Full Feature List

Complete overview of AccessIQ's 47 enterprise CIAM capabilities across 8 categories.

47
Total Features
8
Categories
27+
IdP Connectors
50+
API Endpoints

Features by Category

Access(5)
Emergency(4)
Multi-Tenant(5)
Identity(6)
Authentication(7)
Identity(7)
Feature(6)
Developer(7)

Role-Based Access Control (RBAC)

Define roles with specific permissions and assign them to users or groups

Simplify permission management with reusable role templates

Attribute-Based Access Control (ABAC)

Create dynamic policies based on user attributes, resource properties, and environmental context

Handle complex scenarios like "managers can approve expenses under $10k in their department"

Fine-Grained Permissions

Granular permission scoping with wildcards and resource-level targeting

Express precise rules like "Analyst can view reports in their region only"

Permission Boundaries

Set maximum permission limits that cannot be exceeded by any other grant

Prevent privilege escalation and enforce least-privilege principles

Delegated Administration

Allow customer admins to manage their own users and permissions within their scope

Scale operations without managing every customer's users yourself

Break Glass Procedures

Emergency elevated access with mandatory audit trails, approvals, and auto-expiration

Handle critical incidents while maintaining security oversight and compliance

Just-In-Time (JIT) Access

Time-bound access grants with automatic revocation after the window expires

Reduce standing privileges and minimize attack surface

Access Request Workflows

Self-service access requests with configurable approval chains

Empower users while maintaining governance and complete audit trails

Temporary Access Scheduling

Pre-schedule access windows for contractors, auditors, or maintenance personnel

Automate access lifecycle without manual intervention

5-Level Organization Hierarchies

Support Tenant → Customer → Division → Department → Team structures

Model any enterprise org structure without compromises

Customer Account Management

Onboard and manage B2B customer organizations with dedicated spaces

Provide isolated environments for each customer with data separation

Hierarchical Permission Inheritance

Permissions flow down through org levels with override capabilities at each level

Reduce admin overhead while maintaining flexibility for exceptions

Bulk User Operations

Mass create, update, suspend, or modify users via CSV import or API

Handle enterprise-scale user management efficiently

Cross-Organization Collaboration

Enable controlled access sharing across organizational boundaries

Support partner networks and shared services securely

27+ Pre-Built IdP Connectors

Microsoft Entra ID, Okta, Google Workspace, Auth0, OneLogin, Ping Identity, and more

Connect to any enterprise identity system in minutes, not weeks

SAML 2.0 Support

Full SAML 2.0 integration for enterprise single sign-on

Meet enterprise SSO requirements out of the box

OpenID Connect (OIDC)

Modern OAuth 2.0 and OIDC flows for web and mobile applications

Implement secure, standards-based authentication

SCIM 2.0 Provisioning

Automated user lifecycle sync from enterprise directories

Keep user data synchronized automatically with zero manual effort

Social Login

Google, Microsoft, GitHub, LinkedIn, Apple, and Facebook authentication

Reduce friction for users who prefer social identity providers

Account Linking

Connect multiple identity sources to a single unified user profile

Support users with multiple credentials seamlessly

Multi-Factor Authentication

TOTP apps, SMS, Email OTP, Push notifications, and hardware security keys

Layer security with flexible MFA options configurable per user or policy

Passkeys & WebAuthn

Passwordless authentication with FIDO2, biometrics, and security keys

Eliminate passwords while improving both security and user experience

Adaptive Authentication

Risk-based step-up authentication based on context, location, and behavior

Balance security requirements and user friction dynamically

Trusted Networks

IP allowlisting and CIDR-based location access policies

Simplify access from known corporate networks and VPNs

Trusted Devices

Device fingerprinting with configurable trust expiration windows

Remember trusted devices to reduce MFA fatigue for returning users

Session Management

View, monitor, and revoke active sessions with concurrent session limits

Maintain visibility and control over all user sessions across devices

Login History & Anomaly Detection

Complete login audit trail with automatic suspicious activity alerts

Detect and respond to unauthorized access attempts in real-time

KYC - Know Your Customer

Identity document verification with AI-powered liveness detection

Verify user identities for regulated industries and high-risk transactions

KYB - Know Your Business

Business entity verification and beneficial ownership documentation checks

Onboard business customers with confidence and regulatory compliance

Sanctions & PEP Screening

Check users against global sanctions lists and politically exposed persons databases

Meet AML compliance requirements automatically and continuously

Document Authenticity

AI-powered verification of passports, driver's licenses, and proof of address

Prevent fraud with automated document validation and tampering detection

Risk Scoring

Automated risk assessment scoring for all verification requests

Prioritize manual reviews and flag high-risk applications instantly

HIPAA-Compliant Audit Logs

Immutable, tamper-proof audit trails with 7-year retention

Meet healthcare compliance requirements with comprehensive logging

GDPR Data Export & Deletion

User data export and right-to-be-forgotten implementation

Comply with privacy regulations effortlessly with built-in tooling

Feature Flag Types

Boolean, string, number, and JSON flag configurations

Control any aspect of your application dynamically without deployments

Per-Tenant Targeting

Enable or disable features for specific customers or organizations

Roll out features to paying customers, beta testers, or specific accounts

Percentage Rollouts

Gradual feature release to a configurable percentage of users

Reduce risk with controlled, incremental feature launches

Multi-Environment Support

Separate flag states for development, staging, and production

Test confidently without accidentally affecting production users

A/B Testing

Flag variations for controlled experimentation and measurement

Measure feature impact with built-in A/B testing capabilities

Entitlement Management

Control feature access based on subscription tier or plan

Enforce plan limits and create natural upsell opportunities

50+ REST API Endpoints

Comprehensive API coverage for all platform capabilities

Build custom integrations and automate any workflow programmatically

Interactive API Playground

Test API endpoints directly in the browser with live data

Explore and debug API calls without writing a single line of code

Webhooks

Real-time event notifications for user actions and security events

React to events instantly in your own systems and workflows

API Key Management

Personal, service account, and integration keys with rotation support

Secure API access with proper credential management and lifecycle

SDKs & Libraries

Client libraries for popular languages and frameworks

Integrate faster with ready-to-use, idiomatic code for your stack

Embeddable UI Components

Drop-in login, registration, and user management widgets

Ship faster with pre-built, fully customizable UI components

White-Label Branding

Custom logos, colors, fonts, and themes per tenant

Maintain brand consistency across all customer-facing experiences