Identity & Access Management
Identity and Access Management (IAM) is a security framework and set of processes that manage digital identities and control user access to resources. It ensures that only authorised individuals can access the right resources at the right time, preventing unauthorised access and data breaches.
IAM can best be separated into two sides - Authentication and Authorisation. Authentication checks who you are (this happens when you sign into our CPaaS Platform) and Authorisation checks what you are allowed to do once you’re in there. Think of it like going to a concert: authentication is showing your ticket at the entrance to prove you've purchased entry (confirming who you are), while authorisation determines whether you have general admission or VIP backstage access (what you're allowed to do once inside).

Authentication
There are currently three different ways a customer can sign into our CPaas Platform:Authorisation
Our CPaas Platform authorisation system combines robust security with operational flexibility through industry-standard Role-Based Access Control (RBAC). This framework ensures users can only access the specific functions they need, while making permission management straightforward for administrators.
Every time a user tries to perform an action in our CPaas Platform, the system checks if they have permission to do so. Permissions control access to messaging features, reports, and settings. To make management easier, administrators can bundle permissions into roles and assign these roles to users. For special cases, individual permissions can also be added directly to a user's account alongside their roles.
Key Benefits
The Latest in IAM
System for Cross-domain Identity Management (SCIM)
SCIM allows for seamless user management directly from your identity provider. When you create, remove, or modify user access in platforms like Entra ID, Jumpcloud, or Okta, these changes automatically synchronise with our CPaas Paltform—eliminating duplicate administration and ensuring consistent access control across your systems.