Buildings

Granular authorization

Create policies to control all access and approved authentication methods.

Confirm login

Connects to your users

Use Active Directory, LDAP catalogs or other databases for user data.

Going forward

Identity brokering

Allow access based on existing, or external identity providers using SAML 2.0 or OpenID connect.