Identity, Authentication & Access Control

Inopli provides a comprehensive identity, authentication, and access control framework specifically available in dedicated on-premises deployments for military and sovereign organizations. This framework is designed to meet strict requirements for access governance, segregation of duties, and centralized identity control in highly sensitive environments.

In this deployment model, the platform supports Single Sign-On (SSO) using industry-standard protocols, including SAML, OpenID Connect, and Kerberos. These mechanisms enable integration with existing enterprise identity providers, allowing users to authenticate using organizational credentials and ensuring alignment with internal access policies.

Inopli integrates natively with directory services such as Active Directory (AD) and LDAP. User accounts, groups, and role hierarchies can be synchronized with the platform, enabling access permissions to be derived directly from organizational structures. This approach simplifies identity management and ensures that changes in directory services are consistently reflected within the platform.

Access to platform features and data is enforced through role-based access control (RBAC). Roles define the permissions assigned to each user, including visibility into security data, incident handling capabilities, execution of response actions, configuration of automations, and administrative functions. This model supports strict separation of responsibilities and controlled operational access.

All authentication and authorization activities are fully audited. The platform records login events, access attempts, permission changes, and other identity-related actions, ensuring complete traceability and accountability. These audit records support governance, compliance, and internal security oversight requirements.

By offering advanced identity integration and access control capabilities exclusively in dedicated on-premises deployments, Inopli enables military and sovereign organizations to operate the platform with full control over authentication, authorization, and auditing, aligned with their security and regulatory constraints.

Last updated