

Identity provider integration with our platform offers ease-of-use benefits to end users as well as admins, by enabling efficient onboarding of your team members, sorting them into security groups, and extending relevant security to device endpoints.

Supported SAML 2.0 and IdPs:

Craft stronger identity- and context-based policies

Craft stronger identity- and context-based policies

Create a set-and-forget security strategy that automatically enforces relevant access and traffic rules, device posture and more.

Define user group permissions in Perimeter 81 in a way that makes sense for your corporate structure, such as by role or location. You can then create policies to determine which resources groups can access, and how.

This approach reduces the risk of a hacker gaining the permissions of an employee with deep network access. 
Policies enforcing specific device posture — such as the presence of anti-virus software or certificates — are easy to incorporate and further reinforce network security.

Manage users seamlessly with SCIM

Manage users seamlessly with SCIM

Automate user provisioning and deprovisioning between your Identity Provider and Perimeter 81 and enjoy worry-free management of your user policies and permissions.
SCIM integration ensures that changes in users’ Identity Provider access are automatically reflected in Perimeter 81 user settings.

Ready to transform identity management on your network?

Font Resize