Features of IBM Cloud Identity

Log in with Single Sign-On

Eliminate username and password hassles. Sign into all your applications with a single set of login credentials, allowing one-click access to browser, mobile and on-premises applications.

Easily Connect to Thousands of Apps with Connectors

Easily connect to thousands of cloud applications through pre-built connectors or generic templates, to speed up business adoption of new applications.

Enhance Security with Multi-Factor Authentication

Enhance security and meet compliance mandates with custom authentication policies. Infuse multiple user authentication methods for stronger security with IBM Verify.

Free up the help desk with user self-care options

Provide a user self-care interface to let employees to request access to applications and reset and manage their own passwords.

Extend SSO to Enterprise Apps with IBM MaaS360 Integration

Extend seamless SSO to apps covered by enterprise mobility management solutions.

Find Apps Easily with Application Launchpad

Conveniently find, view, and access all your applications from a central location. A launchpad that unifies all apps, both on-premises and in the cloud.

Enable User Lifecycle Management

Streamline user onboarding, off boarding, and self-service access request policies for both on-premise and cloud applications.

Empower Managers to Control Access with Delegation

Reduce time and skill dependencies on IT. Delegate the responsibility of application ownership to line of business managers, empowering them to provide their employees with faster access to applications.

Leverage Your On-Premise IAM Investments

Integrate commonly used on-premise directories like AD/LDAP.

Integrate Seamlessly with IBM Security Access Manager

One-click activation allows IBM Security Access Manager (ISAM) users instant access to IBM Cloud Identity.

Assess context of a user's attributes with Adaptive Access

Allow streamlined access to low-risk users and either block or challenge access in higher-risk conditions with a variety of second-factor authentication methods. Organizations can use a simple policy editor to apply AI-informed access policies to prompt for MFA based on behavioral biometrics, device fingerprint, geolocation and more.

Identify and mitigate access risks with Identity Analytics

Add risk awareness with a holistic view of identity lifecycle risk including decision support in the form of risk scores for users, applications, and entitlements; accompanied by recommended mitigation actions powered by machine learning.

How customers use it

  • Enhance security with easy multi-factor authentication


    Ensure strong authentication to any target system.


    Quickly enable MFA mechanisms (email, one-time-passwords, mobile push) on an app-by-app basis.

  • Monitor authentication events


    Lack of insight into user activity


    Dive into reports of authentication events to identify patterns and investigate suspicious behaviour. Dig into specific users to investigate common issues like SSO activity, account lockouts, login failures or credential resets.

  • Provisioning access to applications quickly


    IT has too many application access requests to sort through.


    An application catalog and access request interface that lets you provision access to applications faster.

  • Quickly access all your applications

    Quickly access all your applications


    Remembering multiple usernames and passwords


    Sign into all your applications (Cloud and On-Premises) with a single set of login credentials. One-click access to browser, mobile, and on-premises applications.

  • Application launchpad

    Application launchpad


    Providing users one place to access their authorized applications and request approval to new ones.


    Allow your users to access all of their approved applications from a simple launchpad. Users can browse an application catalog and request access to new applications, then track the approval process so they know what’s in progress.

You may also be interested in

Consider these related products in the Identity and Access Management family

IBM MaaS360 with Watson™

IBM MaaS360 Unified Endpoint Management with Watson

Learn more

IBM Security Access Manager

Secure and simple user access management for employees and consumers.

Learn more

IBM Security Identity Governance & Intelligence (IGI)

Within your organization, you need to be able to understand who has access to what and how that access is being used. Is your identity governance working intelligently? IBM is focused on collecting and analyzing identity data to support enterprise IT and regulatory compliance. With IGI, you’ll improve visibility into how access is being utilized, prioritize compliance actions with risk-based insights, and make better decisions with clear actionable intelligence. All of this is driven by a business-activity based approach to risk modeling, a major differentiator for IBM that makes life easier for auditors and risk compliance managers.

Learn more

IBM Security Secret Server

IBM Security Secret Server makes it easy to identify and secure all service, application, administrator, and root accounts across your enterprise. Through continuous discovery, you’ll be able to curb privileged account sprawl and gain a full view of privileged access in your organization. Unlike traditional, more complex PAM solutions, IBM Secret Server is easy to use and fast to deploy, available both on-premises or in the cloud. Get started today with powerful password vaulting, auditing and privileged access control. With IBM Secret Server, empower your security and IT ops teams to keep all types of privileged accounts safe.

Learn more

See how it works