Overview
Connect your IdP and map group/claims to AccessGuard roles for least-privilege access.
Problem
Multiple identity silos create offboarding gaps and manual role assignment errors.
Solution
AccessGuard integrates with Okta, Azure AD (Entra), Google Workspace, and Auth0 via SAML/OIDC with claims → role rules.
How it works
Add your IdP, paste OIDC creds or SAML metadata, then write mapping rules (e.g., group “platform-admins” → role admin). Optionally enable SCIM for lifecycle.
Who is this for
Expected outcomes
- Centralized identity and access
- Automatic least-privilege via claims mapping
Key metrics
Manual role changes
Baseline
120 per month
Target
10 per month
Orphaned accounts after offboarding
Baseline
7 count
Target
0 count
Gallery
Downloads & templates
Case studies
SaaSCo consolidates 3 IdPs
Unified SSO reduced access tickets by 78%.
Security impact
- IdP identifiers, claims, roles · PII: business identity
Compliance
- GDPR (controller/processor responsibilities)
- SOC2 (logical access)