Skip to content
Modica Group website banner-1

Identity & Access Management

Identity and Access Management (IAM) is a security framework and set of processes that manage digital identities and control user access to resources. It ensures that only authorised individuals can access the right resources at the right time, preventing unauthorised access and data breaches.

IAM can best be separated into two sides - Authentication and Authorisation. Authentication checks who you are (this happens when you sign into our CPaaS Platform) and Authorisation checks what you are allowed to do once you’re in there. Think of it like going to a concert: authentication is showing your ticket at the entrance to prove you've purchased entry (confirming who you are), while authorisation determines whether you have general admission or VIP backstage access (what you're allowed to do once inside).

placeholder_200x200

Authentication

There are currently three different ways a customer can sign into our CPaas Platform:
1
Basic Authentication (username and password)
The easiest and most commonly used. We have strict password controls like 16 character minimums and checks for leaked passwords that ensure this is still a secure way to access our platform.
2
Multi-factor Authentication
Adds another layer of security - not only do you need to know the password but you also need to have the device which receives the SMS code - a great additional layer of security for our customers to add.
3
Single Sign-on Authentication
Even more secure - it outsources the authentication to specialised Identity Providers (idPs) like Jumpcloud or Okta who have built very secure and very reliable systems for performing these authentication checks. This is a popular method for large organisations as they generally already use an idP and will want to plug that into our CPaas Platform for secure sign-ins.

Authorisation

Our CPaas Platform authorisation system combines robust security with operational flexibility through industry-standard Role-Based Access Control (RBAC). This framework ensures users can only access the specific functions they need, while making permission management straightforward for administrators.

Every time a user tries to perform an action in our CPaas Platform, the system checks if they have permission to do so. Permissions control access to messaging features, reports, and settings. To make management easier, administrators can bundle permissions into roles and assign these roles to users. For special cases, individual permissions can also be added directly to a user's account alongside their roles.

Key Benefits

Enhanced Security Precise control over what each user can access and modify  
Streamlined Administration Easily manage access for groups of users through role assignments  
Operational Flexibility Configure tailored access for administrators, reporting users, and operational staff  
Scalable Management: Update permissions for multiple users simultaneously by modifying role definitions  

The Latest in IAM

System for Cross-domain Identity Management (SCIM)

SCIM allows for seamless user management directly from your identity provider. When you create, remove, or modify user access in platforms like Entra ID, Jumpcloud, or Okta, these changes automatically synchronise with our CPaas Paltform—eliminating duplicate administration and ensuring consistent access control across your systems.

Contact us today to learn more about
our Intelligent Messaging solutions