Features of IBM Cloud Identity

Log in with Single Sign-On

Eliminate username and password hassles. Sign into all your applications with a single set of login credentials, allowing one-click access to browser, mobile and on-premises applications.

Easily Connect to Thousands of Apps with Connectors

Easily connect to thousands of cloud applications through pre-built connectors or generic templates, to speed up business adoption of new applications.

Enhance Security with Multi-Factor Authentication

Enhance security and meet compliance mandates with custom authentication policies. Infuse multiple user authentication methods for stronger security with IBM Verify.

Free up the help desk with user self-care options

Provide a user self-care interface to let employees to request access to applications and reset and manage their own passwords.

Extend SSO to Enterprise Apps with IBM MaaS360 Integration

Extend seamless SSO to apps covered by enterprise mobility management solutions.

Find Apps Easily with Application Launchpad

Conveniently find, view, and access all your applications from a central location. A launchpad that unifies all apps, both on-premises and in the cloud.

Enable User Lifecycle Management

Streamline user onboarding, off boarding, and self-service access request policies for both on-premise and cloud applications.

Empower Managers to Control Access with Delegation

Reduce time and skill dependencies on IT. Delegate the responsibility of application ownership to line of business managers, empowering them to provide their employees with faster access to applications.

Leverage Your On-Premise IAM Investments

Integrate commonly used on-premise directories like AD/LDAP.

Integrate Seamlessly with IBM Security Access Manager

One-click activation allows IBM Security Access Manager (ISAM) users instant access to IBM Cloud Identity.

Assess context of a user's attributes with Adaptive Access

Allow streamlined access to low-risk users and either block or challenge access in higher-risk conditions with a variety of second-factor authentication methods. Organizations can use a simple policy editor to apply AI-informed access policies to prompt for MFA based on behavioral biometrics, device fingerprint, geolocation and more.

Identify and mitigate access risks with Identity Analytics

Add risk awareness with a holistic view of identity lifecycle risk including decision support in the form of risk scores for users, applications, and entitlements; accompanied by recommended mitigation actions powered by machine learning.

How customers use it

  • Enhance security with easy multi-factor authentication


    Ensure strong authentication to any target system.


    Quickly enable MFA mechanisms (email, one-time-passwords, mobile push) on an app-by-app basis.

  • Monitor authentication events


    Lack of insight into user activity


    Dive into reports of authentication events to identify patterns and investigate suspicious behaviour. Dig into specific users to investigate common issues like SSO activity, account lockouts, login failures or credential resets.

  • Provisioning access to applications quickly


    IT has too many application access requests to sort through.


    An application catalog and access request interface that lets you provision access to applications faster.

  • Quickly access all your applications

    Quickly access all your applications


    Remembering multiple usernames and passwords


    Sign into all your applications (Cloud and On-Premises) with a single set of login credentials. One-click access to browser, mobile, and on-premises applications.

  • Application launchpad

    Application launchpad


    Providing users one place to access their authorized applications and request approval to new ones.


    Allow your users to access all of their approved applications from a simple launchpad. Users can browse an application catalog and request access to new applications, then track the approval process so they know what’s in progress.

You may also be interested in

Consider these related products in the Identity and Access Management family

IBM MaaS360 with Watson™

IBM MaaS360 Unified Endpoint Management with Watson

Learn more

IBM Security Access Manager

Secure and simple user access management for employees and consumers.

Learn more

IBM Security Identity Governance & Intelligence (IGI)

Full enterprise-level identity governance and administration.

Learn more

IBM Security Secret Server

Privileged account discovery, protection and monitoring.

Learn more

See how it works