📄️ Identity Management
User Management
📄️ Application Management
The Application Management module provides flexible integration methods for enterprise applications. It supports configuring SSO with standard protocols, synchronizing data to downstream systems, customizing application types, provisioning/deprovisioning accounts, fine-grained permission control, and managing access to sensitive application resources. These capabilities help address complex enterprise integration needs.
📄️ Authorization Center
This feature is available if you have purchased the \[Lifecycle Management] or \[IGA – Identity Governance] module. Administrators can use this module to define custom authorization models, policies, and rules for fine-grained access control on the IAM platform, supporting complex enterprise access management scenarios.
📄️ Identity Governance
This feature is available if you have purchased the \[IGA – Identity Governance] module. Administrators can define custom strategies and rules to enforce fine-grained governance of permissions on the IAM platform, supporting enterprise-level access governance in complex scenarios.
📄️ Policy Management
The Policy Management module allows administrators to configure targeted rules for specific use cases. IAM supports a variety of policy types—such as data masking, unique user rules, password policies, lockout rules, notification templates, and default app redirects—enabling enterprises to meet complex operational and security requirements.
📄️ Synchronization Logs
This feature is available if you have purchased the \[Lifecycle Management] or \[IGA – Identity Governance] module. The Synchronization Logs module consolidates all data synchronization tasks and historical records on the IAM platform. For example, it allows administrators to view task information related to synchronizing identity data from the IAM platform to applications such as Feishu.
📄️ Audit
Audit management consists of two parts: Audit Reports and Configuration Management.
📄️ Authentication Settings
The Authentication Settings module allows you to customize platform certificates, authentication methods, and protocol configurations (standard protocol authentication sources). For example, if your organization needs to configure third-party authentication sources (e.g., WeChat scan login), you can set related parameters here first.
📄️ Multi-Factor Authentication (MFA)
If you have purchased the [MFA] module, this feature is available. Multi-factor authentication provides enhanced identity verification by supporting a variety of login factors. Each authentication method is assigned a specific security level. When creating MFA strategies—such as User MFA, Application MFA, or User Behavior Analysis (UEBA)—you can freely configure their behavior.
📄️ Customization
If your organization needs personalized interface configurations, such as company logos, they can be configured in this section.
📄️ Platform Access Control
IAM provides role-based access control (RBAC) and ACL-based permission models to meet complex enterprise needs for fine-grained access control, enabling professional and precise enterprise permission management.
📄️ System Settings
Product Licensing