Identity Flows
Orchestrate identity workflows throughout your enterprise.
Identity Flows
Quickly reduce complexity and eliminate manual tasks
Orchestrate identity events, data and processes without writing code.
Bridge identity data across the enterprise
Building identity management workflows — simple or complex — to orchestrate the flow of identity data across applications.
Supercharge your provisioning workflows
Create highly flexible, dynamic workflows to address complex provisioning business processes without scripting.
Take actions based on identity events or user risk
Bolster your security posture by automatically initiating workflows triggered by identity-related events or risky behavior.
Scalable identity management workflows
Rapidly deploy identity events, build workflows, and synchronize identity data across diverse applications, directory stores, and repositories.
No-code interface
Easily create advanced workflows using the intuitive, drag-and-drop interface and “if this then that” logic.
Pre-built connectors
Manage identity events across thousands of apps using out-of-the-box or easy-to-build custom connectors.
Adaptable workflows
Develop flexible workflows that adapt to risky behavior, business rules, or changes in identity data.
Purpose-built apps for user-initiated workflows
Empower end-users to initiate specific identity workflows through purpose-built apps without granting privileges to downstream apps or resources.
How Identity Flows works
Automate your business processes at scale with hands-off Identity Management Workflows
Sample use cases
What you can do with Identity Flows
Enhance Identity Lifecycle Management
Simplify complex business processes throughout the employee lifecycle. For example, granting the right set of permissions and assigning specific resources to users based on HRIS system attributes or changes.
Orchestrate responses to security events
Trigger threat response workflows based on data from third-party security tools. For example, add users to a suspicious user group and open a helpdesk ticket when anomalous user behavior is detected.
Perform tasks from a single application
Simplify tasks that involve multiple applications by embedding features from one app into another or by creating a custom app with its own UI. For example, enable users to create a Salesforce opportunity and an Outlook calendar invite all without leaving Slack.
Plans & pricing
Explore
related
resources
Focus on running your business,
not reacting to threats.