Comprehensive identity and access management for enterprise-grade control
IdS IAM
IdS IAM gives you full control of who has access to what β with automated identity governance (IGA), lifecycle management and a complete audit trail.
Flexible and secure access management with support for role-based (RBAC), attribute-based (ABAC), policy-based (PBAC) and Discretionary Access Control (DAC) β designed to reduce risk, enforce least privilege and meet governance and regulatory requirements.
Identity lifecycle (JoinerβMoverβLeaver)
RBAC, ABAC, PBAC, DAC
Integrations & directory connectors
Dashboards & exception reporting
Security & role optimization
Audit trail & compliance

New employee (Joiner)
Guided onboarding wizard β with roles, additional entitlements, tasks and a complete fulfillment log in one place.
Mover (role change) and Leaver (offboarding)
Controlled changes and secure offboarding β with follow-up, history and overview across the organization.
Access requests & exception handling
Self-service and case workflow for granting or revoking access β combined with automated exception reports when actual access doesn't match policy.
Users, access and actions
Full overview of active users, cost and risk exposure, and available actions β directly from the user list.
Organization and responsibility
See organizational structure, access, and cost and risk exposure per unit β and get full overview of responsibilities and tasks per person.
IdS IAM for organizations on Entra ID
Many organizations use Microsoft Entra ID (formerly Azure AD) as their primary identity platform. Entra ID offers some governance capabilities through Entra ID Governance, but many organizations need broader lifecycle automation, stronger oversight and audit-ready reporting. IdS IAM extends Entra ID with full identity governance (IGA) and end-to-end workflows β integrating seamlessly with the directory and adding capabilities where standard tooling falls short.
Seamless integration with Entra ID
IdS IAM connects directly to Microsoft Entra ID to manage identities, access and resources. At the same time, it complements Microsoftβs standard tooling and provides comprehensive access governance β across both cloud and on-premises systems.
Management across the entire IT environment
IdentityStream's agent-based connectors provide full support for on-premises applications and business systems behind firewalls β in addition to Microsoft 365. This makes it possible to automate identity and access management across the entire environment.
Efficient entitlement management and lifecycle
Automate the entire user journey β from onboarding to role changes and offboarding. Managers get self-service and IT teams avoid manual work. The result is safer access and higher efficiency.
Compliance and audit trail
IdS IAM provides complete documentation and an audit trail for all access and workflows. This gives you a strong foundation for meeting regulatory requirements like DORA, GDPR and Norwayβs Digital Security Act (NIS) β and prepares you for NIS2.
For a deeper review, read our white paper: IdS IAM for organizations on Entra ID
Target groups & use cases
Who is IdS IAM suitable for? The solution is particularly relevant for:
- CISO / Security managers: Need continuous visibility into access and fast identification of risk areas.
- Compliance and GRC managers: Require auditable processes, documented compliance and reliable reporting.
- CIO / IT managers: Want automation that reduces manual work and ensures consistent access management.
- HR and operations departments: Handle onboarding/offboarding and role changes, and benefit from streamlined cross-functional processes.
Typical use cases:
- Standardized onboarding where new employees automatically get the right access from day one.
- Periodic access reviews (e.g. annually or during organizational changes) to enforce the principle of least privilege.
- Detect discrepancies between intended role-based access and actual access using automated exception reports.
- Prepare documentation and reports for regulators to demonstrate internal control and regulatory compliance.
Documented benefits & customer stories
With IdentityStream's IAM solution, an organization with about 1700 employees saved over 1.4 MNOK in reduced manual access requests in the first year alone, 1.1 MNOK through more efficient license utilization, and 1.7 MNOK through improved processes and self-service.
80% of Norwegian savings banks use IdS IAM β and we see increasing interest from other industries and larger enterprises that require stronger compliance and control.
- Documented results from customer case study
(See also separate customer stories, e.g. SpareBank 1 SΓΈr-Norge and Eika for more insight.)
Technical details & integrations
- Support for Microsoft Active Directory and Entra ID as authoritative directory sources for user data.
- Open APIs, import jobs and directory synchronization for smooth integration with other systems.
- Self-service portal for access requests and changes, with a flexible form engine adapted to the organization's workflow.
- Least privilege by default β built-in logging, audit trail and notifications for continuous oversight.
- Built-in dashboard templates and reports; results can easily be exported to PDF, PNG or PowerPoint for sharing with management and regulators.
Regulatory compliance
- Critical module for organizations subject to regulations like DORA, GDPR, Norwayβs Digital Security Act (NIS) and upcoming NIS2 requirements, where strict expectations for access management and reporting apply.
- Provides a complete audit trail, access documentation and reports that support requirements for documented internal control and security measures.
- Supports key risk-reducing measures: least privilege, periodic access reviews, clear roles and responsibilities β everything that contributes to compliance.
Options and extensions
Extend functionality with three powerful modules for increased control, flexibility and insight:
IdS IdentityMap
Advanced analysis and visualization tool for roles and entitlements. IdentityMap includes Role Mining that analyzes actual access usage and suggests optimization of role assignments. A graphical map shows relationships between users, roles and system access β and reveals overlapping or overly broad roles and potential access sprawl. The findings can be used directly to improve the role and access structure, further strengthening the principle of least privilege.
IdS AssetManager
Full control of the organization's physical resources β IT equipment and other assets like lockers, keys and parking spaces. AssetManager provides a living, audit-proof resource register with custom resource types, status, ownership, location and cost.
Read more about AssetManager βIdS OfficeHoursManager
Define and manage employees' working hours, location and availability. Standard working hours can be inherited from office location or customized individually.
Read more about OfficeHoursManager βIdentityMap
A graphical identity map showing relationships between users, roles and system access β perfect for analysis, role cleanup and audit.
Want to learn more?Book demoπ
Get in touch
- Address
IdentityStream AS
Laberget 22
4020 Stavanger
- Phone number
- (+47) 98 23 24 55