Language

Source and target systems

Our Integrations

On this page you will find an overview of which source and target systems you can integrate via Identum. Is your system not on the list? Get in touch and we'll help you.

eADM login page - Identum eADM login page - Identum

Use HR and Payroll as master data

Source Systems

We pull employee data directly from your HR system to start the automation process. When a person is hired, moved, or leaves in HR, Identum updates their access everywhere else. Stop managing and start automating.

Core Directory and Collaboration Tools

Microsoft, Google and Meta

We manage your primary user databases so you don’t have to. Identum handles the heavy lifting of provisioning and deprovisioning in your main directories.

There is money to be made (or rather saved) here. Make sure you get rid of "ghost accounts" and don't pay too much for office licenses that are not fully utilised.

Industry Specific and Legacy Systems

Hospital and Health Care

Most "US giants" ignore the niche or local software you rely on. Identum connects to specialised systems used in the public sector and EU industries to ensure full NIS2 compliance.

Always updated and correct

HR, Payroll and Accounting

If you use HR-data as your master, it should always be up to date. Therefore we write back all the changes we have made, after accounts have been automatically created or edited.

The right knowledge, to the right person

Quality and Competence

Don't put the knowledge your coworkers need, in the hands of spreadsheets and manual control. Make sure that they have access to the knowledge and resources they need, when they need it.

Learning Management Systems (LMS) and School Administration

Education and Training

For education and corporate training, we sync student and staff data to ensure the right people have the right course access. Automate your class lists and enrollment without manual exports.

Record Keeping and Case Management

Case and Archive

It doesn't help to have information accessible, structured and future proof, if the people who need it can't get to it.

Champions of Business Software

Visma

Visma has many excellent solutions and applications that help both small and large businesses in their everyday lives. So many, in fact, that we've created a whole section dedicated to Visma integrations.

NB! Via integration with Visma user administration, we can register users in/out of access groups in user admin. This provides real-time access management to all Visma systems that are linked to user admin via access groups.

How does IAM work?

IAM can get very complicated, but very simply explained, Identum can:

  • Send out automatic notifications or requests for access. This is possible for all systems, including those not listed here.
  • Automatic enrollment in access groups for all systems marked with AD/Azure AD/Entra ID.
  • Automatic creation and maintenance of user accounts directly in your subject/target systems for all systems in the API, CSV or XML category.
  • Automatic access management directly in your subject/target systems for all entries marked with API.

We are constantly developing new integrations, and we also accept orders if you have unique needs that we do not currently cover.

Do you also want to automate and simplify your everyday life with eADM? Get in touch and we'll help you.

Send us a message

Identity and Access Management (IAM) is a security framework that ensures the right people have the right access to your digital tools. Instead of manual setup, Identum automates this process to reduce risk and save your IT team time.

API.

API stands for "Application Programming Interface" and you can think of it as a direct link between two different systems. What is possible to do via this link is governed by a "contract" between the two systems, which governs how the systems interact and communicate with each other.

For all API-based integrations, we can synchronize users and organizational structure from HRM. We also have the ability to assign roles and run access management in real time, as long as the subject/target system supports it.

AD/Azure AD/Entra ID

An integration based on AD/Azure AD/Entra ID works in such a way that Identum can sign users in and out of groups in local AD or Azure AD/Entra ID. Enrollment and de-enrollment in these groups then determines which accesses and rights the user should be granted.

This means that, by extension, Identum can manage all access and rights that can be linked to AD and Azure AD/Entra ID.

A CSV or XML integration is a one-way integration via file transfer. It can be an excellent alternative if large numbers of users are to be managed in a system that does not support an API-based integration or can be managed via AD or Azure AD/Entra ID.

Source system

A source system in the context of IAM is typically an HR or payroll system from which data is retrieved. Certain data points (attributes), such as position code or role, are then used to trigger automation in Identum.

Depending on the employee's position code or role, Identum then performs predefined tasks automatically.

Target systems/subject systems

Target systems are workspaces, subject systems, email/interaction, etc. where Identum can create, maintain and delete users. As well as assign or change roles, departments and accesses.

Using your HR system as the source of truth means your employee data drives your IT access. When HR adds a new hire, Identum automatically creates their accounts. When someone leaves, their access is cut immediately. This removes human error and "ghost accounts."

NIS2 requires organisations to have strict control and documentation of system access. Identum provides a clear, automated audit trail for every user. It proves exactly who has access to what, which is essential for meeting EU security standards.

Yes. Many US-based tools only focus on global cloud apps. Identum is built for the EU market, meaning we connect to the local and legacy systems used by municipalities, schools, and healthcare providers that others ignore.

Automating the "Joiner, Mover, Leaver" process saves hundreds of hours of manual IT work per year. It also stops security breaches caused by former employees keeping their passwords. Most of our 500+ municipalities see a return on investment within the first year.